diff --git a/2.1-dev/ai/ai-en.html b/2.1-dev/ai/ai-en.html index 6d84a24f4..9b96b2bd9 100644 --- a/2.1-dev/ai/ai-en.html +++ b/2.1-dev/ai/ai-en.html @@ -407,42 +407,1391 @@

Capabilities

Risks

See examples of Risks in VAIR.

-
+ +
+

Bias

+

Note: These are intended to represent bias concepts specific to AI development and use, and do not contain general bias concepts which exist in other contexts e.g. applicable for any technology. The Risk extension contains the general set of concepts that this vocabulary extends to represent biases that are specific to the development and use of AI.

+
+

Risk Measures

See examples of Risk Measures in VAIR.

-
-

Vocabulary Index

-
-

Classes

- +
+ + +
+

Vocabulary Index

+
+

Classes

+ + + + + + + + +
+

Artificial Intelligence (AI)

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAIPrefixai
LabelArtificial Intelligence (AI)
IRIhttps://w3id.org/dpv/ai#AI
Typerdfs:Class, skos:Concept
Broader/Parent types dpv:Technology +
Object of relation dpv:isImplementedUsingTechnology +
DefinitionA technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives
Usage NoteThis concept is a stub
Source
Date Created2024-04-28
See More: section CORE in AI +
+
+ + + +
+

AI Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAIBiasPrefixai
LabelAI Bias
IRIhttps://w3id.org/dpv/ai#AIBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:Bias +
DefinitionBias associated with development, use, or other activities involving an AI technology or system
Date Created2024-09-18
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + +
+

AI System

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAISystemPrefixai
LabelAI System
IRIhttps://w3id.org/dpv/ai#AISystem
Typerdfs:Class, skos:Concept
Broader/Parent types ai:AI + → dpv:Technology +
Object of relation dpv:isImplementedUsingTechnology +
DefinitionOECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives
SourceOECD, ISO/IEC 22989:2023
Date Created2024-05-17
See More: section CORE in AI +
+
+ + + +
+

Algorithm Selection Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAlgorithmSelectionBiasPrefixai
LabelAlgorithm Selection Bias
IRIhttps://w3id.org/dpv/ai#AlgorithmSelectionBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Automation Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAutomationBiasPrefixai
LabelAutomation Bias
IRIhttps://w3id.org/dpv/ai#AutomationBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:CognitiveBias +
DefinitionBias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + + +
+

Capability

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermCapabilityPrefixai
LabelCapability
IRIhttps://w3id.org/dpv/ai#Capability
Typerdfs:Class, skos:Concept
Broader/Parent types ai:AI + → dpv:Technology +
Object of relation dpv:isImplementedUsingTechnology +
DefinitionCapability or use of AI to achieve a technical goal or objective
Usage NoteThis concept is a stub
Date Created2024-04-28
See More: section CAPABILITIES in AI +
+
+ + + + +
+

Data Aggregation Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDataAggregationBiasPrefixai
LabelData Aggregation Bias
IRIhttps://w3id.org/dpv/ai#DataAggregationBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Data Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDataBiasPrefixai
LabelData Bias
IRIhttps://w3id.org/dpv/ai#DataBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Data Labels And Labelling Process Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDataLabelsAndLabellingProcessBiasPrefixai
LabelData Labels And Labelling Process Bias
IRIhttps://w3id.org/dpv/ai#DataLabelsAndLabellingProcessBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to the labelling process itself introducing societal or cognitive biases
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Distributed Training Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDistributedTrainingBiasPrefixai
LabelDistributed Training Bias
IRIhttps://w3id.org/dpv/ai#DistributedTrainingBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Engineering Decision Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermEngineeringDecisionBiasPrefixai
LabelEngineering Decision Bias
IRIhttps://w3id.org/dpv/ai#EngineeringDecisionBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features
Usage NoteData bias and human cognitive bias can contribute to such bias
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Feature Engineering Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFeatureEngineeringBiasPrefixai
LabelFeature Engineering Bias
IRIhttps://w3id.org/dpv/ai#FeatureEngineeringBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Hyperparameter Tuning Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHyperparameterTuningBiasPrefixai
LabelHyperparameter Tuning Bias
IRIhttps://w3id.org/dpv/ai#HyperparameterTuningBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Informativeness Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermInformativenessBiasPrefixai
LabelInformativeness Bias
IRIhttps://w3id.org/dpv/ai#InformativenessBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data
Usage NoteThis can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + +
+

Measure

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermMeasurePrefixai
LabelMeasure
IRIhttps://w3id.org/dpv/ai#Measure
Typerdfs:Class, skos:Concept
Broader/Parent types dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure +
DefinitionMeasure to address risk associated with AI Systems
Usage NoteThis concept is a stub
Date Created2024-04-28
See More: section MEASURES in AI +
+
+ + + + +
+

Missing Features And Labels Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermMissingFeaturesAndLabelsBiasPrefixai
LabelMissing Features And Labels Bias
IRIhttps://w3id.org/dpv/ai#MissingFeaturesAndLabelsBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs when features are missing from individual training samples
Usage NoteIf the frequency of missing features is higher for one group than another then this presents another vector for bias
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
- - - - -
-

Artificial Intelligence (AI)

+
+

Model

- + - + - + @@ -454,7 +1803,8 @@

Artificial Intelligence (AI)

- @@ -471,12 +1821,9 @@

Artificial Intelligence (AI)

- + - - - - + @@ -490,7 +1837,7 @@

Artificial Intelligence (AI)

- + @@ -506,44 +1853,42 @@

Artificial Intelligence (AI)

-
-

AI System

+ +
+

Model Bias

TermAIModel Prefix ai
LabelArtificial Intelligence (AI)Model
IRIhttps://w3id.org/dpv/ai#AIhttps://w3id.org/dpv/ai#Model
Broader/Parent types dpv:Technology + ai:AI + → dpv:Technology
DefinitionA technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectivesPhysical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data
Usage NoteThis concept is a stub
Date Created2024-04-282024-05-17
- + - + - + - + - - - - - + @@ -552,7 +1897,7 @@

AI System

- + @@ -561,68 +1906,69 @@

AI System

- + - + - + + + + -
TermAISystemModelBias Prefix ai
LabelAI SystemModel Bias
IRIhttps://w3id.org/dpv/ai#AISystemhttps://w3id.org/dpv/ai#ModelBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AI - → dpv:Technology + ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias
Object of relation dpv:isImplementedUsingTechnology -
DefinitionOECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectivesBias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution
SourceOECD, ISO/IEC 22989:2023
Date Created2024-05-172024-09-13
ContributorsDaniel Doherty
See More: section CORE in AI + section BIAS in AI
- -
-

Capability

+ +
+

Model Expressiveness Bias

- + - + - + - + - - - - - + @@ -631,78 +1977,77 @@

Capability

- + - - - - + - + + + + - + - + + + + -
TermCapabilityModelExpressivenessBias Prefix ai
LabelCapabilityModel Expressiveness Bias
IRIhttps://w3id.org/dpv/ai#Capabilityhttps://w3id.org/dpv/ai#ModelExpressivenessBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AI - → dpv:Technology + ai:ModelInteractionBias + → ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias
Object of relation dpv:isImplementedUsingTechnology -
DefinitionCapability or use of AI to achieve a technical goal or objectiveBias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups
Usage NoteThis concept is a stub
Source
Date Created2024-04-282024-09-13
ContributorsDaniel Doherty
See More: section CAPABILITIES in AI + section BIAS in AI
- -
-

Measure

+ +
+

Model Interaction Bias

- + - + - + - + - - - - - + @@ -711,77 +2056,77 @@

Measure

- + - - - - + - + + + + - + - + + + + -
TermMeasureModelInteractionBias Prefix ai
LabelMeasureModel Interaction Bias
IRIhttps://w3id.org/dpv/ai#Measurehttps://w3id.org/dpv/ai#ModelInteractionBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure -
DefinitionMeasure to address risk associated with AI SystemsBias that occurs from the structure of a model to create biased predictions
Usage NoteThis concept is a stub
Source
Date Created2024-04-282024-09-13
ContributorsDaniel Doherty
See More: section MEASURES in AI + section BIAS in AI
- -
-

Model

+ +
+

Non-Representative Sampling Bias

- + - + - + - + - - - - - + @@ -790,7 +2135,7 @@

Model

- + @@ -806,15 +2151,18 @@

Model

- + - + + + + - @@ -999,13 +2347,62 @@

Properties

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -1041,14 +2438,63 @@

External

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -1070,7 +2516,7 @@

External

Contributors

The following people have contributed to this vocabulary. The names are ordered alphabetically. The affiliations are informative do not represent formal endorsements. Affiliations may be outdated. The list is generated automatically from the contributors listed for defined concepts.

    -
  • ()
  • +
  • Daniel Doherty ()
diff --git a/2.1-dev/ai/ai-owl.html b/2.1-dev/ai/ai-owl.html index af6f0b159..f0acf3c58 100644 --- a/2.1-dev/ai/ai-owl.html +++ b/2.1-dev/ai/ai-owl.html @@ -429,6 +429,82 @@

Artificial Intelligence (AI)

+ +
+

AI Bias

+
TermModelNonRepresentativeSamplingBias Prefix ai
LabelModelNon-Representative Sampling Bias
IRIhttps://w3id.org/dpv/ai#Modelhttps://w3id.org/dpv/ai#NonRepresentativeSamplingBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AI - → dpv:Technology + ai:DataBias + → ai:AIBias + → risk:Bias
Object of relation dpv:isImplementedUsingTechnology -
DefinitionPhysical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or dataBias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative
Date Created2024-05-172024-09-13
ContributorsDaniel Doherty
See More: section CORE in AI + section BIAS in AI
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAIBiasPrefixai-owl
LabelAI Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#AIBias
+ https://w3id.org/dpv/ai#AIBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of risk-owl:Bias +
DefinitionBias associated with development, use, or other activities involving an AI technology or system
Date Created2024-09-18
ContributorsDaniel Doherty
Documented inAi Bias
+
+ +

AI System

@@ -446,8 +522,1146 @@

AI System

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/ai/owl/#AISystem
- https://w3id.org/dpv/ai#AISystem + https://w3id.org/dpv/ai/owl/#AISystem
+ https://w3id.org/dpv/ai#AISystem +
Type rdfs:Class + , owl:Class +
Sub-class of ai-owl:AI + → dpv-owl:Technology +
in Range of dpv-owl:isImplementedUsingTechnology +
DefinitionOECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives
SourceOECD,ISO/IEC 22989:2023
Date Created2024-05-17
Documented inAi Core
+
+ + + +
+

Algorithm Selection Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAlgorithmSelectionBiasPrefixai-owl
LabelAlgorithm Selection Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#AlgorithmSelectionBias
+ https://w3id.org/dpv/ai#AlgorithmSelectionBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of ai-owl:EngineeringDecisionBias + → ai-owl:AIBias + → risk-owl:Bias +
DefinitionBias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inAi Bias
+
+ + + +
+

Automation Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAutomationBiasPrefixai-owl
LabelAutomation Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#AutomationBias
+ https://w3id.org/dpv/ai#AutomationBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of risk-owl:CognitiveBias +
DefinitionBias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inAi Bias
+
+ + + + +
+

Capability

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermCapabilityPrefixai-owl
LabelCapability
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#Capability
+ https://w3id.org/dpv/ai#Capability +
Type rdfs:Class + , owl:Class +
Sub-class of ai-owl:AI + → dpv-owl:Technology +
in Range of dpv-owl:isImplementedUsingTechnology +
DefinitionCapability or use of AI to achieve a technical goal or objective
Usage NoteThis concept is a stub
Date Created2024-04-28
Documented inAi Capabilities
+
+ + + + +
+

Data Aggregation Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDataAggregationBiasPrefixai-owl
LabelData Aggregation Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#DataAggregationBias
+ https://w3id.org/dpv/ai#DataAggregationBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of ai-owl:DataBias + → ai-owl:AIBias + → risk-owl:Bias +
DefinitionBias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inAi Bias
+
+ + + +
+

Data Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDataBiasPrefixai-owl
LabelData Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#DataBias
+ https://w3id.org/dpv/ai#DataBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of ai-owl:AIBias + → risk-owl:Bias +
DefinitionBias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inAi Bias
+
+ + + +
+

Data Labels And Labelling Process Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDataLabelsAndLabellingProcessBiasPrefixai-owl
LabelData Labels And Labelling Process Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#DataLabelsAndLabellingProcessBias
+ https://w3id.org/dpv/ai#DataLabelsAndLabellingProcessBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of ai-owl:DataBias + → ai-owl:AIBias + → risk-owl:Bias +
DefinitionBias that occurs due to the labelling process itself introducing societal or cognitive biases
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inAi Bias
+
+ + + +
+

Distributed Training Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDistributedTrainingBiasPrefixai-owl
LabelDistributed Training Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#DistributedTrainingBias
+ https://w3id.org/dpv/ai#DistributedTrainingBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of ai-owl:DataBias + → ai-owl:AIBias + → risk-owl:Bias +
DefinitionBias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inAi Bias
+
+ + + +
+

Engineering Decision Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermEngineeringDecisionBiasPrefixai-owl
LabelEngineering Decision Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#EngineeringDecisionBias
+ https://w3id.org/dpv/ai#EngineeringDecisionBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of ai-owl:AIBias + → risk-owl:Bias +
DefinitionBias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features
Usage NoteData bias and human cognitive bias can contribute to such bias
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inAi Bias
+
+ + + +
+

Feature Engineering Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFeatureEngineeringBiasPrefixai-owl
LabelFeature Engineering Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#FeatureEngineeringBias
+ https://w3id.org/dpv/ai#FeatureEngineeringBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of ai-owl:EngineeringDecisionBias + → ai-owl:AIBias + → risk-owl:Bias +
DefinitionBias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inAi Bias
+
+ + + +
+

Hyperparameter Tuning Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHyperparameterTuningBiasPrefixai-owl
LabelHyperparameter Tuning Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#HyperparameterTuningBias
+ https://w3id.org/dpv/ai#HyperparameterTuningBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of ai-owl:EngineeringDecisionBias + → ai-owl:AIBias + → risk-owl:Bias +
DefinitionBias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inAi Bias
+
+ + + +
+

Informativeness Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermInformativenessBiasPrefixai-owl
LabelInformativeness Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#InformativenessBias
+ https://w3id.org/dpv/ai#InformativenessBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of ai-owl:EngineeringDecisionBias + → ai-owl:AIBias + → risk-owl:Bias +
DefinitionBias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data
Usage NoteThis can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inAi Bias
+
+ + +
+

Measure

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermMeasurePrefixai-owl
LabelMeasure
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#Measure
+ https://w3id.org/dpv/ai#Measure +
Type rdfs:Class + , owl:Class +
Sub-class of dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure +
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure +
DefinitionMeasure to address risk associated with AI Systems
Usage NoteThis concept is a stub
Date Created2024-04-28
Documented inAi Measures
+
+ + + + +
+

Missing Features And Labels Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermMissingFeaturesAndLabelsBiasPrefixai-owl
LabelMissing Features And Labels Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#MissingFeaturesAndLabelsBias
+ https://w3id.org/dpv/ai#MissingFeaturesAndLabelsBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of ai-owl:DataBias + → ai-owl:AIBias + → risk-owl:Bias +
DefinitionBias that occurs when features are missing from individual training samples
Usage NoteIf the frequency of missing features is higher for one group than another then this presents another vector for bias
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inAi Bias
+
+ + +
+

Model

+ + + + + + + + + + + + + + + @@ -479,7 +1693,7 @@

AI System

- + @@ -488,7 +1702,7 @@

AI System

- + @@ -506,28 +1720,28 @@

AI System

TermModelPrefixai-owl
LabelModel
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#Model
+ https://w3id.org/dpv/ai#Model
DefinitionOECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectivesPhysical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data
SourceOECD,ISO/IEC 22989:2023
- -
-

Capability

+ +
+

Model Bias

- + - + @@ -536,21 +1750,19 @@

Capability

- - - - - + @@ -559,55 +1771,58 @@

Capability

- + - - - - + - + + + + - + - + + + + - +
TermCapabilityModelBias Prefix ai-owl
LabelCapabilityModel Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/ai/owl/#Capability
- https://w3id.org/dpv/ai#Capability + https://w3id.org/dpv/ai/owl/#ModelBias
+ https://w3id.org/dpv/ai#ModelBias
Type rdfs:Class , owl:Class + , risk-owl:RiskConcept
Sub-class of ai-owl:AI - → dpv-owl:Technology + ai-owl:EngineeringDecisionBias + → ai-owl:AIBias + → risk-owl:Bias
in Range of dpv-owl:isImplementedUsingTechnology -
DefinitionCapability or use of AI to achieve a technical goal or objectiveBias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution
Usage NoteThis concept is a stub
Source
Date Created2024-04-282024-09-13
ContributorsDaniel Doherty
Documented inAi CapabilitiesAi Bias
- -
-

Measure

+ +
+

Model Expressiveness Bias

- + - + @@ -616,22 +1831,20 @@

Measure

- - - - - + @@ -640,55 +1853,58 @@

Measure

- + - - - - + - + + + + - + - + + + + - +
TermMeasureModelExpressivenessBias Prefix ai-owl
LabelMeasureModel Expressiveness Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/ai/owl/#Measure
- https://w3id.org/dpv/ai#Measure + https://w3id.org/dpv/ai/owl/#ModelExpressivenessBias
+ https://w3id.org/dpv/ai#ModelExpressivenessBias
Type rdfs:Class , owl:Class + , risk-owl:RiskConcept
Sub-class of dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + ai-owl:ModelInteractionBias + → ai-owl:EngineeringDecisionBias + → ai-owl:AIBias + → risk-owl:Bias
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure -
DefinitionMeasure to address risk associated with AI SystemsBias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups
Usage NoteThis concept is a stub
Source
Date Created2024-04-282024-09-13
ContributorsDaniel Doherty
Documented inAi MeasuresAi Bias
- -
-

Model

+ +
+

Model Interaction Bias

- + - + @@ -697,21 +1913,100 @@

Model

- + + + + + + + - - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermModelModelInteractionBias Prefix ai-owl
LabelModelModel Interaction Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/ai/owl/#Model
- https://w3id.org/dpv/ai#Model + https://w3id.org/dpv/ai/owl/#ModelInteractionBias
+ https://w3id.org/dpv/ai#ModelInteractionBias
Type rdfs:Class , owl:Class + , risk-owl:RiskConcept
Sub-class of ai-owl:AI - → dpv-owl:Technology + ai-owl:EngineeringDecisionBias + → ai-owl:AIBias + → risk-owl:Bias
in Range of dpv-owl:isImplementedUsingTechnology -DefinitionBias that occurs from the structure of a model to create biased predictions
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inAi Bias
+
+ + + +
+

Non-Representative Sampling Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -720,7 +2015,7 @@

Model

- + @@ -736,13 +2031,16 @@

Model

- + - + + + + - +
TermNonRepresentativeSamplingBiasPrefixai-owl
LabelNon-Representative Sampling Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/ai/owl/#NonRepresentativeSamplingBias
+ https://w3id.org/dpv/ai#NonRepresentativeSamplingBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of ai-owl:DataBias + → ai-owl:AIBias + → risk-owl:Bias +
DefinitionPhysical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or dataBias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative
Date Created2024-05-172024-09-13
ContributorsDaniel Doherty
Documented inAi CoreAi Bias
@@ -928,13 +2226,62 @@

Properties

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -963,14 +2310,63 @@

External

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/2.1-dev/ai/ai-owl.jsonld b/2.1-dev/ai/ai-owl.jsonld index 9d5d8b3a4..123ba4fe2 100644 --- a/2.1-dev/ai/ai-owl.jsonld +++ b/2.1-dev/ai/ai-owl.jsonld @@ -1,179 +1,194 @@ [ { - "@id": "https://w3id.org/dpv/ai/owl#", + "@id": "https://w3id.org/dpv/ai/owl#DataAggregationBias", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@value": "Daniel Doherty" } ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@value": "http://www.w3.org/2004/02/skos/core" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ { - "@id": "http://www.w3.org/2002/07/owl" - }, + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "http://www.w3.org/2000/01/rdf-schema" + "@id": "https://w3id.org/dpv/ai/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "2024-05-31" + "@id": "https://w3id.org/dpv/ai/owl#DataBias" } ], - "http://purl.org/dc/terms/creator": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Delaram Golpayegani" - }, + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Harshvardhan J. Pandit" + "@value": "Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems" } ], - "http://purl.org/dc/terms/description": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about AI technologies" + "@value": "Data Aggregation Bias" } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#DataBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/hasVersion": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/ai/owl#" + "@value": "Daniel Doherty" } ], - "http://purl.org/dc/terms/identifier": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://w3id.org/dpv/ai" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/issued": [ + "http://purl.org/dc/terms/source": [ { "@language": "en", - "@value": "2024-05-31" + "@value": "ISO/IEC 24027:2021" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv/ai/owl#" } ], - "http://purl.org/dc/terms/publisher": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.w3.org/" + "@id": "https://w3id.org/dpv/ai/owl#AIBias" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "AI Technology Concepts" + "@value": "Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "10.5281/zenodo.12505841" + "@language": "en", + "@value": "Data Bias" } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/ontology/bibo/status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "http://purl.org/ontology/bibo/status/draft" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://purl.org/dc/terms/format": [ { - "@value": "ai" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://purl.org/dc/terms/title": [ { - "@value": "https://w3id.org/dpv/ai#" + "@value": "Guides for Data Privacy Vocabulary" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "AI" + "@id": "https://w3id.org/dpv/guides" } ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/2.1-dev/ai/owl#" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } + ] + }, + { + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "2.1-dev" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/ai/owl#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/ai/owl#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/ai/owl#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, - { - "@id": "https://w3id.org/dpv/ai/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/primer" - }, + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/ai/owl#serialisation-jsonld" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "https://w3id.org/dpv/tech/owl" - }, - { - "@id": "http://www.w3.org/2002/07/owl" - }, + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/ai/owl#" + "@value": "Primer for Data Privacy Vocabulary" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@id": "https://w3id.org/dpv/primer" } ], - "https://schema.org/version": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "2.1-dev" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/ai/owl#Capability", + "@id": "https://w3id.org/dpv/ai/owl#NonRepresentativeSamplingBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-28" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -183,7 +198,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/ai/owl#AI" + "@id": "https://w3id.org/dpv/ai/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -195,71 +210,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Capability or use of AI to achieve a technical goal or objective" + "@value": "Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Capability" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept is a stub" + "@value": "Non-Representative Sampling Bias" } ] }, { - "@id": "https://w3id.org/dpv/ai/owl#Risk", + "@id": "https://w3id.org/dpv/ai/owl#serialisation-jsonld", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-28" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/ai/owl#" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Risk associated with development, use, or operation of AI systems" + "@value": "AI Technology Concepts - JSON-LD serialiation" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Risk" + "@id": "https://w3id.org/dpv/ai/ai-owl.jsonld" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "This concept is a stub" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/ai/owl#Model", + "@id": "https://w3id.org/dpv/ai/owl#Risk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -267,13 +260,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-17" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@language": "en", - "@value": "ISO/IEC 22989:2022" + "@value": "2024-04-28" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -283,7 +270,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/ai/owl#AI" + "@id": "https://w3id.org/dpv/owl#Risk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -295,13 +282,19 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Physical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data" + "@value": "Risk associated with development, use, or operation of AI systems" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Model" + "@value": "Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept is a stub" } ] }, @@ -353,240 +346,223 @@ ] }, { - "@id": "https://w3id.org/dpv/ai/owl#serialisation-jsonld", + "@id": "https://w3id.org/dpv/examples", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "AI Technology Concepts - JSON-LD serialiation" + "@value": "Examples for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/ai/ai-owl.jsonld" + "@id": "https://w3id.org/dpv/examples" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/ai/owl#serialisation-rdf", + "@id": "https://w3id.org/dpv/ai/owl#EngineeringDecisionBias", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@value": "Daniel Doherty" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/source": [ { - "@value": "AI Technology Concepts - RDF/XML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/ai/ai-owl.rdf" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv/ai/owl#" } - ] - }, - { - "@id": "https://w3id.org/dpv/ai/owl#serialisation-n3", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@id": "https://w3id.org/dpv/ai/owl#AIBias" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "AI Technology Concepts - N3 serialiation" + "@language": "en", + "@value": "Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/ai/ai-owl.n3" + "@language": "en", + "@value": "Engineering Decision Bias" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Data bias and human cognitive bias can contribute to such bias" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "https://w3id.org/dpv/ai/owl#ModelInteractionBias", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@value": "Daniel Doherty" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/examples" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/source": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } - ] - }, - { - "@id": "https://w3id.org/dpv/ai/owl#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@id": "https://w3id.org/dpv/ai/owl#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@id": "https://w3id.org/dpv/ai/owl#EngineeringDecisionBias" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "AI Technology Concepts - Turtle serialiation" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/ai/ai-owl.ttl" + "@language": "en", + "@value": "Bias that occurs from the structure of a model to create biased predictions" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Model Interaction Bias" } ] }, { - "@id": "https://w3id.org/dpv/ai/owl#serialisation-html", + "@id": "https://w3id.org/dpv/ai/owl#DistributedTrainingBias", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "AI Technology Concepts - HTML serialiation" + "@value": "Daniel Doherty" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/ai/ai-owl.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/source": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } - ] - }, - { - "@id": "https://w3id.org/dpv/guides", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/ai/owl#" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/ai/owl#DataBias" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/guides" + "@language": "en", + "@value": "Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "Distributed Training Bias" } ] }, { - "@id": "https://w3id.org/dpv/ai/owl#AISystem", + "@id": "https://w3id.org/dpv/ai/owl#FeatureEngineeringBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-17" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nfd8436350d0d4847adc534a199648489" - }, - { - "@id": "_:N1632bd64f299417b96be51a9cb14caf6" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -596,7 +572,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/ai/owl#AI" + "@id": "https://w3id.org/dpv/ai/owl#EngineeringDecisionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -608,58 +584,91 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "OECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives" + "@value": "Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "AI System" + "@value": "Feature Engineering Bias" } ] }, { - "@id": "_:Nfd8436350d0d4847adc534a199648489", + "@id": "https://w3id.org/dpv/ai/owl#ModelExpressivenessBias", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 22989:2023" + "@value": "Daniel Doherty" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/74296.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } - ] - }, - { - "@id": "_:N1632bd64f299417b96be51a9cb14caf6", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/source": [ { - "@value": "OECD" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://oecd.ai/en/wonk/ai-system-definition-update" + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#ModelInteractionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Model Expressiveness Bias" } ] }, { - "@id": "https://w3id.org/dpv/ai/owl#Measure", + "@id": "https://w3id.org/dpv/ai/owl#DataLabelsAndLabellingProcessBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-28" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -669,7 +678,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/ai/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -681,24 +690,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Measure to address risk associated with AI Systems" + "@value": "Bias that occurs due to the labelling process itself introducing societal or cognitive biases" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Measure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept is a stub" + "@value": "Data Labels And Labelling Process Bias" } ] }, { - "@id": "https://w3id.org/dpv/ai/owl#AI", + "@id": "https://w3id.org/dpv/ai/owl#AISystem", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -706,13 +709,15 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-28" + "@value": "2024-05-17" } ], "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "ISO/IEC 22989:2022" + "@id": "_:N4fb5233f538748f9ad16f2cd7f523c53" + }, + { + "@id": "_:Nde027296bf9847a1a9416ddf7bc664ea" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -722,7 +727,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Technology" + "@id": "https://w3id.org/dpv/ai/owl#AI" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -734,24 +739,50 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives" + "@value": "OECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Artificial Intelligence (AI)" + "@value": "AI System" + } + ] + }, + { + "@id": "_:N4fb5233f538748f9ad16f2cd7f523c53", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "OECD" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "This concept is a stub" + "@value": "https://oecd.ai/en/wonk/ai-system-definition-update" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "_:Nde027296bf9847a1a9416ddf7bc664ea", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 22989:2023" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/74296.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-html", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], @@ -767,17 +798,851 @@ ], "http://purl.org/dc/terms/title": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@value": "AI Technology Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai-owl.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#ModelBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Model Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#HyperparameterTuningBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Hyperparameter Tuning Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#Measure", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-28" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Measure to address risk associated with AI Systems" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Measure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept is a stub" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#AutomationBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Automation Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/turtle/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai-owl.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TeamSubmission/n3/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai-owl.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#AlgorithmSelectionBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Algorithm Selection Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#InformativenessBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Informativeness Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#Model", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-17" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 22989:2022" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#AI" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Physical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Model" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#AI", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-28" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 22989:2022" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#Technology" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Artificial Intelligence (AI)" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept is a stub" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#Capability", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-28" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#AI" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Capability or use of AI to achieve a technical goal or objective" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Capability" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept is a stub" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#", + "@type": [ + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + } + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/created": [ + { + "@language": "en", + "@value": "2024-05-31" + } + ], + "http://purl.org/dc/terms/creator": [ + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/description": [ + { + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about AI technologies" + } + ], + "http://purl.org/dc/terms/hasVersion": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/ai" + } + ], + "http://purl.org/dc/terms/issued": [ + { + "@language": "en", + "@value": "2024-05-31" + } + ], + "http://purl.org/dc/terms/license": [ + { + "@id": "https://www.w3.org/copyright/document-license-2023/" + } + ], + "http://purl.org/dc/terms/publisher": [ + { + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@language": "en", + "@value": "AI Technology Concepts" + } + ], + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/draft" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "ai" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ + { + "@language": "en", + "@value": "AI" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/ai/owl#" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-jsonld" + }, { "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-rdf" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "https://w3id.org/dpv/tech/owl" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#AIBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-18" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Bias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias associated with development, use, or other activities involving an AI technology or system" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "AI Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#MissingFeaturesAndLabelsBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#DataBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when features are missing from individual training samples" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Missing Features And Labels Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "If the frequency of missing features is higher for one group than another then this presents another vector for bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai-owl.rdf" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] } diff --git a/2.1-dev/ai/ai-owl.n3 b/2.1-dev/ai/ai-owl.n3 index 6bc2a4371..5d3552e34 100644 --- a/2.1-dev/ai/ai-owl.n3 +++ b/2.1-dev/ai/ai-owl.n3 @@ -7,6 +7,7 @@ @prefix profile: . @prefix rdf: . @prefix rdfs: . +@prefix risk-owl: . @prefix role: . @prefix schema: . @prefix skos: . @@ -25,6 +26,17 @@ ai-owl:AI a rdfs:Class, skos:prefLabel "Artificial Intelligence (AI)"@en ; skos:scopeNote "This concept is a stub"@en . +ai-owl:AIBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-18"^^xsd:date ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias associated with development, use, or other activities involving an AI technology or system"@en ; + skos:prefLabel "AI Bias"@en . + ai-owl:AISystem a rdfs:Class, owl:Class ; dct:created "2024-05-17"^^xsd:date ; @@ -40,6 +52,30 @@ ai-owl:AISystem a rdfs:Class, skos:definition "OECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives"@en ; skos:prefLabel "AI System"@en . +ai-owl:AlgorithmSelectionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model"@en ; + skos:prefLabel "Algorithm Selection Bias"@en . + +ai-owl:AutomationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct"@en ; + skos:prefLabel "Automation Bias"@en . + ai-owl:Capability a rdfs:Class, owl:Class ; dct:created "2024-04-28"^^xsd:date ; @@ -50,6 +86,104 @@ ai-owl:Capability a rdfs:Class, skos:prefLabel "Capability"@en ; skos:scopeNote "This concept is a stub"@en . +ai-owl:DataAggregationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems"@en ; + skos:prefLabel "Data Aggregation Bias"@en . + +ai-owl:DataBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:AIBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups"@en ; + skos:prefLabel "Data Bias"@en . + +ai-owl:DataLabelsAndLabellingProcessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to the labelling process itself introducing societal or cognitive biases"@en ; + skos:prefLabel "Data Labels And Labelling Process Bias"@en . + +ai-owl:DistributedTrainingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space"@en ; + skos:prefLabel "Distributed Training Bias"@en . + +ai-owl:EngineeringDecisionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:AIBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features"@en ; + skos:prefLabel "Engineering Decision Bias"@en ; + skos:scopeNote "Data bias and human cognitive bias can contribute to such bias"@en . + +ai-owl:FeatureEngineeringBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model"@en ; + skos:prefLabel "Feature Engineering Bias"@en . + +ai-owl:HyperparameterTuningBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model"@en ; + skos:prefLabel "Hyperparameter Tuning Bias"@en . + +ai-owl:InformativenessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en ; + skos:prefLabel "Informativeness Bias"@en ; + skos:scopeNote "This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en . + ai-owl:Measure a rdfs:Class, owl:Class ; dct:created "2024-04-28"^^xsd:date ; @@ -60,6 +194,19 @@ ai-owl:Measure a rdfs:Class, skos:prefLabel "Measure"@en ; skos:scopeNote "This concept is a stub"@en . +ai-owl:MissingFeaturesAndLabelsBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when features are missing from individual training samples"@en ; + skos:prefLabel "Missing Features And Labels Bias"@en ; + skos:scopeNote "If the frequency of missing features is higher for one group than another then this presents another vector for bias"@en . + ai-owl:Model a rdfs:Class, owl:Class ; dct:created "2024-05-17"^^xsd:date ; @@ -70,6 +217,54 @@ ai-owl:Model a rdfs:Class, skos:definition "Physical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data"@en ; skos:prefLabel "Model"@en . +ai-owl:ModelBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution"@en ; + skos:prefLabel "Model Bias"@en . + +ai-owl:ModelExpressivenessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:ModelInteractionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups"@en ; + skos:prefLabel "Model Expressiveness Bias"@en . + +ai-owl:ModelInteractionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from the structure of a model to create biased predictions"@en ; + skos:prefLabel "Model Interaction Bias"@en . + +ai-owl:NonRepresentativeSamplingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative"@en ; + skos:prefLabel "Non-Representative Sampling Bias"@en . + ai-owl:Risk a rdfs:Class, owl:Class ; dct:created "2024-04-28"^^xsd:date ; @@ -152,6 +347,7 @@ ai-owl: a owl:Ontology, dct:conformsTo , "http://www.w3.org/2000/01/rdf-schema", "http://www.w3.org/2004/02/skos/core" ; + dct:contributor "Daniel Doherty" ; dct:created "2024-05-31"@en ; dct:creator "Delaram Golpayegani"@en, "Harshvardhan J. Pandit"@en ; diff --git a/2.1-dev/ai/ai-owl.rdf b/2.1-dev/ai/ai-owl.rdf index 4fb2aabb8..5240ce77a 100644 --- a/2.1-dev/ai/ai-owl.rdf +++ b/2.1-dev/ai/ai-owl.rdf @@ -12,196 +12,407 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - - - - - - AI Technology Concepts - JSON-LD serialiation - - - - - - - - AI Technology Concepts - RDF/XML serialiation - - - - - Primer for Data Privacy Vocabulary - - - + + + + + Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data + accepted + 2024-09-13 + Daniel Doherty + Informativeness Bias + + This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data + ISO/IEC 24027:2021 + - - - - - - - + http://www.w3.org/2000/01/rdf-schema + http://www.w3.org/2004/02/skos/core + + ai + 10.5281/zenodo.12505841 + AI + 2.1-dev + + + + - - - - - - AI + + 2.1-dev Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about AI technologies http://purl.org/ontology/bibo/status/draft - 2.1-dev - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + Daniel Doherty + + + + + 2024-05-31 - 2.1-dev - ai - http://www.w3.org/2004/02/skos/core - - http://www.w3.org/2000/01/rdf-schema - 10.5281/zenodo.12505841 + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + Delaram Golpayegani Harshvardhan J. Pandit - 2024-05-31 - - https://w3id.org/dpv/ai - AI Technology Concepts https://w3id.org/dpv/ai# - - - - - - - - AI Technology Concepts - N3 serialiation + https://w3id.org/dpv/ai + 2024-05-31 + Measure to address risk associated with AI Systems + This concept is a stub 2024-04-28 + accepted Measure + + + + + 2024-05-17 + + + + + accepted + + OECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives + AI System + + + + + + + ISO/IEC 24027:2021 + Non-Representative Sampling Bias + Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative + 2024-09-13 accepted + Daniel Doherty + + + + + ISO/IEC 24027:2021 + + Daniel Doherty + 2024-09-13 + accepted - Measure to address risk associated with AI Systems + Algorithm Selection Bias + Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model + - - - Examples for Data Privacy Vocabulary - - - - + + + + + Data Bias + accepted + Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups + Daniel Doherty + 2024-09-13 + ISO/IEC 24027:2021 + + + + + + Risk + This concept is a stub + + 2024-04-28 + Risk associated with development, use, or operation of AI systems + + + accepted + + + + + + Hyperparameter Tuning Bias + ISO/IEC 24027:2021 + 2024-09-13 + Daniel Doherty + Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model + accepted + + + + + Daniel Doherty + 2024-09-13 + accepted + Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution + + Model Bias + + + + ISO/IEC 24027:2021 + - AI Technology Concepts - HTML serialiation - - - + + AI Technology Concepts - HTML serialiation + + - - https://www.iso.org/standard/74296.html - - ISO/IEC 22989:2023 + + Model Expressiveness Bias + + + + 2024-09-13 + accepted + Daniel Doherty + + Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups + ISO/IEC 24027:2021 + - - 2024-04-28 - - Techniques for using or applying AI + + 2024-09-13 + accepted + + + ISO/IEC 24027:2021 + Daniel Doherty + Distributed Training Bias + Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space + + + - Technique - This concept is a stub + Bias associated with development, use, or other activities involving an AI technology or system + + + + 2024-09-18 + Daniel Doherty + AI Bias + accepted + + + + + If the frequency of missing features is higher for one group than another then this presents another vector for bias + ISO/IEC 24027:2021 + + + + Bias that occurs when features are missing from individual training samples accepted + Daniel Doherty + 2024-09-13 + Missing Features And Labels Bias + + + + accepted + 2024-09-13 + Daniel Doherty + + Data Labels And Labelling Process Bias + + + + ISO/IEC 24027:2021 + Bias that occurs due to the labelling process itself introducing societal or cognitive biases + + This concept is a stub + + Capability accepted + + Capability or use of AI to achieve a technical goal or objective 2024-04-28 - Capability + + + + + + AI Technology Concepts - RDF/XML serialiation + + + + + + + + + + + + AI Technology Concepts - N3 serialiation + + + + OECD + https://oecd.ai/en/wonk/ai-system-definition-update + + + + + 2024-05-17 + accepted + ISO/IEC 22989:2022 + + Physical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data + Model + + + Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct + - Capability or use of AI to achieve a technical goal or objective - This concept is a stub + ISO/IEC 24027:2021 + Daniel Doherty + Automation Bias + 2024-09-13 + accepted + - AI Technology Concepts - Turtle serialiation - - + + + - - accepted - OECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives - - - 2024-05-17 - - AI System + + Daniel Doherty + 2024-09-13 + + ISO/IEC 24027:2021 + Data Aggregation Bias + Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems + accepted + + This concept is a stub + Artificial Intelligence (AI) + + A technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives 2024-04-28 - + accepted ISO/IEC 22989:2022 + + + + + - - Artificial Intelligence (AI) This concept is a stub + + Techniques for using or applying AI + 2024-04-28 + accepted + Technique + + + Engineering Decision Bias + Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features + Data bias and human cognitive bias can contribute to such bias + 2024-09-13 accepted + Daniel Doherty + + + + + ISO/IEC 24027:2021 + + + + Daniel Doherty + Feature Engineering Bias + 2024-09-13 + + + + + ISO/IEC 24027:2021 + Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model + accepted + - Guides for Data Privacy Vocabulary - + + + + + Guides for Data Privacy Vocabulary + + + + + Primer for Data Privacy Vocabulary - - 2024-04-28 - Risk - Risk associated with development, use, or operation of AI systems + + + ISO/IEC 24027:2021 + - This concept is a stub - + Bias that occurs from the structure of a model to create biased predictions + Model Interaction Bias + Daniel Doherty + 2024-09-13 accepted - + - - OECD - https://oecd.ai/en/wonk/ai-system-definition-update + + + + + Examples for Data Privacy Vocabulary + + + + + https://www.iso.org/standard/74296.html + ISO/IEC 22989:2023 - - ISO/IEC 22989:2022 - - - - Model - Physical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data - accepted - - 2024-05-17 + + + + + AI Technology Concepts - JSON-LD serialiation + + diff --git a/2.1-dev/ai/ai-owl.ttl b/2.1-dev/ai/ai-owl.ttl index 6bc2a4371..5d3552e34 100644 --- a/2.1-dev/ai/ai-owl.ttl +++ b/2.1-dev/ai/ai-owl.ttl @@ -7,6 +7,7 @@ @prefix profile: . @prefix rdf: . @prefix rdfs: . +@prefix risk-owl: . @prefix role: . @prefix schema: . @prefix skos: . @@ -25,6 +26,17 @@ ai-owl:AI a rdfs:Class, skos:prefLabel "Artificial Intelligence (AI)"@en ; skos:scopeNote "This concept is a stub"@en . +ai-owl:AIBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-18"^^xsd:date ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias associated with development, use, or other activities involving an AI technology or system"@en ; + skos:prefLabel "AI Bias"@en . + ai-owl:AISystem a rdfs:Class, owl:Class ; dct:created "2024-05-17"^^xsd:date ; @@ -40,6 +52,30 @@ ai-owl:AISystem a rdfs:Class, skos:definition "OECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives"@en ; skos:prefLabel "AI System"@en . +ai-owl:AlgorithmSelectionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model"@en ; + skos:prefLabel "Algorithm Selection Bias"@en . + +ai-owl:AutomationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct"@en ; + skos:prefLabel "Automation Bias"@en . + ai-owl:Capability a rdfs:Class, owl:Class ; dct:created "2024-04-28"^^xsd:date ; @@ -50,6 +86,104 @@ ai-owl:Capability a rdfs:Class, skos:prefLabel "Capability"@en ; skos:scopeNote "This concept is a stub"@en . +ai-owl:DataAggregationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems"@en ; + skos:prefLabel "Data Aggregation Bias"@en . + +ai-owl:DataBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:AIBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups"@en ; + skos:prefLabel "Data Bias"@en . + +ai-owl:DataLabelsAndLabellingProcessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to the labelling process itself introducing societal or cognitive biases"@en ; + skos:prefLabel "Data Labels And Labelling Process Bias"@en . + +ai-owl:DistributedTrainingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space"@en ; + skos:prefLabel "Distributed Training Bias"@en . + +ai-owl:EngineeringDecisionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:AIBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features"@en ; + skos:prefLabel "Engineering Decision Bias"@en ; + skos:scopeNote "Data bias and human cognitive bias can contribute to such bias"@en . + +ai-owl:FeatureEngineeringBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model"@en ; + skos:prefLabel "Feature Engineering Bias"@en . + +ai-owl:HyperparameterTuningBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model"@en ; + skos:prefLabel "Hyperparameter Tuning Bias"@en . + +ai-owl:InformativenessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en ; + skos:prefLabel "Informativeness Bias"@en ; + skos:scopeNote "This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en . + ai-owl:Measure a rdfs:Class, owl:Class ; dct:created "2024-04-28"^^xsd:date ; @@ -60,6 +194,19 @@ ai-owl:Measure a rdfs:Class, skos:prefLabel "Measure"@en ; skos:scopeNote "This concept is a stub"@en . +ai-owl:MissingFeaturesAndLabelsBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when features are missing from individual training samples"@en ; + skos:prefLabel "Missing Features And Labels Bias"@en ; + skos:scopeNote "If the frequency of missing features is higher for one group than another then this presents another vector for bias"@en . + ai-owl:Model a rdfs:Class, owl:Class ; dct:created "2024-05-17"^^xsd:date ; @@ -70,6 +217,54 @@ ai-owl:Model a rdfs:Class, skos:definition "Physical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data"@en ; skos:prefLabel "Model"@en . +ai-owl:ModelBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution"@en ; + skos:prefLabel "Model Bias"@en . + +ai-owl:ModelExpressivenessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:ModelInteractionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups"@en ; + skos:prefLabel "Model Expressiveness Bias"@en . + +ai-owl:ModelInteractionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from the structure of a model to create biased predictions"@en ; + skos:prefLabel "Model Interaction Bias"@en . + +ai-owl:NonRepresentativeSamplingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative"@en ; + skos:prefLabel "Non-Representative Sampling Bias"@en . + ai-owl:Risk a rdfs:Class, owl:Class ; dct:created "2024-04-28"^^xsd:date ; @@ -152,6 +347,7 @@ ai-owl: a owl:Ontology, dct:conformsTo , "http://www.w3.org/2000/01/rdf-schema", "http://www.w3.org/2004/02/skos/core" ; + dct:contributor "Daniel Doherty" ; dct:created "2024-05-31"@en ; dct:creator "Delaram Golpayegani"@en, "Harshvardhan J. Pandit"@en ; diff --git a/2.1-dev/ai/ai.csv b/2.1-dev/ai/ai.csv index 280511686..5c90a98a0 100644 --- a/2.1-dev/ai/ai.csv +++ b/2.1-dev/ai/ai.csv @@ -1,8 +1,24 @@ -term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace -AI,class,https://w3id.org/dpv/ai#AI,Artificial Intelligence (AI),"A technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives",,https://w3id.org/dpv#Technology,https://w3id.org/dpv#Technology,This concept is a stub,2024-04-28,,ai,https://w3id.org/dpv/ai -AISystem,class,https://w3id.org/dpv/ai#AISystem,AI System,"OECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives",,https://w3id.org/dpv/ai#AI,https://w3id.org/dpv/ai#AI,,2024-05-17,,ai,https://w3id.org/dpv/ai -Capability,class,https://w3id.org/dpv/ai#Capability,Capability,Capability or use of AI to achieve a technical goal or objective,,https://w3id.org/dpv/ai#AI,https://w3id.org/dpv/ai#AI,This concept is a stub,2024-04-28,,ai,https://w3id.org/dpv/ai -Measure,class,https://w3id.org/dpv/ai#Measure,Measure,Measure to address risk associated with AI Systems,,https://w3id.org/dpv#RiskMitigationMeasure,https://w3id.org/dpv#RiskMitigationMeasure,This concept is a stub,2024-04-28,,ai,https://w3id.org/dpv/ai -Model,class,https://w3id.org/dpv/ai#Model,Model,"Physical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data",,https://w3id.org/dpv/ai#AI,https://w3id.org/dpv/ai#AI,,2024-05-17,,ai,https://w3id.org/dpv/ai -Risk,class,https://w3id.org/dpv/ai#Risk,Risk,"Risk associated with development, use, or operation of AI systems",,https://w3id.org/dpv#Risk,https://w3id.org/dpv#Risk,This concept is a stub,2024-04-28,,ai,https://w3id.org/dpv/ai -Technique,class,https://w3id.org/dpv/ai#Technique,Technique,Techniques for using or applying AI,,https://w3id.org/dpv/ai#AI,https://w3id.org/dpv/ai#AI,This concept is a stub,2024-04-28,,ai,https://w3id.org/dpv/ai +term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace +AI,class,https://w3id.org/dpv/ai#AI,Artificial Intelligence (AI),"A technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives",,https://w3id.org/dpv#Technology,https://w3id.org/dpv#Technology,This concept is a stub,2024-04-28,,ai,https://w3id.org/dpv/ai +AIBias,class,https://w3id.org/dpv/ai#AIBias,AI Bias,"Bias associated with development, use, or other activities involving an AI technology or system",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#Bias,,2024-09-18,,ai,https://w3id.org/dpv/ai +AISystem,class,https://w3id.org/dpv/ai#AISystem,AI System,"OECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives",,https://w3id.org/dpv/ai#AI,https://w3id.org/dpv/ai#AI,,2024-05-17,,ai,https://w3id.org/dpv/ai +AlgorithmSelectionBias,class,https://w3id.org/dpv/ai#AlgorithmSelectionBias,Algorithm Selection Bias,Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#EngineeringDecisionBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +AutomationBias,class,https://w3id.org/dpv/ai#AutomationBias,Automation Bias,"Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +Capability,class,https://w3id.org/dpv/ai#Capability,Capability,Capability or use of AI to achieve a technical goal or objective,,https://w3id.org/dpv/ai#AI,https://w3id.org/dpv/ai#AI,This concept is a stub,2024-04-28,,ai,https://w3id.org/dpv/ai +DataAggregationBias,class,https://w3id.org/dpv/ai#DataAggregationBias,Data Aggregation Bias,Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#DataBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +DataBias,class,https://w3id.org/dpv/ai#DataBias,Data Bias,Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#AIBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +DataLabelsAndLabellingProcessBias,class,https://w3id.org/dpv/ai#DataLabelsAndLabellingProcessBias,Data Labels And Labelling Process Bias,Bias that occurs due to the labelling process itself introducing societal or cognitive biases,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#DataBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +DistributedTrainingBias,class,https://w3id.org/dpv/ai#DistributedTrainingBias,Distributed Training Bias,Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#DataBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +EngineeringDecisionBias,class,https://w3id.org/dpv/ai#EngineeringDecisionBias,Engineering Decision Bias,"Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#AIBias,Data bias and human cognitive bias can contribute to such bias,2024-09-13,,ai,https://w3id.org/dpv/ai +FeatureEngineeringBias,class,https://w3id.org/dpv/ai#FeatureEngineeringBias,Feature Engineering Bias,"Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#EngineeringDecisionBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +HyperparameterTuningBias,class,https://w3id.org/dpv/ai#HyperparameterTuningBias,Hyperparameter Tuning Bias,"Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#EngineeringDecisionBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +InformativenessBias,class,https://w3id.org/dpv/ai#InformativenessBias,Informativeness Bias,"Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#EngineeringDecisionBias,"This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data",2024-09-13,,ai,https://w3id.org/dpv/ai +Measure,class,https://w3id.org/dpv/ai#Measure,Measure,Measure to address risk associated with AI Systems,,https://w3id.org/dpv#RiskMitigationMeasure,https://w3id.org/dpv#RiskMitigationMeasure,This concept is a stub,2024-04-28,,ai,https://w3id.org/dpv/ai +MissingFeaturesAndLabelsBias,class,https://w3id.org/dpv/ai#MissingFeaturesAndLabelsBias,Missing Features And Labels Bias,Bias that occurs when features are missing from individual training samples,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#DataBias,If the frequency of missing features is higher for one group than another then this presents another vector for bias,2024-09-13,,ai,https://w3id.org/dpv/ai +Model,class,https://w3id.org/dpv/ai#Model,Model,"Physical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data",,https://w3id.org/dpv/ai#AI,https://w3id.org/dpv/ai#AI,,2024-05-17,,ai,https://w3id.org/dpv/ai +ModelBias,class,https://w3id.org/dpv/ai#ModelBias,Model Bias,"Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#EngineeringDecisionBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +ModelExpressivenessBias,class,https://w3id.org/dpv/ai#ModelExpressivenessBias,Model Expressiveness Bias,Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#ModelInteractionBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +ModelInteractionBias,class,https://w3id.org/dpv/ai#ModelInteractionBias,Model Interaction Bias,Bias that occurs from the structure of a model to create biased predictions,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#EngineeringDecisionBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +NonRepresentativeSamplingBias,class,https://w3id.org/dpv/ai#NonRepresentativeSamplingBias,Non-Representative Sampling Bias,"Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#DataBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +Risk,class,https://w3id.org/dpv/ai#Risk,Risk,"Risk associated with development, use, or operation of AI systems",,https://w3id.org/dpv#Risk,https://w3id.org/dpv#Risk,This concept is a stub,2024-04-28,,ai,https://w3id.org/dpv/ai +Technique,class,https://w3id.org/dpv/ai#Technique,Technique,Techniques for using or applying AI,,https://w3id.org/dpv/ai#AI,https://w3id.org/dpv/ai#AI,This concept is a stub,2024-04-28,,ai,https://w3id.org/dpv/ai diff --git a/2.1-dev/ai/ai.html b/2.1-dev/ai/ai.html index 6d84a24f4..9b96b2bd9 100644 --- a/2.1-dev/ai/ai.html +++ b/2.1-dev/ai/ai.html @@ -407,42 +407,1391 @@

Capabilities

Risks

See examples of Risks in VAIR.

-
+ +
+

Bias

+

Note: These are intended to represent bias concepts specific to AI development and use, and do not contain general bias concepts which exist in other contexts e.g. applicable for any technology. The Risk extension contains the general set of concepts that this vocabulary extends to represent biases that are specific to the development and use of AI.

+
    +
  • + ai:DataBias: Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups + go to full definition +
      +
    • + ai:DataAggregationBias: Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems + go to full definition + +
    • +
    • + ai:DataLabelsAndLabellingProcessBias: Bias that occurs due to the labelling process itself introducing societal or cognitive biases + go to full definition + +
    • +
    • + ai:DistributedTrainingBias: Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space + go to full definition + +
    • +
    • + ai:MissingFeaturesAndLabelsBias: Bias that occurs when features are missing from individual training samples + go to full definition + +
    • +
    • + ai:NonRepresentativeSamplingBias: Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative + go to full definition + +
    • +
    +
  • +
  • + ai:EngineeringDecisionBias: Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features + go to full definition +
      +
    • + ai:AlgorithmSelectionBias: Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model + go to full definition + +
    • +
    • + ai:FeatureEngineeringBias: Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model + go to full definition + +
    • +
    • + ai:HyperparameterTuningBias: Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model + go to full definition + +
    • +
    • + ai:InformativenessBias: Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data + go to full definition + +
    • +
    • + ai:ModelBias: Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution + go to full definition + +
    • +
    • + ai:ModelInteractionBias: Bias that occurs from the structure of a model to create biased predictions + go to full definition +
        +
      • + ai:ModelExpressivenessBias: Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups + go to full definition + +
      • +
      +
    • +
    +
  • +
+

Risk Measures

See examples of Risk Measures in VAIR.

-
-

Vocabulary Index

-
-

Classes

- +
+ + +
+

Vocabulary Index

+
+

Classes

+ + + + + + + + +
+

Artificial Intelligence (AI)

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAIPrefixai
LabelArtificial Intelligence (AI)
IRIhttps://w3id.org/dpv/ai#AI
Typerdfs:Class, skos:Concept
Broader/Parent types dpv:Technology +
Object of relation dpv:isImplementedUsingTechnology +
DefinitionA technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives
Usage NoteThis concept is a stub
Source
Date Created2024-04-28
See More: section CORE in AI +
+
+ + + +
+

AI Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAIBiasPrefixai
LabelAI Bias
IRIhttps://w3id.org/dpv/ai#AIBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:Bias +
DefinitionBias associated with development, use, or other activities involving an AI technology or system
Date Created2024-09-18
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + +
+

AI System

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAISystemPrefixai
LabelAI System
IRIhttps://w3id.org/dpv/ai#AISystem
Typerdfs:Class, skos:Concept
Broader/Parent types ai:AI + → dpv:Technology +
Object of relation dpv:isImplementedUsingTechnology +
DefinitionOECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives
SourceOECD, ISO/IEC 22989:2023
Date Created2024-05-17
See More: section CORE in AI +
+
+ + + +
+

Algorithm Selection Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAlgorithmSelectionBiasPrefixai
LabelAlgorithm Selection Bias
IRIhttps://w3id.org/dpv/ai#AlgorithmSelectionBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Automation Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAutomationBiasPrefixai
LabelAutomation Bias
IRIhttps://w3id.org/dpv/ai#AutomationBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:CognitiveBias +
DefinitionBias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + + +
+

Capability

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermCapabilityPrefixai
LabelCapability
IRIhttps://w3id.org/dpv/ai#Capability
Typerdfs:Class, skos:Concept
Broader/Parent types ai:AI + → dpv:Technology +
Object of relation dpv:isImplementedUsingTechnology +
DefinitionCapability or use of AI to achieve a technical goal or objective
Usage NoteThis concept is a stub
Date Created2024-04-28
See More: section CAPABILITIES in AI +
+
+ + + + +
+

Data Aggregation Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDataAggregationBiasPrefixai
LabelData Aggregation Bias
IRIhttps://w3id.org/dpv/ai#DataAggregationBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Data Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDataBiasPrefixai
LabelData Bias
IRIhttps://w3id.org/dpv/ai#DataBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Data Labels And Labelling Process Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDataLabelsAndLabellingProcessBiasPrefixai
LabelData Labels And Labelling Process Bias
IRIhttps://w3id.org/dpv/ai#DataLabelsAndLabellingProcessBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to the labelling process itself introducing societal or cognitive biases
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Distributed Training Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDistributedTrainingBiasPrefixai
LabelDistributed Training Bias
IRIhttps://w3id.org/dpv/ai#DistributedTrainingBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Engineering Decision Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermEngineeringDecisionBiasPrefixai
LabelEngineering Decision Bias
IRIhttps://w3id.org/dpv/ai#EngineeringDecisionBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features
Usage NoteData bias and human cognitive bias can contribute to such bias
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Feature Engineering Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFeatureEngineeringBiasPrefixai
LabelFeature Engineering Bias
IRIhttps://w3id.org/dpv/ai#FeatureEngineeringBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Hyperparameter Tuning Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHyperparameterTuningBiasPrefixai
LabelHyperparameter Tuning Bias
IRIhttps://w3id.org/dpv/ai#HyperparameterTuningBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Informativeness Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermInformativenessBiasPrefixai
LabelInformativeness Bias
IRIhttps://w3id.org/dpv/ai#InformativenessBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data
Usage NoteThis can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + +
+

Measure

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermMeasurePrefixai
LabelMeasure
IRIhttps://w3id.org/dpv/ai#Measure
Typerdfs:Class, skos:Concept
Broader/Parent types dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure +
DefinitionMeasure to address risk associated with AI Systems
Usage NoteThis concept is a stub
Date Created2024-04-28
See More: section MEASURES in AI +
+
+ + + + +
+

Missing Features And Labels Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermMissingFeaturesAndLabelsBiasPrefixai
LabelMissing Features And Labels Bias
IRIhttps://w3id.org/dpv/ai#MissingFeaturesAndLabelsBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs when features are missing from individual training samples
Usage NoteIf the frequency of missing features is higher for one group than another then this presents another vector for bias
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
- - - - -
-

Artificial Intelligence (AI)

+
+

Model

- + - + - + @@ -454,7 +1803,8 @@

Artificial Intelligence (AI)

- @@ -471,12 +1821,9 @@

Artificial Intelligence (AI)

- + - - - - + @@ -490,7 +1837,7 @@

Artificial Intelligence (AI)

- + @@ -506,44 +1853,42 @@

Artificial Intelligence (AI)

-
-

AI System

+ +
+

Model Bias

TermAIModel Prefix ai
LabelArtificial Intelligence (AI)Model
IRIhttps://w3id.org/dpv/ai#AIhttps://w3id.org/dpv/ai#Model
Broader/Parent types dpv:Technology + ai:AI + → dpv:Technology
DefinitionA technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectivesPhysical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data
Usage NoteThis concept is a stub
Date Created2024-04-282024-05-17
- + - + - + - + - - - - - + @@ -552,7 +1897,7 @@

AI System

- + @@ -561,68 +1906,69 @@

AI System

- + - + - + + + + -
TermAISystemModelBias Prefix ai
LabelAI SystemModel Bias
IRIhttps://w3id.org/dpv/ai#AISystemhttps://w3id.org/dpv/ai#ModelBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AI - → dpv:Technology + ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias
Object of relation dpv:isImplementedUsingTechnology -
DefinitionOECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectivesBias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution
SourceOECD, ISO/IEC 22989:2023
Date Created2024-05-172024-09-13
ContributorsDaniel Doherty
See More: section CORE in AI + section BIAS in AI
- -
-

Capability

+ +
+

Model Expressiveness Bias

- + - + - + - + - - - - - + @@ -631,78 +1977,77 @@

Capability

- + - - - - + - + + + + - + - + + + + -
TermCapabilityModelExpressivenessBias Prefix ai
LabelCapabilityModel Expressiveness Bias
IRIhttps://w3id.org/dpv/ai#Capabilityhttps://w3id.org/dpv/ai#ModelExpressivenessBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AI - → dpv:Technology + ai:ModelInteractionBias + → ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias
Object of relation dpv:isImplementedUsingTechnology -
DefinitionCapability or use of AI to achieve a technical goal or objectiveBias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups
Usage NoteThis concept is a stub
Source
Date Created2024-04-282024-09-13
ContributorsDaniel Doherty
See More: section CAPABILITIES in AI + section BIAS in AI
- -
-

Measure

+ +
+

Model Interaction Bias

- + - + - + - + - - - - - + @@ -711,77 +2056,77 @@

Measure

- + - - - - + - + + + + - + - + + + + -
TermMeasureModelInteractionBias Prefix ai
LabelMeasureModel Interaction Bias
IRIhttps://w3id.org/dpv/ai#Measurehttps://w3id.org/dpv/ai#ModelInteractionBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure -
DefinitionMeasure to address risk associated with AI SystemsBias that occurs from the structure of a model to create biased predictions
Usage NoteThis concept is a stub
Source
Date Created2024-04-282024-09-13
ContributorsDaniel Doherty
See More: section MEASURES in AI + section BIAS in AI
- -
-

Model

+ +
+

Non-Representative Sampling Bias

- + - + - + - + - - - - - + @@ -790,7 +2135,7 @@

Model

- + @@ -806,15 +2151,18 @@

Model

- + - + + + + - @@ -999,13 +2347,62 @@

Properties

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -1041,14 +2438,63 @@

External

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -1070,7 +2516,7 @@

External

Contributors

The following people have contributed to this vocabulary. The names are ordered alphabetically. The affiliations are informative do not represent formal endorsements. Affiliations may be outdated. The list is generated automatically from the contributors listed for defined concepts.

    -
  • ()
  • +
  • Daniel Doherty ()
diff --git a/2.1-dev/ai/ai.jsonld b/2.1-dev/ai/ai.jsonld index 5528e021d..24745afef 100644 --- a/2.1-dev/ai/ai.jsonld +++ b/2.1-dev/ai/ai.jsonld @@ -1,26 +1,57 @@ [ { - "@id": "https://w3id.org/dpv/ai#measures-classes", + "@id": "https://w3id.org/dpv/ai#serialisation-jsonld", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/json-ld11/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } ] }, { - "@id": "https://w3id.org/dpv/ai#AI", + "@id": "https://w3id.org/dpv/ai#InformativenessBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-28" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { "@language": "en", - "@value": "ISO/IEC 22989:2022" + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -28,11 +59,6 @@ "@id": "https://w3id.org/dpv/ai#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#Technology" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -41,37 +67,83 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Technology" + "@id": "https://w3id.org/dpv/ai#EngineeringDecisionBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives" + "@value": "Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/ai#core-classes" + "@id": "https://w3id.org/dpv/ai#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Artificial Intelligence (AI)" + "@value": "Informativeness Bias" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept is a stub" + "@value": "This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data" } ] }, { - "@id": "https://w3id.org/dpv/ai#techniques-classes", + "@id": "https://w3id.org/dpv/ai#AIBias", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-18" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias associated with development, use, or other activities involving an AI technology or system" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "AI Bias" + } ] }, { @@ -106,27 +178,27 @@ ] }, { - "@id": "https://w3id.org/dpv/ai#risks-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/ai#Model", + "@id": "https://w3id.org/dpv/ai#AutomationBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-17" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { "@language": "en", - "@value": "ISO/IEC 22989:2022" + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -134,11 +206,6 @@ "@id": "https://w3id.org/dpv/ai#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/ai#AI" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -147,97 +214,149 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/ai#AI" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Physical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data" + "@value": "Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/ai#core-classes" + "@id": "https://w3id.org/dpv/ai#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Model" + "@value": "Automation Bias" } ] }, { - "@id": "https://w3id.org/dpv/ai#capabilities-classes", + "@id": "https://w3id.org/dpv/ai#DataBias", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#AIBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Bias" + } ] }, { - "@id": "https://w3id.org/dpv/ai#serialisation-n3", + "@id": "https://w3id.org/dpv/guides", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "AI Technology Concepts - N3 serialiation" + "@value": "Guides for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/ai/ai.n3" + "@id": "https://w3id.org/dpv/guides" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/ai#serialisation-rdf", + "@id": "https://w3id.org/dpv/primer", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], "http://purl.org/dc/terms/conformsTo": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@id": "https://www.w3.org/TR/html/" } ], "http://purl.org/dc/terms/format": [ { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], "http://purl.org/dc/terms/title": [ { - "@value": "AI Technology Concepts - RDF/XML serialiation" + "@value": "Primer for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/ai/ai.rdf" + "@id": "https://w3id.org/dpv/primer" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/ai#Measure", + "@id": "https://w3id.org/dpv/ai#Model", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -245,7 +364,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-28" + "@value": "2024-05-17" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 22989:2022" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -255,7 +380,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/ai#AI" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -266,84 +391,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/ai#AI" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Measure to address risk associated with AI Systems" + "@value": "Physical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/ai#measures-classes" + "@id": "https://w3id.org/dpv/ai#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Measure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept is a stub" + "@value": "Model" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/ai#MissingFeaturesAndLabelsBias", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Guides for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/guides" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Daniel Doherty" } - ] - }, - { - "@id": "https://w3id.org/dpv/ai#Risk", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-28" + "@value": "2024-09-13" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/ai#" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/ai#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -354,256 +449,255 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/ai#DataBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk associated with development, use, or operation of AI systems" + "@value": "Bias that occurs when features are missing from individual training samples" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/ai#risks-classes" + "@id": "https://w3id.org/dpv/ai#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk" + "@value": "Missing Features And Labels Bias" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept is a stub" + "@value": "If the frequency of missing features is higher for one group than another then this presents another vector for bias" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "https://w3id.org/dpv/ai", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/bibliographicCitation": [ { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Primer for Data Privacy Vocabulary" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, { - "@id": "https://w3id.org/dpv/primer" + "@value": "http://www.w3.org/2004/02/skos/core" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "Daniel Doherty" } - ] - }, - { - "@id": "https://w3id.org/dpv/ai#core-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/ai#AISystem", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-17" + "@language": "en", + "@value": "2024-05-31" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/creator": [ { - "@id": "_:N1632bd64f299417b96be51a9cb14caf6" + "@language": "en", + "@value": "Delaram Golpayegani" }, { - "@id": "_:Nfd8436350d0d4847adc534a199648489" + "@language": "en", + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/description": [ { - "@id": "https://w3id.org/dpv/ai#" + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about AI technologies" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/identifier": [ { - "@id": "https://w3id.org/dpv/ai#AI" + "@value": "https://w3id.org/dpv/ai" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/issued": [ { "@language": "en", - "@value": "accepted" + "@value": "2024-05-31" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/license": [ { - "@id": "https://w3id.org/dpv/ai#AI" + "@id": "https://www.w3.org/copyright/document-license-2023/" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/publisher": [ { - "@language": "en", - "@value": "OECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives" + "@id": "https://www.w3.org/" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/ai#core-classes" + "@id": "https://www.w3.org/groups/cg/dpvcg/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/title": [ { "@language": "en", - "@value": "AI System" + "@value": "AI Technology Concepts" } - ] - }, - { - "@id": "_:N1632bd64f299417b96be51a9cb14caf6", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://purl.org/ontology/bibo/doi": [ { - "@value": "OECD" + "@value": "10.5281/zenodo.12505841" } ], - "https://schema.org/url": [ + "http://purl.org/ontology/bibo/status": [ { - "@value": "https://oecd.ai/en/wonk/ai-system-definition-update" + "@value": "http://purl.org/ontology/bibo/status/draft" } - ] - }, - { - "@id": "_:Nfd8436350d0d4847adc534a199648489", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ { - "@value": "ISO/IEC 22989:2023" + "@value": "ai" } ], - "https://schema.org/url": [ + "http://purl.org/vocab/vann/preferredNamespaceUri": [ { - "@value": "https://www.iso.org/standard/74296.html" + "@value": "https://w3id.org/dpv/ai#" } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2000/01/rdf-schema#Label": [ { - "@id": "https://www.w3.org/TR/html/" + "@language": "en", + "@value": "AI" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2002/07/owl#versionIRI": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "https://w3id.org/dpv/2.1-dev/ai" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2002/07/owl#versionInfo": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@value": "2.1-dev" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, { "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-jsonld" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/ns/dx/prof/isProfileOf": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv/tech" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/ai#serialisation-jsonld", + "@id": "https://w3id.org/dpv/ai#ModelInteractionBias", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@value": "Daniel Doherty" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/created": [ { - "@value": "AI Technology Concepts - JSON-LD serialiation" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/ai/ai.jsonld" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv/ai#" } - ] - }, - { - "@id": "https://w3id.org/dpv/ai#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://www.w3.org/TR/turtle/" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" + "@id": "https://w3id.org/dpv/ai#EngineeringDecisionBias" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "AI Technology Concepts - Turtle serialiation" + "@language": "en", + "@value": "Bias that occurs from the structure of a model to create biased predictions" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/ai/ai.ttl" + "@id": "https://w3id.org/dpv/ai#bias-classes" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "Model Interaction Bias" } ] }, { - "@id": "https://w3id.org/dpv/ai#Technique", + "@id": "https://w3id.org/dpv/ai#Measure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -621,7 +715,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/ai#AI" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -632,24 +726,24 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/ai#AI" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Techniques for using or applying AI" + "@value": "Measure to address risk associated with AI Systems" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/ai#techniques-classes" + "@id": "https://w3id.org/dpv/ai#measures-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Technique" + "@value": "Measure" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -660,25 +754,32 @@ ] }, { - "@id": "https://w3id.org/dpv/ai#Capability", + "@id": "https://w3id.org/dpv/ai#ModelExpressivenessBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-28" + "@value": "2024-09-13" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/ai#" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/ai#AI" + "@id": "https://w3id.org/dpv/ai#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -689,187 +790,1037 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/ai#AI" + "@id": "https://w3id.org/dpv/ai#ModelInteractionBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Capability or use of AI to achieve a technical goal or objective" + "@value": "Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/ai#capabilities-classes" + "@id": "https://w3id.org/dpv/ai#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Capability" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept is a stub" + "@value": "Model Expressiveness Bias" } ] }, { - "@id": "https://w3id.org/dpv/ai", + "@id": "https://w3id.org/dpv/examples", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@id": "https://www.w3.org/TR/html/" } ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/format": [ { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#bias-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/ai#NonRepresentativeSamplingBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Non-Representative Sampling Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#measures-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/ai#AISystem", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-17" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N4fb5233f538748f9ad16f2cd7f523c53" + }, + { + "@id": "_:Nde027296bf9847a1a9416ddf7bc664ea" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai#AI" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#AI" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "OECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#core-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "AI System" + } + ] + }, + { + "@id": "_:N4fb5233f538748f9ad16f2cd7f523c53", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "OECD" + } + ], + "https://schema.org/url": [ + { + "@value": "https://oecd.ai/en/wonk/ai-system-definition-update" + } + ] + }, + { + "@id": "_:Nde027296bf9847a1a9416ddf7bc664ea", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 22989:2023" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/74296.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#Technique", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-28" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai#AI" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#AI" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Techniques for using or applying AI" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#techniques-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Technique" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept is a stub" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#HyperparameterTuningBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Hyperparameter Tuning Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#FeatureEngineeringBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Feature Engineering Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#DataAggregationBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Aggregation Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#capabilities-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/ai#risks-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/ai#AlgorithmSelectionBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Algorithm Selection Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#EngineeringDecisionBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#AIBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Engineering Decision Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Data bias and human cognitive bias can contribute to such bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#Risk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-28" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#Risk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risk associated with development, use, or operation of AI systems" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#risks-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept is a stub" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#AI", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-28" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 22989:2022" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#Technology" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#Technology" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#core-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Artificial Intelligence (AI)" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "http://www.w3.org/2004/02/skos/core" + "@language": "en", + "@value": "This concept is a stub" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#techniques-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/ai#core-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/ai#DistributedTrainingBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "2024-05-31" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/creator": [ + "http://purl.org/dc/terms/source": [ { "@language": "en", - "@value": "Delaram Golpayegani" - }, + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Harshvardhan J. Pandit" + "@value": "accepted" } ], - "http://purl.org/dc/terms/description": [ + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about AI technologies" + "@value": "Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space" } ], - "http://purl.org/dc/terms/identifier": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "https://w3id.org/dpv/ai" + "@id": "https://w3id.org/dpv/ai#bias-classes" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "2024-05-31" + "@value": "Distributed Training Bias" } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#DataLabelsAndLabellingProcessBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" ], - "http://purl.org/dc/terms/license": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@value": "Daniel Doherty" } ], - "http://purl.org/dc/terms/publisher": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "AI Technology Concepts" + "@value": "accepted" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "https://w3id.org/dpv/ai#DataBias" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "http://purl.org/ontology/bibo/status/draft" + "@language": "en", + "@value": "Bias that occurs due to the labelling process itself introducing societal or cognitive biases" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "ai" + "@id": "https://w3id.org/dpv/ai#bias-classes" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://w3id.org/dpv/ai#" + "@language": "en", + "@value": "Data Labels And Labelling Process Bias" } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#ModelBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ { "@language": "en", - "@value": "AI" + "@value": "ISO/IEC 24027:2021" } ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/2.1-dev/ai" + "@id": "https://w3id.org/dpv/ai#" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/primer" - }, + "@id": "https://w3id.org/dpv/ai#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/guides" - }, + "@language": "en", + "@value": "Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/examples" - }, + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/ai#serialisation-html" - }, + "@language": "en", + "@value": "Model Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/ai#serialisation-rdf" - }, + "@id": "https://www.w3.org/TeamSubmission/n3/" + } + ], + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/ai#serialisation-ttl" - }, + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/ai#serialisation-n3" - }, + "@value": "AI Technology Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/ai#serialisation-jsonld" + "@id": "https://w3id.org/dpv/ai/ai.n3" } ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#Capability", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-28" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/tech" + "@id": "https://w3id.org/dpv/ai#" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@id": "https://w3id.org/dpv/ai#AI" } ], - "https://schema.org/version": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#AI" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Capability or use of AI to achieve a technical goal or objective" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#capabilities-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Capability" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept is a stub" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/turtle/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] } diff --git a/2.1-dev/ai/ai.n3 b/2.1-dev/ai/ai.n3 index f80252e4b..21f34d685 100644 --- a/2.1-dev/ai/ai.n3 +++ b/2.1-dev/ai/ai.n3 @@ -7,6 +7,7 @@ @prefix profile: . @prefix rdf: . @prefix rdfs: . +@prefix risk: . @prefix role: . @prefix schema: . @prefix skos: . @@ -27,6 +28,18 @@ ai:AI a rdfs:Class, skos:prefLabel "Artificial Intelligence (AI)"@en ; skos:scopeNote "This concept is a stub"@en . +ai:AIBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-18"^^xsd:date ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias associated with development, use, or other activities involving an AI technology or system"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "AI Bias"@en . + ai:AISystem a rdfs:Class, skos:Concept ; dct:created "2024-05-17"^^xsd:date ; @@ -44,6 +57,32 @@ ai:AISystem a rdfs:Class, skos:inScheme ai:core-classes ; skos:prefLabel "AI System"@en . +ai:AlgorithmSelectionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Algorithm Selection Bias"@en . + +ai:AutomationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Automation Bias"@en . + ai:Capability a rdfs:Class, skos:Concept ; dct:created "2024-04-28"^^xsd:date ; @@ -56,6 +95,112 @@ ai:Capability a rdfs:Class, skos:prefLabel "Capability"@en ; skos:scopeNote "This concept is a stub"@en . +ai:DataAggregationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Data Aggregation Bias"@en . + +ai:DataBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:AIBias ; + skos:definition "Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Data Bias"@en . + +ai:DataLabelsAndLabellingProcessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs due to the labelling process itself introducing societal or cognitive biases"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Data Labels And Labelling Process Bias"@en . + +ai:DistributedTrainingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Distributed Training Bias"@en . + +ai:EngineeringDecisionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:AIBias ; + skos:definition "Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Engineering Decision Bias"@en ; + skos:scopeNote "Data bias and human cognitive bias can contribute to such bias"@en . + +ai:FeatureEngineeringBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Feature Engineering Bias"@en . + +ai:HyperparameterTuningBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Hyperparameter Tuning Bias"@en . + +ai:InformativenessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Informativeness Bias"@en ; + skos:scopeNote "This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en . + ai:Measure a rdfs:Class, skos:Concept ; dct:created "2024-04-28"^^xsd:date ; @@ -68,6 +213,20 @@ ai:Measure a rdfs:Class, skos:prefLabel "Measure"@en ; skos:scopeNote "This concept is a stub"@en . +ai:MissingFeaturesAndLabelsBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs when features are missing from individual training samples"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Missing Features And Labels Bias"@en ; + skos:scopeNote "If the frequency of missing features is higher for one group than another then this presents another vector for bias"@en . + ai:Model a rdfs:Class, skos:Concept ; dct:created "2024-05-17"^^xsd:date ; @@ -80,6 +239,58 @@ ai:Model a rdfs:Class, skos:inScheme ai:core-classes ; skos:prefLabel "Model"@en . +ai:ModelBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Model Bias"@en . + +ai:ModelExpressivenessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:ModelInteractionBias ; + skos:definition "Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Model Expressiveness Bias"@en . + +ai:ModelInteractionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from the structure of a model to create biased predictions"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Model Interaction Bias"@en . + +ai:NonRepresentativeSamplingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Non-Representative Sampling Bias"@en . + ai:Risk a rdfs:Class, skos:Concept ; dct:created "2024-04-28"^^xsd:date ; @@ -109,6 +320,7 @@ ai:Technique a rdfs:Class, dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; dct:conformsTo "http://www.w3.org/2000/01/rdf-schema", "http://www.w3.org/2004/02/skos/core" ; + dct:contributor "Daniel Doherty" ; dct:created "2024-05-31"@en ; dct:creator "Delaram Golpayegani"@en, "Harshvardhan J. Pandit"@en ; @@ -206,3 +418,5 @@ ai:techniques-classes a skos:ConceptScheme . ai:core-classes a skos:ConceptScheme . +ai:bias-classes a skos:ConceptScheme . + diff --git a/2.1-dev/ai/ai.rdf b/2.1-dev/ai/ai.rdf index 5a1965230..e7ac04100 100644 --- a/2.1-dev/ai/ai.rdf +++ b/2.1-dev/ai/ai.rdf @@ -12,6 +12,41 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > + + + + + Data Bias + Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + + + AI Technology Concepts - Turtle serialiation + + + + + Model + Physical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data + + + ISO/IEC 22989:2022 + 2024-05-17 + accepted + + + @@ -34,6 +69,7 @@ Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + Daniel Doherty ai https://w3id.org/dpv/ai# @@ -49,18 +85,86 @@ - + + + + + + + AI Technology Concepts - HTML serialiation + + - Capability - Capability or use of AI to achieve a technical goal or objective - - - This concept is a stub - 2024-04-28 + + Automation Bias + Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty - + + + + + + + Non-Representative Sampling Bias + Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Hyperparameter Tuning Bias + Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + + + AI Technology Concepts - N3 serialiation + + + + + + + + AI Technology Concepts - JSON-LD serialiation + + + + + + Missing Features And Labels Bias + Bias that occurs when features are missing from individual training samples + + If the frequency of missing features is higher for one group than another then this presents another vector for bias + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + @@ -75,34 +179,88 @@ - - - - - - - AI Technology Concepts - HTML serialiation + + + + + Distributed Training Bias + Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + - + - Measure - Measure to address risk associated with AI Systems - - + + Algorithm Selection Bias + Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Feature Engineering Bias + Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + Capability + Capability or use of AI to achieve a technical goal or objective + + This concept is a stub 2024-04-28 accepted - + - - - - - Primer for Data Privacy Vocabulary - - + + + + + Data Aggregation Bias + Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + Artificial Intelligence (AI) + A technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives + + + This concept is a stub + ISO/IEC 22989:2022 + 2024-04-28 + accepted + + @@ -111,13 +269,32 @@ OECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives - - + + 2024-05-17 accepted + + + + + Model Interaction Bias + Bias that occurs from the structure of a model to create biased predictions + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + OECD + https://oecd.ai/en/wonk/ai-system-definition-update + @@ -131,55 +308,114 @@ - + - - - - AI Technology Concepts - Turtle serialiation + + + + AI Technology Concepts - RDF/XML serialiation - - - - - Examples for Data Privacy Vocabulary - - + + + + + Model Bias + Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + - - - ISO/IEC 22989:2023 - https://www.iso.org/standard/74296.html + + + + + Model Expressiveness Bias + Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + - - - - - - - AI Technology Concepts - JSON-LD serialiation + + + + Measure + Measure to address risk associated with AI Systems + + + This concept is a stub + 2024-04-28 + accepted + + - + - Model - Physical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data - - - ISO/IEC 22989:2022 - 2024-05-17 + + Data Labels And Labelling Process Bias + Bias that occurs due to the labelling process itself introducing societal or cognitive biases + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty - + - - - - - - - AI Technology Concepts - N3 serialiation + + + + + + + + Informativeness Bias + Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data + + This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Engineering Decision Bias + Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features + + Data bias and human cognitive bias can contribute to such bias + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + AI Bias + Bias associated with development, use, or other activities involving an AI technology or system + + 2024-09-18 + accepted + Daniel Doherty + + @@ -189,46 +425,40 @@ - - + + + + + Primer for Data Privacy Vocabulary + + - - - - Artificial Intelligence (AI) - A technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives - - - This concept is a stub - ISO/IEC 22989:2022 - 2024-04-28 - accepted - - + + + + + Examples for Data Privacy Vocabulary + + - - - - - - - AI Technology Concepts - RDF/XML serialiation - - + - OECD - https://oecd.ai/en/wonk/ai-system-definition-update + ISO/IEC 22989:2023 + https://www.iso.org/standard/74296.html + + + - + diff --git a/2.1-dev/ai/ai.ttl b/2.1-dev/ai/ai.ttl index f80252e4b..21f34d685 100644 --- a/2.1-dev/ai/ai.ttl +++ b/2.1-dev/ai/ai.ttl @@ -7,6 +7,7 @@ @prefix profile: . @prefix rdf: . @prefix rdfs: . +@prefix risk: . @prefix role: . @prefix schema: . @prefix skos: . @@ -27,6 +28,18 @@ ai:AI a rdfs:Class, skos:prefLabel "Artificial Intelligence (AI)"@en ; skos:scopeNote "This concept is a stub"@en . +ai:AIBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-18"^^xsd:date ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias associated with development, use, or other activities involving an AI technology or system"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "AI Bias"@en . + ai:AISystem a rdfs:Class, skos:Concept ; dct:created "2024-05-17"^^xsd:date ; @@ -44,6 +57,32 @@ ai:AISystem a rdfs:Class, skos:inScheme ai:core-classes ; skos:prefLabel "AI System"@en . +ai:AlgorithmSelectionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Algorithm Selection Bias"@en . + +ai:AutomationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Automation Bias"@en . + ai:Capability a rdfs:Class, skos:Concept ; dct:created "2024-04-28"^^xsd:date ; @@ -56,6 +95,112 @@ ai:Capability a rdfs:Class, skos:prefLabel "Capability"@en ; skos:scopeNote "This concept is a stub"@en . +ai:DataAggregationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Data Aggregation Bias"@en . + +ai:DataBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:AIBias ; + skos:definition "Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Data Bias"@en . + +ai:DataLabelsAndLabellingProcessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs due to the labelling process itself introducing societal or cognitive biases"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Data Labels And Labelling Process Bias"@en . + +ai:DistributedTrainingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Distributed Training Bias"@en . + +ai:EngineeringDecisionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:AIBias ; + skos:definition "Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Engineering Decision Bias"@en ; + skos:scopeNote "Data bias and human cognitive bias can contribute to such bias"@en . + +ai:FeatureEngineeringBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Feature Engineering Bias"@en . + +ai:HyperparameterTuningBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Hyperparameter Tuning Bias"@en . + +ai:InformativenessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Informativeness Bias"@en ; + skos:scopeNote "This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en . + ai:Measure a rdfs:Class, skos:Concept ; dct:created "2024-04-28"^^xsd:date ; @@ -68,6 +213,20 @@ ai:Measure a rdfs:Class, skos:prefLabel "Measure"@en ; skos:scopeNote "This concept is a stub"@en . +ai:MissingFeaturesAndLabelsBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs when features are missing from individual training samples"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Missing Features And Labels Bias"@en ; + skos:scopeNote "If the frequency of missing features is higher for one group than another then this presents another vector for bias"@en . + ai:Model a rdfs:Class, skos:Concept ; dct:created "2024-05-17"^^xsd:date ; @@ -80,6 +239,58 @@ ai:Model a rdfs:Class, skos:inScheme ai:core-classes ; skos:prefLabel "Model"@en . +ai:ModelBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Model Bias"@en . + +ai:ModelExpressivenessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:ModelInteractionBias ; + skos:definition "Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Model Expressiveness Bias"@en . + +ai:ModelInteractionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from the structure of a model to create biased predictions"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Model Interaction Bias"@en . + +ai:NonRepresentativeSamplingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Non-Representative Sampling Bias"@en . + ai:Risk a rdfs:Class, skos:Concept ; dct:created "2024-04-28"^^xsd:date ; @@ -109,6 +320,7 @@ ai:Technique a rdfs:Class, dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; dct:conformsTo "http://www.w3.org/2000/01/rdf-schema", "http://www.w3.org/2004/02/skos/core" ; + dct:contributor "Daniel Doherty" ; dct:created "2024-05-31"@en ; dct:creator "Delaram Golpayegani"@en, "Harshvardhan J. Pandit"@en ; @@ -206,3 +418,5 @@ ai:techniques-classes a skos:ConceptScheme . ai:core-classes a skos:ConceptScheme . +ai:bias-classes a skos:ConceptScheme . + diff --git a/2.1-dev/ai/index-en.html b/2.1-dev/ai/index-en.html index 6d84a24f4..9b96b2bd9 100644 --- a/2.1-dev/ai/index-en.html +++ b/2.1-dev/ai/index-en.html @@ -407,42 +407,1391 @@

Capabilities

Risks

See examples of Risks in VAIR.

-
+ +
+

Bias

+

Note: These are intended to represent bias concepts specific to AI development and use, and do not contain general bias concepts which exist in other contexts e.g. applicable for any technology. The Risk extension contains the general set of concepts that this vocabulary extends to represent biases that are specific to the development and use of AI.

+
    +
  • + ai:DataBias: Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups + go to full definition +
      +
    • + ai:DataAggregationBias: Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems + go to full definition + +
    • +
    • + ai:DataLabelsAndLabellingProcessBias: Bias that occurs due to the labelling process itself introducing societal or cognitive biases + go to full definition + +
    • +
    • + ai:DistributedTrainingBias: Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space + go to full definition + +
    • +
    • + ai:MissingFeaturesAndLabelsBias: Bias that occurs when features are missing from individual training samples + go to full definition + +
    • +
    • + ai:NonRepresentativeSamplingBias: Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative + go to full definition + +
    • +
    +
  • +
  • + ai:EngineeringDecisionBias: Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features + go to full definition +
      +
    • + ai:AlgorithmSelectionBias: Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model + go to full definition + +
    • +
    • + ai:FeatureEngineeringBias: Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model + go to full definition + +
    • +
    • + ai:HyperparameterTuningBias: Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model + go to full definition + +
    • +
    • + ai:InformativenessBias: Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data + go to full definition + +
    • +
    • + ai:ModelBias: Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution + go to full definition + +
    • +
    • + ai:ModelInteractionBias: Bias that occurs from the structure of a model to create biased predictions + go to full definition +
        +
      • + ai:ModelExpressivenessBias: Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups + go to full definition + +
      • +
      +
    • +
    +
  • +
+

Risk Measures

See examples of Risk Measures in VAIR.

-
-

Vocabulary Index

-
-

Classes

- +
+ + +
+

Vocabulary Index

+
+

Classes

+ + + + + + + + +
+

Artificial Intelligence (AI)

+
TermModelNonRepresentativeSamplingBias Prefix ai
LabelModelNon-Representative Sampling Bias
IRIhttps://w3id.org/dpv/ai#Modelhttps://w3id.org/dpv/ai#NonRepresentativeSamplingBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AI - → dpv:Technology + ai:DataBias + → ai:AIBias + → risk:Bias
Object of relation dpv:isImplementedUsingTechnology -
DefinitionPhysical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or dataBias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative
Date Created2024-05-172024-09-13
ContributorsDaniel Doherty
See More: section CORE in AI + section BIAS in AI
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAIPrefixai
LabelArtificial Intelligence (AI)
IRIhttps://w3id.org/dpv/ai#AI
Typerdfs:Class, skos:Concept
Broader/Parent types dpv:Technology +
Object of relation dpv:isImplementedUsingTechnology +
DefinitionA technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives
Usage NoteThis concept is a stub
Source
Date Created2024-04-28
See More: section CORE in AI +
+
+ + + +
+

AI Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAIBiasPrefixai
LabelAI Bias
IRIhttps://w3id.org/dpv/ai#AIBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:Bias +
DefinitionBias associated with development, use, or other activities involving an AI technology or system
Date Created2024-09-18
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + +
+

AI System

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAISystemPrefixai
LabelAI System
IRIhttps://w3id.org/dpv/ai#AISystem
Typerdfs:Class, skos:Concept
Broader/Parent types ai:AI + → dpv:Technology +
Object of relation dpv:isImplementedUsingTechnology +
DefinitionOECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives
SourceOECD, ISO/IEC 22989:2023
Date Created2024-05-17
See More: section CORE in AI +
+
+ + + +
+

Algorithm Selection Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAlgorithmSelectionBiasPrefixai
LabelAlgorithm Selection Bias
IRIhttps://w3id.org/dpv/ai#AlgorithmSelectionBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Automation Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAutomationBiasPrefixai
LabelAutomation Bias
IRIhttps://w3id.org/dpv/ai#AutomationBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:CognitiveBias +
DefinitionBias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + + +
+

Capability

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermCapabilityPrefixai
LabelCapability
IRIhttps://w3id.org/dpv/ai#Capability
Typerdfs:Class, skos:Concept
Broader/Parent types ai:AI + → dpv:Technology +
Object of relation dpv:isImplementedUsingTechnology +
DefinitionCapability or use of AI to achieve a technical goal or objective
Usage NoteThis concept is a stub
Date Created2024-04-28
See More: section CAPABILITIES in AI +
+
+ + + + +
+

Data Aggregation Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDataAggregationBiasPrefixai
LabelData Aggregation Bias
IRIhttps://w3id.org/dpv/ai#DataAggregationBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Data Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDataBiasPrefixai
LabelData Bias
IRIhttps://w3id.org/dpv/ai#DataBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Data Labels And Labelling Process Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDataLabelsAndLabellingProcessBiasPrefixai
LabelData Labels And Labelling Process Bias
IRIhttps://w3id.org/dpv/ai#DataLabelsAndLabellingProcessBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to the labelling process itself introducing societal or cognitive biases
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Distributed Training Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDistributedTrainingBiasPrefixai
LabelDistributed Training Bias
IRIhttps://w3id.org/dpv/ai#DistributedTrainingBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Engineering Decision Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermEngineeringDecisionBiasPrefixai
LabelEngineering Decision Bias
IRIhttps://w3id.org/dpv/ai#EngineeringDecisionBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features
Usage NoteData bias and human cognitive bias can contribute to such bias
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Feature Engineering Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFeatureEngineeringBiasPrefixai
LabelFeature Engineering Bias
IRIhttps://w3id.org/dpv/ai#FeatureEngineeringBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Hyperparameter Tuning Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHyperparameterTuningBiasPrefixai
LabelHyperparameter Tuning Bias
IRIhttps://w3id.org/dpv/ai#HyperparameterTuningBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Informativeness Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermInformativenessBiasPrefixai
LabelInformativeness Bias
IRIhttps://w3id.org/dpv/ai#InformativenessBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data
Usage NoteThis can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + +
+

Measure

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermMeasurePrefixai
LabelMeasure
IRIhttps://w3id.org/dpv/ai#Measure
Typerdfs:Class, skos:Concept
Broader/Parent types dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure +
DefinitionMeasure to address risk associated with AI Systems
Usage NoteThis concept is a stub
Date Created2024-04-28
See More: section MEASURES in AI +
+
+ + + + +
+

Missing Features And Labels Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermMissingFeaturesAndLabelsBiasPrefixai
LabelMissing Features And Labels Bias
IRIhttps://w3id.org/dpv/ai#MissingFeaturesAndLabelsBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs when features are missing from individual training samples
Usage NoteIf the frequency of missing features is higher for one group than another then this presents another vector for bias
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
- - - - -
-

Artificial Intelligence (AI)

+
+

Model

- + - + - + @@ -454,7 +1803,8 @@

Artificial Intelligence (AI)

- @@ -471,12 +1821,9 @@

Artificial Intelligence (AI)

- + - - - - + @@ -490,7 +1837,7 @@

Artificial Intelligence (AI)

- + @@ -506,44 +1853,42 @@

Artificial Intelligence (AI)

-
-

AI System

+ +
+

Model Bias

TermAIModel Prefix ai
LabelArtificial Intelligence (AI)Model
IRIhttps://w3id.org/dpv/ai#AIhttps://w3id.org/dpv/ai#Model
Broader/Parent types dpv:Technology + ai:AI + → dpv:Technology
DefinitionA technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectivesPhysical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data
Usage NoteThis concept is a stub
Date Created2024-04-282024-05-17
- + - + - + - + - - - - - + @@ -552,7 +1897,7 @@

AI System

- + @@ -561,68 +1906,69 @@

AI System

- + - + - + + + + -
TermAISystemModelBias Prefix ai
LabelAI SystemModel Bias
IRIhttps://w3id.org/dpv/ai#AISystemhttps://w3id.org/dpv/ai#ModelBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AI - → dpv:Technology + ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias
Object of relation dpv:isImplementedUsingTechnology -
DefinitionOECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectivesBias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution
SourceOECD, ISO/IEC 22989:2023
Date Created2024-05-172024-09-13
ContributorsDaniel Doherty
See More: section CORE in AI + section BIAS in AI
- -
-

Capability

+ +
+

Model Expressiveness Bias

- + - + - + - + - - - - - + @@ -631,78 +1977,77 @@

Capability

- + - - - - + - + + + + - + - + + + + -
TermCapabilityModelExpressivenessBias Prefix ai
LabelCapabilityModel Expressiveness Bias
IRIhttps://w3id.org/dpv/ai#Capabilityhttps://w3id.org/dpv/ai#ModelExpressivenessBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AI - → dpv:Technology + ai:ModelInteractionBias + → ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias
Object of relation dpv:isImplementedUsingTechnology -
DefinitionCapability or use of AI to achieve a technical goal or objectiveBias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups
Usage NoteThis concept is a stub
Source
Date Created2024-04-282024-09-13
ContributorsDaniel Doherty
See More: section CAPABILITIES in AI + section BIAS in AI
- -
-

Measure

+ +
+

Model Interaction Bias

- + - + - + - + - - - - - + @@ -711,77 +2056,77 @@

Measure

- + - - - - + - + + + + - + - + + + + -
TermMeasureModelInteractionBias Prefix ai
LabelMeasureModel Interaction Bias
IRIhttps://w3id.org/dpv/ai#Measurehttps://w3id.org/dpv/ai#ModelInteractionBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure -
DefinitionMeasure to address risk associated with AI SystemsBias that occurs from the structure of a model to create biased predictions
Usage NoteThis concept is a stub
Source
Date Created2024-04-282024-09-13
ContributorsDaniel Doherty
See More: section MEASURES in AI + section BIAS in AI
- -
-

Model

+ +
+

Non-Representative Sampling Bias

- + - + - + - + - - - - - + @@ -790,7 +2135,7 @@

Model

- + @@ -806,15 +2151,18 @@

Model

- + - + + + + - @@ -999,13 +2347,62 @@

Properties

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -1041,14 +2438,63 @@

External

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -1070,7 +2516,7 @@

External

Contributors

The following people have contributed to this vocabulary. The names are ordered alphabetically. The affiliations are informative do not represent formal endorsements. Affiliations may be outdated. The list is generated automatically from the contributors listed for defined concepts.

    -
  • ()
  • +
  • Daniel Doherty ()
diff --git a/2.1-dev/ai/index.html b/2.1-dev/ai/index.html index 6d84a24f4..9b96b2bd9 100644 --- a/2.1-dev/ai/index.html +++ b/2.1-dev/ai/index.html @@ -407,42 +407,1391 @@

Capabilities

Risks

See examples of Risks in VAIR.

-
+ +
+

Bias

+

Note: These are intended to represent bias concepts specific to AI development and use, and do not contain general bias concepts which exist in other contexts e.g. applicable for any technology. The Risk extension contains the general set of concepts that this vocabulary extends to represent biases that are specific to the development and use of AI.

+
    +
  • + ai:DataBias: Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups + go to full definition +
      +
    • + ai:DataAggregationBias: Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems + go to full definition + +
    • +
    • + ai:DataLabelsAndLabellingProcessBias: Bias that occurs due to the labelling process itself introducing societal or cognitive biases + go to full definition + +
    • +
    • + ai:DistributedTrainingBias: Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space + go to full definition + +
    • +
    • + ai:MissingFeaturesAndLabelsBias: Bias that occurs when features are missing from individual training samples + go to full definition + +
    • +
    • + ai:NonRepresentativeSamplingBias: Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative + go to full definition + +
    • +
    +
  • +
  • + ai:EngineeringDecisionBias: Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features + go to full definition +
      +
    • + ai:AlgorithmSelectionBias: Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model + go to full definition + +
    • +
    • + ai:FeatureEngineeringBias: Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model + go to full definition + +
    • +
    • + ai:HyperparameterTuningBias: Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model + go to full definition + +
    • +
    • + ai:InformativenessBias: Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data + go to full definition + +
    • +
    • + ai:ModelBias: Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution + go to full definition + +
    • +
    • + ai:ModelInteractionBias: Bias that occurs from the structure of a model to create biased predictions + go to full definition +
        +
      • + ai:ModelExpressivenessBias: Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups + go to full definition + +
      • +
      +
    • +
    +
  • +
+

Risk Measures

See examples of Risk Measures in VAIR.

-
-

Vocabulary Index

-
-

Classes

- +
+ + +
+

Vocabulary Index

+
+

Classes

+ + + + + + + + +
+

Artificial Intelligence (AI)

+
TermModelNonRepresentativeSamplingBias Prefix ai
LabelModelNon-Representative Sampling Bias
IRIhttps://w3id.org/dpv/ai#Modelhttps://w3id.org/dpv/ai#NonRepresentativeSamplingBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AI - → dpv:Technology + ai:DataBias + → ai:AIBias + → risk:Bias
Object of relation dpv:isImplementedUsingTechnology -
DefinitionPhysical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or dataBias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative
Date Created2024-05-172024-09-13
ContributorsDaniel Doherty
See More: section CORE in AI + section BIAS in AI
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAIPrefixai
LabelArtificial Intelligence (AI)
IRIhttps://w3id.org/dpv/ai#AI
Typerdfs:Class, skos:Concept
Broader/Parent types dpv:Technology +
Object of relation dpv:isImplementedUsingTechnology +
DefinitionA technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives
Usage NoteThis concept is a stub
Source
Date Created2024-04-28
See More: section CORE in AI +
+
+ + + +
+

AI Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAIBiasPrefixai
LabelAI Bias
IRIhttps://w3id.org/dpv/ai#AIBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:Bias +
DefinitionBias associated with development, use, or other activities involving an AI technology or system
Date Created2024-09-18
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + +
+

AI System

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAISystemPrefixai
LabelAI System
IRIhttps://w3id.org/dpv/ai#AISystem
Typerdfs:Class, skos:Concept
Broader/Parent types ai:AI + → dpv:Technology +
Object of relation dpv:isImplementedUsingTechnology +
DefinitionOECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectives
SourceOECD, ISO/IEC 22989:2023
Date Created2024-05-17
See More: section CORE in AI +
+
+ + + +
+

Algorithm Selection Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAlgorithmSelectionBiasPrefixai
LabelAlgorithm Selection Bias
IRIhttps://w3id.org/dpv/ai#AlgorithmSelectionBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Automation Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermAutomationBiasPrefixai
LabelAutomation Bias
IRIhttps://w3id.org/dpv/ai#AutomationBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:CognitiveBias +
DefinitionBias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + + +
+

Capability

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermCapabilityPrefixai
LabelCapability
IRIhttps://w3id.org/dpv/ai#Capability
Typerdfs:Class, skos:Concept
Broader/Parent types ai:AI + → dpv:Technology +
Object of relation dpv:isImplementedUsingTechnology +
DefinitionCapability or use of AI to achieve a technical goal or objective
Usage NoteThis concept is a stub
Date Created2024-04-28
See More: section CAPABILITIES in AI +
+
+ + + + +
+

Data Aggregation Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDataAggregationBiasPrefixai
LabelData Aggregation Bias
IRIhttps://w3id.org/dpv/ai#DataAggregationBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Data Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDataBiasPrefixai
LabelData Bias
IRIhttps://w3id.org/dpv/ai#DataBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Data Labels And Labelling Process Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDataLabelsAndLabellingProcessBiasPrefixai
LabelData Labels And Labelling Process Bias
IRIhttps://w3id.org/dpv/ai#DataLabelsAndLabellingProcessBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to the labelling process itself introducing societal or cognitive biases
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Distributed Training Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermDistributedTrainingBiasPrefixai
LabelDistributed Training Bias
IRIhttps://w3id.org/dpv/ai#DistributedTrainingBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Engineering Decision Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermEngineeringDecisionBiasPrefixai
LabelEngineering Decision Bias
IRIhttps://w3id.org/dpv/ai#EngineeringDecisionBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AIBias + → risk:Bias +
DefinitionBias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features
Usage NoteData bias and human cognitive bias can contribute to such bias
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Feature Engineering Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFeatureEngineeringBiasPrefixai
LabelFeature Engineering Bias
IRIhttps://w3id.org/dpv/ai#FeatureEngineeringBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Hyperparameter Tuning Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHyperparameterTuningBiasPrefixai
LabelHyperparameter Tuning Bias
IRIhttps://w3id.org/dpv/ai#HyperparameterTuningBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +
+

Informativeness Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermInformativenessBiasPrefixai
LabelInformativeness Bias
IRIhttps://w3id.org/dpv/ai#InformativenessBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data
Usage NoteThis can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + +
+

Measure

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermMeasurePrefixai
LabelMeasure
IRIhttps://w3id.org/dpv/ai#Measure
Typerdfs:Class, skos:Concept
Broader/Parent types dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure +
DefinitionMeasure to address risk associated with AI Systems
Usage NoteThis concept is a stub
Date Created2024-04-28
See More: section MEASURES in AI +
+
+ + + + +
+

Missing Features And Labels Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermMissingFeaturesAndLabelsBiasPrefixai
LabelMissing Features And Labels Bias
IRIhttps://w3id.org/dpv/ai#MissingFeaturesAndLabelsBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:DataBias + → ai:AIBias + → risk:Bias +
DefinitionBias that occurs when features are missing from individual training samples
Usage NoteIf the frequency of missing features is higher for one group than another then this presents another vector for bias
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
- - - - -
-

Artificial Intelligence (AI)

+
+

Model

- + - + - + @@ -454,7 +1803,8 @@

Artificial Intelligence (AI)

- @@ -471,12 +1821,9 @@

Artificial Intelligence (AI)

- + - - - - + @@ -490,7 +1837,7 @@

Artificial Intelligence (AI)

- + @@ -506,44 +1853,42 @@

Artificial Intelligence (AI)

-
-

AI System

+ +
+

Model Bias

TermAIModel Prefix ai
LabelArtificial Intelligence (AI)Model
IRIhttps://w3id.org/dpv/ai#AIhttps://w3id.org/dpv/ai#Model
Broader/Parent types dpv:Technology + ai:AI + → dpv:Technology
DefinitionA technical and scientific field devoted to the engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectivesPhysical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or data
Usage NoteThis concept is a stub
Date Created2024-04-282024-05-17
- + - + - + - + - - - - - + @@ -552,7 +1897,7 @@

AI System

- + @@ -561,68 +1906,69 @@

AI System

- + - + - + + + + -
TermAISystemModelBias Prefix ai
LabelAI SystemModel Bias
IRIhttps://w3id.org/dpv/ai#AISystemhttps://w3id.org/dpv/ai#ModelBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AI - → dpv:Technology + ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias
Object of relation dpv:isImplementedUsingTechnology -
DefinitionOECD 2024 definition: An AI system is a machine-based system that, for explicit or implicit objectives, infers, from the input it receives, how to generate outputs such as predictions, content, recommendations, or decisions that can influence physical or virtual environments. Different AI systems vary in their levels of autonomy and adaptiveness after deployment. ISO/IEC 22989:2023 definition: engineered system that generates outputs such as content, forecasts, recommendations or decisions for a given set of human-defined objectivesBias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution
SourceOECD, ISO/IEC 22989:2023
Date Created2024-05-172024-09-13
ContributorsDaniel Doherty
See More: section CORE in AI + section BIAS in AI
- -
-

Capability

+ +
+

Model Expressiveness Bias

- + - + - + - + - - - - - + @@ -631,78 +1977,77 @@

Capability

- + - - - - + - + + + + - + - + + + + -
TermCapabilityModelExpressivenessBias Prefix ai
LabelCapabilityModel Expressiveness Bias
IRIhttps://w3id.org/dpv/ai#Capabilityhttps://w3id.org/dpv/ai#ModelExpressivenessBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AI - → dpv:Technology + ai:ModelInteractionBias + → ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias
Object of relation dpv:isImplementedUsingTechnology -
DefinitionCapability or use of AI to achieve a technical goal or objectiveBias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups
Usage NoteThis concept is a stub
Source
Date Created2024-04-282024-09-13
ContributorsDaniel Doherty
See More: section CAPABILITIES in AI + section BIAS in AI
- -
-

Measure

+ +
+

Model Interaction Bias

- + - + - + - + - - - - - + @@ -711,77 +2056,77 @@

Measure

- + - - - - + - + + + + - + - + + + + -
TermMeasureModelInteractionBias Prefix ai
LabelMeasureModel Interaction Bias
IRIhttps://w3id.org/dpv/ai#Measurehttps://w3id.org/dpv/ai#ModelInteractionBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + ai:EngineeringDecisionBias + → ai:AIBias + → risk:Bias
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure -
DefinitionMeasure to address risk associated with AI SystemsBias that occurs from the structure of a model to create biased predictions
Usage NoteThis concept is a stub
Source
Date Created2024-04-282024-09-13
ContributorsDaniel Doherty
See More: section MEASURES in AI + section BIAS in AI
- -
-

Model

+ +
+

Non-Representative Sampling Bias

- + - + - + - + - - - - - + @@ -790,7 +2135,7 @@

Model

- + @@ -806,15 +2151,18 @@

Model

- + - + + + + - @@ -999,13 +2347,62 @@

Properties

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -1041,14 +2438,63 @@

External

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -1070,7 +2516,7 @@

External

Contributors

The following people have contributed to this vocabulary. The names are ordered alphabetically. The affiliations are informative do not represent formal endorsements. Affiliations may be outdated. The list is generated automatically from the contributors listed for defined concepts.

    -
  • ()
  • +
  • Daniel Doherty ()
diff --git a/2.1-dev/ai/modules/bias-owl.jsonld b/2.1-dev/ai/modules/bias-owl.jsonld new file mode 100644 index 000000000..aa3dcffa7 --- /dev/null +++ b/2.1-dev/ai/modules/bias-owl.jsonld @@ -0,0 +1,1280 @@ +[ + { + "@id": "https://w3id.org/dpv/ai/owl#DataAggregationBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#DataBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Aggregation Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#DataBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#AIBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#NonRepresentativeSamplingBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#DataBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Non-Representative Sampling Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/json-ld11/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai-owl.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#EngineeringDecisionBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#AIBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Engineering Decision Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Data bias and human cognitive bias can contribute to such bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#ModelInteractionBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from the structure of a model to create biased predictions" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Model Interaction Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#DistributedTrainingBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#DataBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Distributed Training Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#FeatureEngineeringBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Feature Engineering Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#ModelExpressivenessBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#ModelInteractionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Model Expressiveness Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#DataLabelsAndLabellingProcessBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#DataBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to the labelling process itself introducing societal or cognitive biases" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Labels And Labelling Process Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai-owl.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#ModelBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Model Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#HyperparameterTuningBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Hyperparameter Tuning Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#AutomationBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Automation Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/turtle/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai-owl.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TeamSubmission/n3/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai-owl.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#AlgorithmSelectionBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Algorithm Selection Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#InformativenessBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Informativeness Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#", + "@type": [ + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + } + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@language": "en", + "@value": "2024-05-31" + } + ], + "http://purl.org/dc/terms/creator": [ + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/description": [ + { + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about AI technologies" + } + ], + "http://purl.org/dc/terms/hasVersion": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/ai" + } + ], + "http://purl.org/dc/terms/issued": [ + { + "@language": "en", + "@value": "2024-05-31" + } + ], + "http://purl.org/dc/terms/license": [ + { + "@id": "https://www.w3.org/copyright/document-license-2023/" + } + ], + "http://purl.org/dc/terms/publisher": [ + { + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@language": "en", + "@value": "AI Technology Concepts" + } + ], + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/draft" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "ai" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ + { + "@language": "en", + "@value": "AI" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/ai/owl#" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-rdf" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "https://w3id.org/dpv/tech/owl" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#AIBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-18" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Bias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias associated with development, use, or other activities involving an AI technology or system" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "AI Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#MissingFeaturesAndLabelsBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/ai/owl#DataBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when features are missing from individual training samples" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Missing Features And Labels Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "If the frequency of missing features is higher for one group than another then this presents another vector for bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai/owl#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai-owl.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + } +] \ No newline at end of file diff --git a/2.1-dev/ai/modules/bias-owl.n3 b/2.1-dev/ai/modules/bias-owl.n3 new file mode 100644 index 000000000..549c7d4d4 --- /dev/null +++ b/2.1-dev/ai/modules/bias-owl.n3 @@ -0,0 +1,305 @@ +@prefix ai-owl: . +@prefix bibo: . +@prefix dct: . +@prefix foaf: . +@prefix owl: . +@prefix profile: . +@prefix rdf: . +@prefix rdfs: . +@prefix risk-owl: . +@prefix role: . +@prefix schema: . +@prefix skos: . +@prefix sw: . +@prefix vann: . +@prefix xsd: . + +ai-owl:AIBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-18"^^xsd:date ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias associated with development, use, or other activities involving an AI technology or system"@en ; + skos:prefLabel "AI Bias"@en . + +ai-owl:AlgorithmSelectionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model"@en ; + skos:prefLabel "Algorithm Selection Bias"@en . + +ai-owl:AutomationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct"@en ; + skos:prefLabel "Automation Bias"@en . + +ai-owl:DataAggregationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems"@en ; + skos:prefLabel "Data Aggregation Bias"@en . + +ai-owl:DataBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:AIBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups"@en ; + skos:prefLabel "Data Bias"@en . + +ai-owl:DataLabelsAndLabellingProcessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to the labelling process itself introducing societal or cognitive biases"@en ; + skos:prefLabel "Data Labels And Labelling Process Bias"@en . + +ai-owl:DistributedTrainingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space"@en ; + skos:prefLabel "Distributed Training Bias"@en . + +ai-owl:EngineeringDecisionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:AIBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features"@en ; + skos:prefLabel "Engineering Decision Bias"@en ; + skos:scopeNote "Data bias and human cognitive bias can contribute to such bias"@en . + +ai-owl:FeatureEngineeringBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model"@en ; + skos:prefLabel "Feature Engineering Bias"@en . + +ai-owl:HyperparameterTuningBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model"@en ; + skos:prefLabel "Hyperparameter Tuning Bias"@en . + +ai-owl:InformativenessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en ; + skos:prefLabel "Informativeness Bias"@en ; + skos:scopeNote "This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en . + +ai-owl:MissingFeaturesAndLabelsBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when features are missing from individual training samples"@en ; + skos:prefLabel "Missing Features And Labels Bias"@en ; + skos:scopeNote "If the frequency of missing features is higher for one group than another then this presents another vector for bias"@en . + +ai-owl:ModelBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution"@en ; + skos:prefLabel "Model Bias"@en . + +ai-owl:ModelExpressivenessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:ModelInteractionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups"@en ; + skos:prefLabel "Model Expressiveness Bias"@en . + +ai-owl:ModelInteractionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from the structure of a model to create biased predictions"@en ; + skos:prefLabel "Model Interaction Bias"@en . + +ai-owl:NonRepresentativeSamplingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative"@en ; + skos:prefLabel "Non-Representative Sampling Bias"@en . + +ai-owl:serialisation-html a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - HTML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:specification . + +ai-owl:serialisation-jsonld a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - JSON-LD serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +ai-owl:serialisation-n3 a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - N3 serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +ai-owl:serialisation-rdf a profile:ResourceDescriptor ; + dct:conformsTo rdf: ; + dct:format ; + dct:title "AI Technology Concepts - RDF/XML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +ai-owl:serialisation-ttl a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - Turtle serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Examples for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Guides for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Primer for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + +ai-owl: a owl:Ontology, + profile:Profile ; + dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; + dct:conformsTo , + "http://www.w3.org/2000/01/rdf-schema", + "http://www.w3.org/2004/02/skos/core" ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-05-31"@en ; + dct:creator "Delaram Golpayegani"@en, + "Harshvardhan J. Pandit"@en ; + dct:description "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about AI technologies"@en ; + dct:hasVersion ai-owl: ; + dct:identifier "https://w3id.org/dpv/ai" ; + dct:issued "2024-05-31"@en ; + dct:license ; + dct:publisher ; + dct:source ; + dct:title "AI Technology Concepts"@en ; + bibo:doi "10.5281/zenodo.12505841" ; + bibo:status "http://purl.org/ontology/bibo/status/draft" ; + vann:preferredNamespacePrefix "ai" ; + vann:preferredNamespaceUri "https://w3id.org/dpv/ai#" ; + rdfs:Label "AI"@en ; + owl:versionIRI ; + owl:versionInfo "2.1-dev" ; + profile:hasResource ai-owl:serialisation-html, + ai-owl:serialisation-jsonld, + ai-owl:serialisation-n3, + ai-owl:serialisation-rdf, + ai-owl:serialisation-ttl, + , + , + ; + profile:isProfileOf , + ai-owl:, + ; + foaf:logo ; + schema:version "2.1-dev" . + diff --git a/2.1-dev/ai/modules/bias-owl.rdf b/2.1-dev/ai/modules/bias-owl.rdf new file mode 100644 index 000000000..cbcfed02a --- /dev/null +++ b/2.1-dev/ai/modules/bias-owl.rdf @@ -0,0 +1,329 @@ + + + + + + + Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data + accepted + 2024-09-13 + Daniel Doherty + Informativeness Bias + + This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data + ISO/IEC 24027:2021 + + + + + http://www.w3.org/2000/01/rdf-schema + http://www.w3.org/2004/02/skos/core + + ai + 10.5281/zenodo.12505841 + AI + 2.1-dev + + + + + + + + + 2.1-dev + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about AI technologies + http://purl.org/ontology/bibo/status/draft + + Daniel Doherty + + + + + + 2024-05-31 + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + + Delaram Golpayegani + Harshvardhan J. Pandit + + AI Technology Concepts + https://w3id.org/dpv/ai# + https://w3id.org/dpv/ai + 2024-05-31 + + + + + + ISO/IEC 24027:2021 + Non-Representative Sampling Bias + Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative + 2024-09-13 + accepted + Daniel Doherty + + + + + ISO/IEC 24027:2021 + + + + Daniel Doherty + 2024-09-13 + accepted + + Algorithm Selection Bias + Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model + + + + + + + Data Bias + accepted + Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups + Daniel Doherty + 2024-09-13 + ISO/IEC 24027:2021 + + + + + + + + Hyperparameter Tuning Bias + ISO/IEC 24027:2021 + 2024-09-13 + Daniel Doherty + Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model + accepted + + + + + Daniel Doherty + 2024-09-13 + accepted + Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution + + Model Bias + + + + ISO/IEC 24027:2021 + + + + + + AI Technology Concepts - HTML serialiation + + + + + + Model Expressiveness Bias + + + + 2024-09-13 + accepted + Daniel Doherty + + Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups + ISO/IEC 24027:2021 + + + + 2024-09-13 + accepted + + + + + ISO/IEC 24027:2021 + Daniel Doherty + Distributed Training Bias + Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space + + + + + Bias associated with development, use, or other activities involving an AI technology or system + + + + 2024-09-18 + Daniel Doherty + AI Bias + accepted + + + + + If the frequency of missing features is higher for one group than another then this presents another vector for bias + ISO/IEC 24027:2021 + + + + Bias that occurs when features are missing from individual training samples + accepted + Daniel Doherty + 2024-09-13 + Missing Features And Labels Bias + + + + accepted + 2024-09-13 + Daniel Doherty + + Data Labels And Labelling Process Bias + + + + ISO/IEC 24027:2021 + Bias that occurs due to the labelling process itself introducing societal or cognitive biases + + + + + AI Technology Concepts - RDF/XML serialiation + + + + + + + + + + + + AI Technology Concepts - N3 serialiation + + + Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct + + + + + ISO/IEC 24027:2021 + Daniel Doherty + Automation Bias + 2024-09-13 + accepted + + + + AI Technology Concepts - Turtle serialiation + + + + + + + + Daniel Doherty + 2024-09-13 + + + + + ISO/IEC 24027:2021 + Data Aggregation Bias + Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems + accepted + + + + Engineering Decision Bias + Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features + Data bias and human cognitive bias can contribute to such bias + 2024-09-13 + accepted + Daniel Doherty + + + + + ISO/IEC 24027:2021 + + + + Daniel Doherty + Feature Engineering Bias + 2024-09-13 + + + + + ISO/IEC 24027:2021 + Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model + accepted + + + + + + + + + Guides for Data Privacy Vocabulary + + + + + + + Primer for Data Privacy Vocabulary + + + + + ISO/IEC 24027:2021 + + + + Bias that occurs from the structure of a model to create biased predictions + Model Interaction Bias + Daniel Doherty + 2024-09-13 + accepted + + + + + + + Examples for Data Privacy Vocabulary + + + + + + + + AI Technology Concepts - JSON-LD serialiation + + + + diff --git a/2.1-dev/ai/modules/bias-owl.ttl b/2.1-dev/ai/modules/bias-owl.ttl new file mode 100644 index 000000000..549c7d4d4 --- /dev/null +++ b/2.1-dev/ai/modules/bias-owl.ttl @@ -0,0 +1,305 @@ +@prefix ai-owl: . +@prefix bibo: . +@prefix dct: . +@prefix foaf: . +@prefix owl: . +@prefix profile: . +@prefix rdf: . +@prefix rdfs: . +@prefix risk-owl: . +@prefix role: . +@prefix schema: . +@prefix skos: . +@prefix sw: . +@prefix vann: . +@prefix xsd: . + +ai-owl:AIBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-18"^^xsd:date ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias associated with development, use, or other activities involving an AI technology or system"@en ; + skos:prefLabel "AI Bias"@en . + +ai-owl:AlgorithmSelectionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model"@en ; + skos:prefLabel "Algorithm Selection Bias"@en . + +ai-owl:AutomationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct"@en ; + skos:prefLabel "Automation Bias"@en . + +ai-owl:DataAggregationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems"@en ; + skos:prefLabel "Data Aggregation Bias"@en . + +ai-owl:DataBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:AIBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups"@en ; + skos:prefLabel "Data Bias"@en . + +ai-owl:DataLabelsAndLabellingProcessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to the labelling process itself introducing societal or cognitive biases"@en ; + skos:prefLabel "Data Labels And Labelling Process Bias"@en . + +ai-owl:DistributedTrainingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space"@en ; + skos:prefLabel "Distributed Training Bias"@en . + +ai-owl:EngineeringDecisionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:AIBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features"@en ; + skos:prefLabel "Engineering Decision Bias"@en ; + skos:scopeNote "Data bias and human cognitive bias can contribute to such bias"@en . + +ai-owl:FeatureEngineeringBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model"@en ; + skos:prefLabel "Feature Engineering Bias"@en . + +ai-owl:HyperparameterTuningBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model"@en ; + skos:prefLabel "Hyperparameter Tuning Bias"@en . + +ai-owl:InformativenessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en ; + skos:prefLabel "Informativeness Bias"@en ; + skos:scopeNote "This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en . + +ai-owl:MissingFeaturesAndLabelsBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when features are missing from individual training samples"@en ; + skos:prefLabel "Missing Features And Labels Bias"@en ; + skos:scopeNote "If the frequency of missing features is higher for one group than another then this presents another vector for bias"@en . + +ai-owl:ModelBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution"@en ; + skos:prefLabel "Model Bias"@en . + +ai-owl:ModelExpressivenessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:ModelInteractionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups"@en ; + skos:prefLabel "Model Expressiveness Bias"@en . + +ai-owl:ModelInteractionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs from the structure of a model to create biased predictions"@en ; + skos:prefLabel "Model Interaction Bias"@en . + +ai-owl:NonRepresentativeSamplingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai-owl: ; + rdfs:subClassOf ai-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative"@en ; + skos:prefLabel "Non-Representative Sampling Bias"@en . + +ai-owl:serialisation-html a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - HTML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:specification . + +ai-owl:serialisation-jsonld a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - JSON-LD serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +ai-owl:serialisation-n3 a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - N3 serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +ai-owl:serialisation-rdf a profile:ResourceDescriptor ; + dct:conformsTo rdf: ; + dct:format ; + dct:title "AI Technology Concepts - RDF/XML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +ai-owl:serialisation-ttl a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - Turtle serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Examples for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Guides for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Primer for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + +ai-owl: a owl:Ontology, + profile:Profile ; + dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; + dct:conformsTo , + "http://www.w3.org/2000/01/rdf-schema", + "http://www.w3.org/2004/02/skos/core" ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-05-31"@en ; + dct:creator "Delaram Golpayegani"@en, + "Harshvardhan J. Pandit"@en ; + dct:description "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about AI technologies"@en ; + dct:hasVersion ai-owl: ; + dct:identifier "https://w3id.org/dpv/ai" ; + dct:issued "2024-05-31"@en ; + dct:license ; + dct:publisher ; + dct:source ; + dct:title "AI Technology Concepts"@en ; + bibo:doi "10.5281/zenodo.12505841" ; + bibo:status "http://purl.org/ontology/bibo/status/draft" ; + vann:preferredNamespacePrefix "ai" ; + vann:preferredNamespaceUri "https://w3id.org/dpv/ai#" ; + rdfs:Label "AI"@en ; + owl:versionIRI ; + owl:versionInfo "2.1-dev" ; + profile:hasResource ai-owl:serialisation-html, + ai-owl:serialisation-jsonld, + ai-owl:serialisation-n3, + ai-owl:serialisation-rdf, + ai-owl:serialisation-ttl, + , + , + ; + profile:isProfileOf , + ai-owl:, + ; + foaf:logo ; + schema:version "2.1-dev" . + diff --git a/2.1-dev/ai/modules/bias.csv b/2.1-dev/ai/modules/bias.csv new file mode 100644 index 000000000..1b7b5b2a2 --- /dev/null +++ b/2.1-dev/ai/modules/bias.csv @@ -0,0 +1,17 @@ +term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace +AIBias,class,https://w3id.org/dpv/ai#AIBias,AI Bias,"Bias associated with development, use, or other activities involving an AI technology or system",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#Bias,,2024-09-18,,ai,https://w3id.org/dpv/ai +AlgorithmSelectionBias,class,https://w3id.org/dpv/ai#AlgorithmSelectionBias,Algorithm Selection Bias,Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#EngineeringDecisionBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +AutomationBias,class,https://w3id.org/dpv/ai#AutomationBias,Automation Bias,"Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +DataAggregationBias,class,https://w3id.org/dpv/ai#DataAggregationBias,Data Aggregation Bias,Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#DataBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +DataBias,class,https://w3id.org/dpv/ai#DataBias,Data Bias,Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#AIBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +DataLabelsAndLabellingProcessBias,class,https://w3id.org/dpv/ai#DataLabelsAndLabellingProcessBias,Data Labels And Labelling Process Bias,Bias that occurs due to the labelling process itself introducing societal or cognitive biases,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#DataBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +DistributedTrainingBias,class,https://w3id.org/dpv/ai#DistributedTrainingBias,Distributed Training Bias,Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#DataBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +EngineeringDecisionBias,class,https://w3id.org/dpv/ai#EngineeringDecisionBias,Engineering Decision Bias,"Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#AIBias,Data bias and human cognitive bias can contribute to such bias,2024-09-13,,ai,https://w3id.org/dpv/ai +FeatureEngineeringBias,class,https://w3id.org/dpv/ai#FeatureEngineeringBias,Feature Engineering Bias,"Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#EngineeringDecisionBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +HyperparameterTuningBias,class,https://w3id.org/dpv/ai#HyperparameterTuningBias,Hyperparameter Tuning Bias,"Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#EngineeringDecisionBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +InformativenessBias,class,https://w3id.org/dpv/ai#InformativenessBias,Informativeness Bias,"Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#EngineeringDecisionBias,"This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data",2024-09-13,,ai,https://w3id.org/dpv/ai +MissingFeaturesAndLabelsBias,class,https://w3id.org/dpv/ai#MissingFeaturesAndLabelsBias,Missing Features And Labels Bias,Bias that occurs when features are missing from individual training samples,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#DataBias,If the frequency of missing features is higher for one group than another then this presents another vector for bias,2024-09-13,,ai,https://w3id.org/dpv/ai +ModelBias,class,https://w3id.org/dpv/ai#ModelBias,Model Bias,"Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#EngineeringDecisionBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +ModelExpressivenessBias,class,https://w3id.org/dpv/ai#ModelExpressivenessBias,Model Expressiveness Bias,Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#ModelInteractionBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +ModelInteractionBias,class,https://w3id.org/dpv/ai#ModelInteractionBias,Model Interaction Bias,Bias that occurs from the structure of a model to create biased predictions,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#EngineeringDecisionBias,,2024-09-13,,ai,https://w3id.org/dpv/ai +NonRepresentativeSamplingBias,class,https://w3id.org/dpv/ai#NonRepresentativeSamplingBias,Non-Representative Sampling Bias,"Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/ai#DataBias,,2024-09-13,,ai,https://w3id.org/dpv/ai diff --git a/2.1-dev/ai/modules/bias.jsonld b/2.1-dev/ai/modules/bias.jsonld new file mode 100644 index 000000000..02d142d49 --- /dev/null +++ b/2.1-dev/ai/modules/bias.jsonld @@ -0,0 +1,1358 @@ +[ + { + "@id": "https://w3id.org/dpv/ai#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/json-ld11/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#InformativenessBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Informativeness Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#AIBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-18" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias associated with development, use, or other activities involving an AI technology or system" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "AI Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#AutomationBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Automation Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#DataBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#AIBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#MissingFeaturesAndLabelsBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when features are missing from individual training samples" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Missing Features And Labels Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "If the frequency of missing features is higher for one group than another then this presents another vector for bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai", + "@type": [ + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" + } + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@language": "en", + "@value": "2024-05-31" + } + ], + "http://purl.org/dc/terms/creator": [ + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/description": [ + { + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about AI technologies" + } + ], + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/ai" + } + ], + "http://purl.org/dc/terms/issued": [ + { + "@language": "en", + "@value": "2024-05-31" + } + ], + "http://purl.org/dc/terms/license": [ + { + "@id": "https://www.w3.org/copyright/document-license-2023/" + } + ], + "http://purl.org/dc/terms/publisher": [ + { + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@language": "en", + "@value": "AI Technology Concepts" + } + ], + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/draft" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "ai" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ + { + "@language": "en", + "@value": "AI" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/ai" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv/tech" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#ModelInteractionBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from the structure of a model to create biased predictions" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Model Interaction Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#ModelExpressivenessBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#ModelInteractionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Model Expressiveness Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#bias-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/ai#NonRepresentativeSamplingBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Non-Representative Sampling Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#HyperparameterTuningBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Hyperparameter Tuning Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#FeatureEngineeringBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Feature Engineering Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#DataAggregationBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Aggregation Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#AlgorithmSelectionBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Algorithm Selection Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#EngineeringDecisionBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#AIBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Engineering Decision Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Data bias and human cognitive bias can contribute to such bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#DataLabelsAndLabellingProcessBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to the labelling process itself introducing societal or cognitive biases" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Labels And Labelling Process Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#ModelBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Model Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TeamSubmission/n3/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#DistributedTrainingBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/ai#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/ai#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/ai#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Distributed Training Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/ai#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/turtle/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "AI Technology Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/ai/ai.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + } +] \ No newline at end of file diff --git a/2.1-dev/ai/modules/bias.n3 b/2.1-dev/ai/modules/bias.n3 new file mode 100644 index 000000000..35c4852cf --- /dev/null +++ b/2.1-dev/ai/modules/bias.n3 @@ -0,0 +1,321 @@ +@prefix ai: . +@prefix bibo: . +@prefix dct: . +@prefix foaf: . +@prefix owl: . +@prefix profile: . +@prefix rdf: . +@prefix rdfs: . +@prefix risk: . +@prefix role: . +@prefix schema: . +@prefix skos: . +@prefix sw: . +@prefix vann: . +@prefix xsd: . + +ai:AIBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-18"^^xsd:date ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias associated with development, use, or other activities involving an AI technology or system"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "AI Bias"@en . + +ai:AlgorithmSelectionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Algorithm Selection Bias"@en . + +ai:AutomationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Automation Bias"@en . + +ai:DataAggregationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Data Aggregation Bias"@en . + +ai:DataBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:AIBias ; + skos:definition "Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Data Bias"@en . + +ai:DataLabelsAndLabellingProcessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs due to the labelling process itself introducing societal or cognitive biases"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Data Labels And Labelling Process Bias"@en . + +ai:DistributedTrainingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Distributed Training Bias"@en . + +ai:EngineeringDecisionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:AIBias ; + skos:definition "Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Engineering Decision Bias"@en ; + skos:scopeNote "Data bias and human cognitive bias can contribute to such bias"@en . + +ai:FeatureEngineeringBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Feature Engineering Bias"@en . + +ai:HyperparameterTuningBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Hyperparameter Tuning Bias"@en . + +ai:InformativenessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Informativeness Bias"@en ; + skos:scopeNote "This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en . + +ai:MissingFeaturesAndLabelsBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs when features are missing from individual training samples"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Missing Features And Labels Bias"@en ; + skos:scopeNote "If the frequency of missing features is higher for one group than another then this presents another vector for bias"@en . + +ai:ModelBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Model Bias"@en . + +ai:ModelExpressivenessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:ModelInteractionBias ; + skos:definition "Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Model Expressiveness Bias"@en . + +ai:ModelInteractionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from the structure of a model to create biased predictions"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Model Interaction Bias"@en . + +ai:NonRepresentativeSamplingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Non-Representative Sampling Bias"@en . + + a owl:Ontology, + profile:Profile ; + dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; + dct:conformsTo "http://www.w3.org/2000/01/rdf-schema", + "http://www.w3.org/2004/02/skos/core" ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-05-31"@en ; + dct:creator "Delaram Golpayegani"@en, + "Harshvardhan J. Pandit"@en ; + dct:description "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about AI technologies"@en ; + dct:identifier "https://w3id.org/dpv/ai" ; + dct:issued "2024-05-31"@en ; + dct:license ; + dct:publisher ; + dct:source ; + dct:title "AI Technology Concepts"@en ; + bibo:doi "10.5281/zenodo.12505841" ; + bibo:status "http://purl.org/ontology/bibo/status/draft" ; + vann:preferredNamespacePrefix "ai" ; + vann:preferredNamespaceUri "https://w3id.org/dpv/ai#" ; + rdfs:Label "AI"@en ; + owl:versionIRI ; + owl:versionInfo "2.1-dev" ; + profile:hasResource ai:serialisation-html, + ai:serialisation-jsonld, + ai:serialisation-n3, + ai:serialisation-rdf, + ai:serialisation-ttl, + , + , + ; + profile:isProfileOf rdfs:, + skos:, + ; + foaf:logo ; + schema:version "2.1-dev" . + +ai:serialisation-html a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - HTML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:specification . + +ai:serialisation-jsonld a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - JSON-LD serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +ai:serialisation-n3 a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - N3 serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +ai:serialisation-rdf a profile:ResourceDescriptor ; + dct:conformsTo rdf: ; + dct:format ; + dct:title "AI Technology Concepts - RDF/XML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +ai:serialisation-ttl a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - Turtle serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Examples for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Guides for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Primer for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + +ai:bias-classes a skos:ConceptScheme . + diff --git a/2.1-dev/ai/modules/bias.rdf b/2.1-dev/ai/modules/bias.rdf new file mode 100644 index 000000000..b3e77d479 --- /dev/null +++ b/2.1-dev/ai/modules/bias.rdf @@ -0,0 +1,346 @@ + + + + + + + Data Bias + Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + + + AI Technology Concepts - Turtle serialiation + + + + + + + AI Technology Concepts + http://purl.org/ontology/bibo/status/draft + AI + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about AI technologies + 2024-05-31 + 2024-05-31 + Delaram Golpayegani + Harshvardhan J. Pandit + 2.1-dev + 2.1-dev + https://w3id.org/dpv/ai + http://www.w3.org/2000/01/rdf-schema + http://www.w3.org/2004/02/skos/core + 10.5281/zenodo.12505841 + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + Daniel Doherty + + ai + https://w3id.org/dpv/ai# + + + + + + + + + + + + + + + + + + + AI Technology Concepts - HTML serialiation + + + + + + Automation Bias + Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Non-Representative Sampling Bias + Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Hyperparameter Tuning Bias + Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + + + AI Technology Concepts - N3 serialiation + + + + + + + + AI Technology Concepts - JSON-LD serialiation + + + + + + Missing Features And Labels Bias + Bias that occurs when features are missing from individual training samples + + If the frequency of missing features is higher for one group than another then this presents another vector for bias + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Distributed Training Bias + Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Algorithm Selection Bias + Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Feature Engineering Bias + Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Data Aggregation Bias + Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Model Interaction Bias + Bias that occurs from the structure of a model to create biased predictions + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + + + AI Technology Concepts - RDF/XML serialiation + + + + + + Model Bias + Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Model Expressiveness Bias + Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Data Labels And Labelling Process Bias + Bias that occurs due to the labelling process itself introducing societal or cognitive biases + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Informativeness Bias + Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data + + This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Engineering Decision Bias + Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features + + Data bias and human cognitive bias can contribute to such bias + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + AI Bias + Bias associated with development, use, or other activities involving an AI technology or system + + 2024-09-18 + accepted + Daniel Doherty + + + + + + + + Guides for Data Privacy Vocabulary + + + + + + + + Primer for Data Privacy Vocabulary + + + + + + + + Examples for Data Privacy Vocabulary + + + + + + + diff --git a/2.1-dev/ai/modules/bias.ttl b/2.1-dev/ai/modules/bias.ttl new file mode 100644 index 000000000..35c4852cf --- /dev/null +++ b/2.1-dev/ai/modules/bias.ttl @@ -0,0 +1,321 @@ +@prefix ai: . +@prefix bibo: . +@prefix dct: . +@prefix foaf: . +@prefix owl: . +@prefix profile: . +@prefix rdf: . +@prefix rdfs: . +@prefix risk: . +@prefix role: . +@prefix schema: . +@prefix skos: . +@prefix sw: . +@prefix vann: . +@prefix xsd: . + +ai:AIBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-18"^^xsd:date ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias associated with development, use, or other activities involving an AI technology or system"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "AI Bias"@en . + +ai:AlgorithmSelectionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Algorithm Selection Bias"@en . + +ai:AutomationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Automation Bias"@en . + +ai:DataAggregationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Data Aggregation Bias"@en . + +ai:DataBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:AIBias ; + skos:definition "Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Data Bias"@en . + +ai:DataLabelsAndLabellingProcessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs due to the labelling process itself introducing societal or cognitive biases"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Data Labels And Labelling Process Bias"@en . + +ai:DistributedTrainingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Distributed Training Bias"@en . + +ai:EngineeringDecisionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:AIBias ; + skos:definition "Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Engineering Decision Bias"@en ; + skos:scopeNote "Data bias and human cognitive bias can contribute to such bias"@en . + +ai:FeatureEngineeringBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Feature Engineering Bias"@en . + +ai:HyperparameterTuningBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Hyperparameter Tuning Bias"@en . + +ai:InformativenessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Informativeness Bias"@en ; + skos:scopeNote "This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data"@en . + +ai:MissingFeaturesAndLabelsBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs when features are missing from individual training samples"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Missing Features And Labels Bias"@en ; + skos:scopeNote "If the frequency of missing features is higher for one group than another then this presents another vector for bias"@en . + +ai:ModelBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Model Bias"@en . + +ai:ModelExpressivenessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:ModelInteractionBias ; + skos:definition "Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Model Expressiveness Bias"@en . + +ai:ModelInteractionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:EngineeringDecisionBias ; + skos:definition "Bias that occurs from the structure of a model to create biased predictions"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Model Interaction Bias"@en . + +ai:NonRepresentativeSamplingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy ai: ; + sw:term_status "accepted"@en ; + skos:broader ai:DataBias ; + skos:definition "Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative"@en ; + skos:inScheme ai:bias-classes ; + skos:prefLabel "Non-Representative Sampling Bias"@en . + + a owl:Ontology, + profile:Profile ; + dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; + dct:conformsTo "http://www.w3.org/2000/01/rdf-schema", + "http://www.w3.org/2004/02/skos/core" ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-05-31"@en ; + dct:creator "Delaram Golpayegani"@en, + "Harshvardhan J. Pandit"@en ; + dct:description "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about AI technologies"@en ; + dct:identifier "https://w3id.org/dpv/ai" ; + dct:issued "2024-05-31"@en ; + dct:license ; + dct:publisher ; + dct:source ; + dct:title "AI Technology Concepts"@en ; + bibo:doi "10.5281/zenodo.12505841" ; + bibo:status "http://purl.org/ontology/bibo/status/draft" ; + vann:preferredNamespacePrefix "ai" ; + vann:preferredNamespaceUri "https://w3id.org/dpv/ai#" ; + rdfs:Label "AI"@en ; + owl:versionIRI ; + owl:versionInfo "2.1-dev" ; + profile:hasResource ai:serialisation-html, + ai:serialisation-jsonld, + ai:serialisation-n3, + ai:serialisation-rdf, + ai:serialisation-ttl, + , + , + ; + profile:isProfileOf rdfs:, + skos:, + ; + foaf:logo ; + schema:version "2.1-dev" . + +ai:serialisation-html a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - HTML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:specification . + +ai:serialisation-jsonld a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - JSON-LD serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +ai:serialisation-n3 a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - N3 serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +ai:serialisation-rdf a profile:ResourceDescriptor ; + dct:conformsTo rdf: ; + dct:format ; + dct:title "AI Technology Concepts - RDF/XML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +ai:serialisation-ttl a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "AI Technology Concepts - Turtle serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Examples for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Guides for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Primer for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + +ai:bias-classes a skos:ConceptScheme . + diff --git a/2.1-dev/risk/index-en.html b/2.1-dev/risk/index-en.html index 4bef40b04..239452705 100644 --- a/2.1-dev/risk/index-en.html +++ b/2.1-dev/risk/index-en.html @@ -2099,6 +2099,117 @@

Financial

risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee go to full definition + + +
+ +
+

Bias

+

Note: These are intended to represent bias concepts in general e.g. applicable for any technology. The AI extension contains an additional set of concepts that extend these concepts to represent biases that are specific to the development and use of AI.

+
    +
  • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
      +
    • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition + +
    • +
    • + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition + +
    • +
    • + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition + +
    • +
    • + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition + +
    • +
    • + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition + +
    • +
    • + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition + +
    • +
    • + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition + +
    • +
    • + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition + +
    • +
    +
  • +
  • + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
      +
    • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition + +
    • +
    • + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition + +
    • +
    • + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
    • +
    • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition +
        +
      • + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition + +
      • +
      • + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition + +
      • +
      • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
          +
        • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition + +
        • +
        • + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition + +
        • +
        • + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition + +
        • +
        +
      • +
      +
    • +
@@ -3631,6 +3742,84 @@

Benefit

+
+

Bias

+
TermModelNonRepresentativeSamplingBias Prefix ai
LabelModelNon-Representative Sampling Bias
IRIhttps://w3id.org/dpv/ai#Modelhttps://w3id.org/dpv/ai#NonRepresentativeSamplingBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types ai:AI - → dpv:Technology + ai:DataBias + → ai:AIBias + → risk:Bias
Object of relation dpv:isImplementedUsingTechnology -
DefinitionPhysical, mathematical or otherwise logical representation of a system, entity, phenomenon, process or dataBias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative
Date Created2024-05-172024-09-13
ContributorsDaniel Doherty
See More: section CORE in AI + section BIAS in AI
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermBiasPrefixrisk
LabelBias
IRIhttps://w3id.org/dpv/risk#Bias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskConcept +
DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +

Blackmail

@@ -4056,6 +4245,84 @@

Coercion

+
+

Cognitive Bias

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermCognitiveBiasPrefixrisk
LabelCognitive Bias
IRIhttps://w3id.org/dpv/risk#CognitiveBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:Bias + → risk:RiskConcept +
DefinitionBias that occurs when humans are processing and interpreting information
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + +

Compensation

@@ -4643,47 +4910,41 @@

Confidentiality Incident

-
-

Consequence Control

+
+

Confirmation Bias

- + - + - + - + - - - - - + @@ -4692,31 +4953,34 @@

Consequence Control

- + - + + + + - + - + - @@ -4725,47 +4989,42 @@

Consequence Control

-
-

Containment Control

+
+

Confounding Variables Bias

TermConsequenceControlConfirmationBias Prefix risk
LabelConsequence ControlConfirmation Bias
IRIhttps://w3id.org/dpv/risk#ConsequenceControlhttps://w3id.org/dpv/risk#ConfirmationBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionRisk Mitigation Measure that controls the ConsequencesBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information
Source
Date Created2024-05-192024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -4774,28 +5033,34 @@

Containment Control

- + - + + + + - + - + + + + - @@ -4804,40 +5069,47 @@

Containment Control

-
-

Copyright Violation

+
+

Consequence Control

TermContainmentControlConfoundingVariablesBias Prefix risk
LabelContainment ControlConfounding Variables Bias
IRIhttps://w3id.org/dpv/risk#ContainmentControlhttps://w3id.org/dpv/risk#ConfoundingVariablesBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl to contain eventBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - + + + + @@ -4846,28 +5118,22 @@

Copyright Violation

- + - - - - + - + - - - - + @@ -4876,52 +5142,54 @@

Copyright Violation

-
TermCopyrightViolationConsequenceControl Prefix risk
LabelCopyright ViolationConsequence Control
IRIhttps://w3id.org/dpv/risk#CopyrightViolationhttps://w3id.org/dpv/risk#ConsequenceControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Copyright ViolationRisk Mitigation Measure that controls the Consequences
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- - -
-

Cross-Border Incident

+ +
+

Containment Control

- + - + - + - + - - @@ -4932,7 +5200,7 @@

Cross-Border Incident

- + @@ -4953,7 +5221,7 @@

Cross-Border Incident

- @@ -4962,23 +5230,23 @@

Cross-Border Incident

-
-

Cryptojacking

+
+

Copyright Violation

TermCrossBorderIncidentContainmentControl Prefix risk
LabelCross-Border IncidentContainment Control
IRIhttps://w3id.org/dpv/risk#CrossBorderIncidenthttps://w3id.org/dpv/risk#ContainmentControl
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation risk:hasIncident + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionIncident involving cross-border or multiple jurisdictionsControl to contain event
See More: section INCIDENT in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -4990,10 +5258,7 @@

Cryptojacking

- - - @@ -5007,7 +5272,7 @@

Cryptojacking

- + @@ -5016,7 +5281,7 @@

Cryptojacking

- + @@ -5043,39 +5308,44 @@

Cryptojacking

TermCryptojackingCopyrightViolation Prefix risk
LabelCryptojackingCopyright Violation
IRIhttps://w3id.org/dpv/risk#Cryptojackinghttps://w3id.org/dpv/risk#CopyrightViolation
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ExternalSecurityThreat + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes CryptojackingSomething that acts as or causes Copyright Violation
SourceENISA Threat Landscape 2021ENISA Reference Incident Classification Taxonomy 2018
+ + -
-

Damage

+
+

Coverage Bias

- + - + - + - + - @@ -5088,34 +5358,34 @@

Damage

- + - + + + + - + - - - - + - + - @@ -5123,54 +5393,44 @@

Damage

- -
-

Data Breach

+
+

Cross-Border Incident

TermDamageCoverageBias Prefix risk
LabelDamageCoverage Bias
IRIhttps://w3id.org/dpv/risk#Damagehttps://w3id.org/dpv/risk#CoverageBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes DamageBias that occurs when a population represented in a dataset does not match the actual or real population that are being used
Source
Date Created2022-03-302024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - - - - - - - + + + + @@ -5179,40 +5439,28 @@

Data Breach

- + - - - - - - - + - + - - - - - - - - + + - @@ -5221,23 +5469,23 @@

Data Breach

-
-

Data Corruption

+
+

Cryptojacking

TermDataBreachCrossBorderIncident Prefix risk
LabelData BreachCross-Border Incident
IRIhttps://w3id.org/dpv/risk#DataBreachhttps://w3id.org/dpv/risk#CrossBorderIncident
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:SecurityBreach - → risk:AvailabilityConcept -
Broader/Parent types risk:SecurityBreach - → risk:ConfidentialityConcept -
Broader/Parent types risk:SecurityBreach - → risk:IntegrityConcept -
Broader/Parent types risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:Incidentdpv:RiskConcept
Object of relation risk:hasIncident +
DefinitionSomething that acts as or causes Data BreachIncident involving cross-border or multiple jurisdictions
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0071 :: Using risk controls to express how tech/org measures address the risk
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in DEX + section INCIDENT in RISK
- + - + - + @@ -5249,10 +5497,10 @@

Data Corruption

- - @@ -5266,19 +5514,16 @@

Data Corruption

- + - - - - + - + @@ -5307,44 +5552,41 @@

Data Corruption

-
-

Deliberate Incident

+ +
+

Damage

TermDataCorruptionCryptojacking Prefix risk
LabelData CorruptionCryptojacking
IRIhttps://w3id.org/dpv/risk#DataCorruptionhttps://w3id.org/dpv/risk#Cryptojacking
Broader/Parent types risk:IntegrityConcept + risk:AvailabilityConcept
Broader/Parent types risk:OperationalSecurityRisk + risk:ExternalSecurityThreatdpv:RiskConcept
DefinitionSomething that acts as or causes Corruption of DataSomething that acts as or causes Cryptojacking
Usage NoteThis concept was called "Corruption Data" in DPV 2.0
SourceISO/IEC 27005:2018ENISA Threat Landscape 2021
- + - + - + - + - - - - - + @@ -5353,7 +5595,7 @@

Deliberate Incident

- + @@ -5366,15 +5608,21 @@

Deliberate Incident

- + - - + + + + + + + + - @@ -5383,39 +5631,37 @@

Deliberate Incident

-
-

Denial of Service Attack (DoS)

+
+

Data Aggregation Bias

TermDeliberateIncidentDamage Prefix risk
LabelDeliberate IncidentDamage
IRIhttps://w3id.org/dpv/risk#DeliberateIncidenthttps://w3id.org/dpv/risk#Damage
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:Incident + risk:LegalRiskdpv:RiskConcept
Object of relation risk:hasIncident -
DefinitionIncident caused due to deliberate actions of a humanSomething that acts as or causes Damage
Date Created2024-05-192022-03-30
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - @@ -5428,7 +5674,7 @@

Denial of Service Attack (DoS)

- + @@ -5437,28 +5683,25 @@

Denial of Service Attack (DoS)

- + - + - - - - + - + - @@ -5467,47 +5710,40 @@

Denial of Service Attack (DoS)

-
-

Detection Control

+
+

Data Bias

TermDenialServiceAttackDataAggregationBias Prefix risk
LabelDenial of Service Attack (DoS)Data Aggregation Bias
IRIhttps://w3id.org/dpv/risk#DenialServiceAttackhttps://w3id.org/dpv/risk#DataAggregationBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Denial of Service Attack (DoS)Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -5516,28 +5752,34 @@

Detection Control

- + - + + + + - + - + + + + - @@ -5546,23 +5788,23 @@

Detection Control

-
-

Detriment

+
+

Data Breach

TermDetectionControlDataBias Prefix risk
LabelDetection ControlData Bias
IRIhttps://w3id.org/dpv/risk#DetectionControlhttps://w3id.org/dpv/risk#DataBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl to detect eventBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + @@ -5574,7 +5816,20 @@

Detriment

- + + + + + + @@ -5588,20 +5843,26 @@

Detriment

- + + + + - + + + + - + @@ -5609,13 +5870,13 @@

Detriment

- + - @@ -5624,23 +5885,23 @@

Detriment

-
-

Discrimination

+
+

Data Corruption

TermDetrimentDataBreach Prefix risk
LabelDetrimentData Breach
IRIhttps://w3id.org/dpv/risk#Detrimenthttps://w3id.org/dpv/risk#DataBreach
Broader/Parent types risk:LegalRisk + risk:SecurityBreach + → risk:AvailabilityConcept +
Broader/Parent types risk:SecurityBreach + → risk:ConfidentialityConcept +
Broader/Parent types risk:SecurityBreach + → risk:IntegrityConcept +
Broader/Parent types risk:SecurityBreach + → risk:OperationalSecurityRiskdpv:RiskConcept
DefinitionSomething that acts as or causes DetrimentSomething that acts as or causes Data Breach
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0071 :: Using risk controls to express how tech/org measures address the risk
SourceISO/IEC 27005:2018
Date Created2022-03-232022-08-17
Date Modified
ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz EstevesHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONSEQUENCES in DEX
- + - + - + @@ -5652,7 +5913,10 @@

Discrimination

- + + @@ -5666,20 +5930,26 @@

Discrimination

- + - + + + + - + + + + - + @@ -5687,7 +5957,7 @@

Discrimination

- + @@ -5702,39 +5972,37 @@

Discrimination

-
-

Distributed Denial of Service Attack (DDoS)

+
+

Data Processing Bias

TermDiscriminationDataCorruption Prefix risk
LabelDiscriminationData Corruption
IRIhttps://w3id.org/dpv/risk#Discriminationhttps://w3id.org/dpv/risk#DataCorruption
Broader/Parent types risk:SocietalRisk + risk:IntegrityConcept +
Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept
DefinitionSomething that acts as or causes DiscriminationSomething that acts as or causes Corruption of Data
Usage NoteThis concept was called "Corruption Data" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2022-08-192022-08-17
Date Modified
ContributorsGeorg P. KrogHarshvardhan J. Pandit
- + - + - + - + - - - @@ -5747,7 +6015,7 @@

Distributed Denial of Service Attack (DDoS)

- + @@ -5756,28 +6024,25 @@

Distributed Denial of Service Attack (DDoS)

- + - + - - - - + - + - @@ -5785,23 +6050,23 @@

Distributed Denial of Service Attack (DDoS)

-
-

Environmental Incident

+
+

Deliberate Incident

TermDistributedDenialServiceAttackDataProcessingBias Prefix risk
LabelDistributed Denial of Service Attack (DDoS)Data Processing Bias
IRIhttps://w3id.org/dpv/risk#DistributedDenialServiceAttackhttps://w3id.org/dpv/risk#DataProcessingBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Distributed Denial of Service Attack (DDoS)Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + @@ -5831,7 +6096,7 @@

Environmental Incident

- + @@ -5861,23 +6126,23 @@

Environmental Incident

-
-

Environmental Risk

+
+

Denial of Service Attack (DoS)

TermEnvironmentalIncidentDeliberateIncident Prefix risk
LabelEnvironmental IncidentDeliberate Incident
IRIhttps://w3id.org/dpv/risk#EnvironmentalIncidenthttps://w3id.org/dpv/risk#DeliberateIncident
DefinitionIncident caused due to environmental factors outside human controlsIncident caused due to deliberate actions of a human
- + - + - + @@ -5889,7 +6154,11 @@

Environmental Risk

- + + @@ -5902,20 +6171,32 @@

Environmental Risk

- + - + + + + - - - + + + + + + + + + + + + @@ -5929,43 +6210,47 @@

Environmental Risk

-
-

Equipment Failure

+
+

Detection Control

TermEnvironmentalRiskDenialServiceAttack Prefix risk
LabelEnvironmental RiskDenial of Service Attack (DoS)
IRIhttps://w3id.org/dpv/risk#EnvironmentalRiskhttps://w3id.org/dpv/risk#DenialServiceAttack
Broader/Parent types dpv:RiskConcept + risk:AvailabilityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
DefinitionRisks and issues that have their origin in environment or can affect the environment at largeSomething that acts as or causes Denial of Service Attack (DoS)
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - + + + + @@ -5974,40 +6259,28 @@

Equipment Failure

- + - - - - + - - - - + - + - - - - - - - - + + - @@ -6016,23 +6289,23 @@

Equipment Failure

-
-

Equipment Malfunction

+
+

Detriment

TermEquipmentFailureDetectionControl Prefix risk
LabelEquipment FailureDetection Control
IRIhttps://w3id.org/dpv/risk#EquipmentFailurehttps://w3id.org/dpv/risk#DetectionControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Equipment FailureControl to detect event
Usage NoteHere equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -6044,10 +6317,7 @@

Equipment Malfunction

- - - @@ -6061,26 +6331,20 @@

Equipment Malfunction

- + - - - - + - - - - + - + @@ -6088,7 +6352,7 @@

Equipment Malfunction

- + @@ -6103,23 +6367,23 @@

Equipment Malfunction

-
-

Erroneous System Use

+
+

Discrimination

TermEquipmentMalfunctionDetriment Prefix risk
LabelEquipment MalfunctionDetriment
IRIhttps://w3id.org/dpv/risk#EquipmentMalfunctionhttps://w3id.org/dpv/risk#Detriment
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:OperationalSecurityRisk + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Equipment MalfunctionSomething that acts as or causes Detriment
Usage NoteHere equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-172022-03-23
Date Modified
ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
- + - + - + @@ -6131,7 +6395,7 @@

Erroneous System Use

- @@ -6145,23 +6409,20 @@

Erroneous System Use

- + - - - - + - + @@ -6169,7 +6430,7 @@

Erroneous System Use

- + @@ -6184,25 +6445,23 @@

Erroneous System Use

- - -
-

Exposure to Harmful Speech

+
+

Distributed Denial of Service Attack (DDoS)

TermErroneousSystemUseDiscrimination Prefix risk
LabelErroneous System UseDiscrimination
IRIhttps://w3id.org/dpv/risk#ErroneousSystemUsehttps://w3id.org/dpv/risk#Discrimination
Broader/Parent types risk:UserRisks + risk:SocietalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Erroneous System UseSomething that acts as or causes Discrimination
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-19
Date Modified
ContributorsHarshvardhan J. PanditGeorg P. Krog
- + - + - + @@ -6214,7 +6473,10 @@

Exposure to Harmful Speech

- + + @@ -6228,19 +6490,16 @@

Exposure to Harmful Speech

- + - - - - + - + @@ -6269,40 +6528,44 @@

Exposure to Harmful Speech

- -
-

External Security Threat

+
+

Environmental Incident

TermExposureToHarmfulSpeechDistributedDenialServiceAttack Prefix risk
LabelExposure to Harmful SpeechDistributed Denial of Service Attack (DDoS)
IRIhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeechhttps://w3id.org/dpv/risk#DistributedDenialServiceAttack
Broader/Parent types risk:SocietalRisk + risk:AvailabilityConcept +
Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept
DefinitionSomething that acts as or causes Harmful SpeechSomething that acts as or causes Distributed Denial of Service Attack (DDoS)
Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
- + - + - + - + - - + + + + @@ -6311,7 +6574,7 @@

External Security Threat

- + @@ -6322,14 +6585,17 @@

External Security Threat

- + + + + - @@ -6338,23 +6604,23 @@

External Security Threat

-
-

Extorsion

+
+

Environmental Risk

TermExternalSecurityThreatEnvironmentalIncident Prefix risk
LabelExternal Security ThreatEnvironmental Incident
IRIhttps://w3id.org/dpv/risk#ExternalSecurityThreathttps://w3id.org/dpv/risk#EnvironmentalIncident
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types dpv:RiskConcept + risk:Incident + → dpv:RiskConcept
Object of relation risk:hasIncident +
DefinitionConcepts associated with security threats that are likely to originate externallyIncident caused due to environmental factors outside human controls
Date Created2024-05-19
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + @@ -6366,11 +6632,7 @@

Extorsion

- - - @@ -6383,32 +6645,20 @@

Extorsion

- + - - - - + - - - - - - - - - - - - + + + @@ -6422,44 +6672,43 @@

Extorsion

-
-

Extremely High Likelihood

+
+

Equipment Failure

TermExtorsionEnvironmentalRisk Prefix risk
LabelExtorsionEnvironmental Risk
IRIhttps://w3id.org/dpv/risk#Extorsionhttps://w3id.org/dpv/risk#EnvironmentalRisk
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + dpv:RiskConcept
DefinitionSomething that acts as or causes ExtorsionRisks and issues that have their origin in environment or can affect the environment at large
SourceENISA Threat Taxonomy 2016
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - + + - - - - + @@ -6468,25 +6717,31 @@

Extremely High Likelihood

- + - + - + + + + - + - + + + + @@ -6495,7 +6750,7 @@

Extremely High Likelihood

- @@ -6504,44 +6759,43 @@

Extremely High Likelihood

-
-

Extremely High Risk

+
+

Equipment Malfunction

TermExtremelyHighLikelihoodEquipmentFailure Prefix risk
LabelExtremely High LikelihoodEquipment Failure
IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihoodhttps://w3id.org/dpv/risk#EquipmentFailure
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:AvailabilityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasLikelihood -
DefinitionLevel where Likelihood is Extremely HighSomething that acts as or causes Equipment Failure
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - - - - + @@ -6550,25 +6804,31 @@

Extremely High Risk

- + - + - + + + + - + - + + + + @@ -6577,7 +6837,7 @@

Extremely High Risk

- @@ -6586,44 +6846,40 @@

Extremely High Risk

-
-

Extremely High Severity

+
+

Erroneous System Use

TermExtremelyHighRiskEquipmentMalfunction Prefix risk
LabelExtremely High RiskEquipment Malfunction
IRIhttps://w3id.org/dpv/risk#ExtremelyHighRiskhttps://w3id.org/dpv/risk#EquipmentMalfunction
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:AvailabilityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasRiskLevel -
DefinitionLevel where Risk is Extremely HighSomething that acts as or causes Equipment Malfunction
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -6632,25 +6888,28 @@

Extremely High Severity

- + - - - - + - + + + + - + - + + + + @@ -6659,7 +6918,7 @@

Extremely High Severity

- @@ -6668,23 +6927,261 @@

Extremely High Severity

-
-

Extremely Low Likelihood

+ + +
+

Exposure to Harmful Speech

TermExtremelyHighSeverityErroneousSystemUse Prefix risk
LabelExtremely High SeverityErroneous System Use
IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverityhttps://w3id.org/dpv/risk#ErroneousSystemUse
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:UserRisks + → dpv:RiskConcept
Object of relation dpv:hasSeverity -
DefinitionLevel where Severity is Extremely HighSomething that acts as or causes Erroneous System Use
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowLikelihoodExposureToHarmfulSpeech Prefix risk
LabelExtremely Low LikelihoodExposure to Harmful Speech
IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihoodhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeech
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Harmful Speech
Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

External Security Threat

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExternalSecurityThreatPrefixrisk
LabelExternal Security Threat
IRIhttps://w3id.org/dpv/risk#ExternalSecurityThreat
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept +
DefinitionConcepts associated with security threats that are likely to originate externally
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Extorsion

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtorsionPrefixrisk
LabelExtorsion
IRIhttps://w3id.org/dpv/risk#Extorsion
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Extorsion
SourceENISA Threat Taxonomy 2016
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Extremely High Likelihood

+ + + + + + + + + + + + + + + @@ -6714,11 +7211,11 @@

Extremely Low Likelihood

- + - + @@ -6750,42 +7247,1372 @@

Extremely Low Likelihood

-
-

Extremely Low Risk

+
+

Extremely High Risk

TermExtremelyHighLikelihoodPrefixrisk
LabelExtremely High Likelihood
IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihood
DefinitionLevel where Likelihood is Extremely LowLevel where Likelihood is Extremely High
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
- + - + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowRiskExtremelyHighRisk Prefix risk
LabelExtremely Low RiskExtremely High Risk
IRIhttps://w3id.org/dpv/risk#ExtremelyLowRiskhttps://w3id.org/dpv/risk#ExtremelyHighRisk
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
Object of relation dpv:hasRiskLevel +
DefinitionLevel where Risk is Extremely High
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely High Severity

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyHighSeverityPrefixrisk
LabelExtremely High Severity
IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverity
Typerdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:7SeverityLevels + → dpv:Severity +
Object of relation dpv:hasSeverity +
DefinitionLevel where Severity is Extremely High
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely Low Likelihood

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowLikelihoodPrefixrisk
LabelExtremely Low Likelihood
IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihood
Typerdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood +
Object of relation dpv:hasLikelihood +
DefinitionLevel where Likelihood is Extremely Low
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely Low Risk

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowRiskPrefixrisk
LabelExtremely Low Risk
IRIhttps://w3id.org/dpv/risk#ExtremelyLowRisk
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
Object of relation dpv:hasRiskLevel +
DefinitionLevel where Risk is Extremely Low
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely Low Severity

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowSeverityPrefixrisk
LabelExtremely Low Severity
IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverity
Typerdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:7SeverityLevels + → dpv:Severity +
Object of relation dpv:hasSeverity +
DefinitionLevel where Severity is Extremely Low
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Fee

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFeePrefixrisk
LabelFee
IRIhttps://w3id.org/dpv/risk#Fee
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:FinancialImpact + → dpv:RiskConcept +
DefinitionSomething that acts as or provides fees e.g. for using a service
Source
Date Created2024-04-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Financial Impact

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFinancialImpactPrefixrisk
LabelFinancial Impact
IRIhttps://w3id.org/dpv/risk#FinancialImpact
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept +
DefinitionThings that cause or have the potential to impact financial resources
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Financial Loss

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFinancialLossPrefixrisk
LabelFinancial Loss
IRIhttps://w3id.org/dpv/risk#FinancialLoss
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:FinancialImpact + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Fraud

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFraudPrefixrisk
LabelFraud
IRIhttps://w3id.org/dpv/risk#Fraud
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Fraud
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Group Attribution Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermGroupAttributionBiasPrefixrisk
LabelGroup Attribution Bias
IRIhttps://w3id.org/dpv/risk#GroupAttributionBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:CognitiveBias + → risk:Bias + → risk:RiskConcept +
DefinitionBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in RISK +
+
+ + + +
+

Halt Source

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHaltSourcePrefixrisk
LabelHalt Source
IRIhttps://w3id.org/dpv/risk#HaltSource
Typerdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionControl that halts the risk source or prevents it from materialising
Date Created2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK +
+
+ + + +
+

Harm

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHarmPrefixrisk
LabelHarm
IRIhttps://w3id.org/dpv/risk#Harm
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IndividualRisk +
DefinitionSomething that acts as or causes Harm to humans
Usage NoteThis concept refers to the general abstract notion of harm
Date Created2022-08-13
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + + + + + + + + + + + +
+

High Likelihood

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHighLikelihoodPrefixrisk
LabelHigh Likelihood
IRIhttps://w3id.org/dpv/risk#HighLikelihood
Typerdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:3LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood +
Object of relation dpv:hasLikelihood +
DefinitionLevel where Likelihood is High
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

High Risk

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHighRiskPrefixrisk
LabelHigh Risk
IRIhttps://w3id.org/dpv/risk#HighRisk
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:3RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
Object of relation dpv:hasRiskLevel +
DefinitionLevel where Risk is High
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

High Severity

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHighSeverityPrefixrisk
LabelHigh Severity
IRIhttps://w3id.org/dpv/risk#HighSeverity
Typerdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:3SeverityLevels + → dpv:Severity +
Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
Broader/Parent types risk:7SeverityLevels + → dpv:Severity +
Object of relation dpv:hasSeverity +
DefinitionLevel where Severity is High
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Human Errors

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHumanErrorsPrefixrisk
LabelHuman Errors
IRIhttps://w3id.org/dpv/risk#HumanErrors
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:UserRisks + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Human Errors
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Identification Control

+ + + + + + + + + + + + + + + - + - - @@ -6796,12 +8623,9 @@

Extremely Low Risk

- + - - - - + @@ -6812,18 +8636,15 @@

Extremely Low Risk

- + - - - - + - @@ -6832,44 +8653,43 @@

Extremely Low Risk

-
-

Extremely Low Severity

+
+

Identity Fraud

TermIdentificationControlPrefixrisk
LabelIdentification Control
IRIhttps://w3id.org/dpv/risk#IdentificationControl
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasRiskLevel + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Risk is Extremely LowControl to identify characteristics of event
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-182024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - + + - - - - + @@ -6878,25 +8698,28 @@

Extremely Low Severity

- + - - - - + - + + + + - + - + + + + @@ -6905,7 +8728,7 @@

Extremely Low Severity

- @@ -6914,23 +8737,23 @@

Extremely Low Severity

-
-

Fee

+
+

Identity Theft

TermExtremelyLowSeverityIdentityFraud Prefix risk
LabelExtremely Low SeverityIdentity Fraud
IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverityhttps://w3id.org/dpv/risk#IdentityFraud
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:ConfidentialityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasSeverity -
DefinitionLevel where Severity is Extremely LowSomething that acts as or causes Identity Fraud
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
SourceENISA Threat Taxonomy 2016
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -6942,7 +8765,10 @@

Fee

- + + @@ -6956,7 +8782,7 @@

Fee

- + @@ -6965,14 +8791,14 @@

Fee

- + - + @@ -6980,7 +8806,7 @@

Fee

- + @@ -6995,23 +8821,23 @@

Fee

-
-

Financial Impact

+
+

Illegal Data Processing

TermFeeIdentityTheft Prefix risk
LabelFeeIdentity Theft
IRIhttps://w3id.org/dpv/risk#Feehttps://w3id.org/dpv/risk#IdentityTheft
Broader/Parent types risk:FinancialImpact + risk:ConfidentialityConcept +
Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept
DefinitionSomething that acts as or provides fees e.g. for using a serviceSomething that acts as or causes Identity Theft
SourceENISA Threat Taxonomy 2016
Date Created2024-04-142022-08-17
Date Modified
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
- + - + - + @@ -7023,7 +8849,8 @@

Financial Impact

- @@ -7036,20 +8863,35 @@

Financial Impact

- + - + + + + - + + + + - - - + + + + + + + + + + + + @@ -7063,40 +8905,47 @@

Financial Impact

-
-

Financial Loss

+
+

Impact Control

TermFinancialImpactIllegalDataProcessing Prefix risk
LabelFinancial ImpactIllegal Data Processing
IRIhttps://w3id.org/dpv/risk#FinancialImpacthttps://w3id.org/dpv/risk#IllegalDataProcessing
Broader/Parent types dpv:RiskConcept + risk:LegalRisk + → dpv:RiskConcept
DefinitionThings that cause or have the potential to impact financial resourcesSomething that acts as or causes Illegal Processing of Data
Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - + + + + @@ -7105,28 +8954,22 @@

Financial Loss

- + - - - - + - + - - - - + @@ -7135,7 +8978,7 @@

Financial Loss

- @@ -7144,39 +8987,37 @@

Financial Loss

-
-

Fraud

+
+

Implicit Bias

TermFinancialLossImpactControl Prefix risk
LabelFinancial LossImpact Control
IRIhttps://w3id.org/dpv/risk#FinancialLosshttps://w3id.org/dpv/risk#ImpactControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunityRisk Mitigation Measure that controls Impacts
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - @@ -7189,7 +9030,7 @@

Fraud

- + @@ -7198,28 +9039,25 @@

Fraud

- + - + - - - - + - + - @@ -7227,47 +9065,41 @@

Fraud

- -
-

Halt Source

+
+

Incident

TermFraudImplicitBias Prefix risk
LabelFraudImplicit Bias
IRIhttps://w3id.org/dpv/risk#Fraudhttps://w3id.org/dpv/risk#ImplicitBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes FraudBias that occurs when a human makes an association or assumption based on their mental models and memories
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - @@ -7278,10 +9110,16 @@

Halt Source

- + + + + + - + + + @@ -7291,59 +9129,73 @@

Halt Source

- + - + + + + - + -
TermHaltSourceIncident Prefix risk
LabelHalt SourceIncident
IRIhttps://w3id.org/dpv/risk#HaltSourcehttps://w3id.org/dpv/risk#Incident
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasIncident
DefinitionControl that halts the risk source or prevents it from materialisingAn actual or occured event
Usage NoteIncident is realised or materialised risk
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0070 :: Indicating personal data involved in an incident
Date Created2024-05-192024-02-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
See More: section RISK-CONTROLS in RISK + section CORE in DEX + , section INCIDENT in DEX
+ + - -
-

Harm

+
+

Incident Assessment Report

- + - + - + - + - - + + + + @@ -7352,12 +9204,9 @@

Harm

- + - - - - + @@ -7368,21 +9217,15 @@

Harm

- + - - - - - - - - + + - @@ -7391,60 +9234,44 @@

Harm

- - - - - - - - - - -
-

High Likelihood

+
+

Incident Concluded

TermHarmIncidentAssessmentReport Prefix risk
LabelHarmIncident Assessment Report
IRIhttps://w3id.org/dpv/risk#Harmhttps://w3id.org/dpv/risk#IncidentAssessmentReport
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:IndividualRisk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
DefinitionSomething that acts as or causes Harm to humansA report describing the assessment of an incident in terms of its effects or impacts
Usage NoteThis concept refers to the general abstract notion of harm
Date Created2022-08-132024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + - + - - - - - - @@ -7455,12 +9282,9 @@

High Likelihood

- + - - - - + @@ -7471,7 +9295,7 @@

High Likelihood

- + @@ -7482,7 +9306,7 @@

High Likelihood

- @@ -7490,51 +9314,46 @@

High Likelihood

- -
-

High Risk

+
+

Incident Concluding Report

TermHighLikelihoodIncidentConcluded Prefix risk
LabelHigh LikelihoodIncident Concluded
IRIhttps://w3id.org/dpv/risk#HighLikelihoodhttps://w3id.org/dpv/risk#IncidentConcluded
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasLikelihood + dpv:hasContext, + dpv:hasStatus
DefinitionLevel where Likelihood is HighThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-182024-02-14
See More: section RISK-LEVELS in RISK + section INCIDENT-STATUS in RISK
- + - + - + - + - - - - - - @@ -7545,12 +9364,9 @@

High Risk

- + - - - - + @@ -7561,18 +9377,15 @@

High Risk

- + - - - - + - @@ -7580,51 +9393,46 @@

High Risk

- -
-

High Severity

+
+

Incident Detection Report

TermHighRiskIncidentConcludingReport Prefix risk
LabelHigh RiskIncident Concluding Report
IRIhttps://w3id.org/dpv/risk#HighRiskhttps://w3id.org/dpv/risk#IncidentConcludingReport
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasRiskLevel + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionLevel where Risk is HighA report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-182024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
- + - + - + - + - - - - - - @@ -7635,12 +9443,9 @@

High Severity

- + - - - - + @@ -7651,18 +9456,15 @@

High Severity

- + - - - - + - @@ -7671,40 +9473,46 @@

High Severity

-
-

Human Errors

+
+

Incident Halted

TermHighSeverityIncidentDetectionReport Prefix risk
LabelHigh SeverityIncident Detection Report
IRIhttps://w3id.org/dpv/risk#HighSeverityhttps://w3id.org/dpv/risk#IncidentDetectionReport
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasSeverity + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionLevel where Severity is HighA report describing the detection of a Incident
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-182024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
- + - + - + - + - - + + + + @@ -7713,28 +9521,22 @@

Human Errors

- + - - - - + - + - - - - + @@ -7743,7 +9545,7 @@

Human Errors

- @@ -7751,46 +9553,46 @@

Human Errors

- -
-

Identification Control

+
+

Incident Handling Report

TermHumanErrorsIncidentHalted Prefix risk
LabelHuman ErrorsIncident Halted
IRIhttps://w3id.org/dpv/risk#HumanErrorshttps://w3id.org/dpv/risk#IncidentHalted
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types risk:UserRisks - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasContext, + dpv:hasStatus +
DefinitionSomething that acts as or causes Human ErrorsThe incident has halted or paused with a high likelihood of resuming or recurring
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-02-14
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
- + - + - + - + - - @@ -7801,7 +9603,7 @@

Identification Control

- + @@ -7822,7 +9624,7 @@

Identification Control

- @@ -7830,41 +9632,33 @@

Identification Control

- -
-

Identity Fraud

+
+

Incident Identifier

TermIdentificationControlIncidentHandlingReport Prefix risk
LabelIdentification ControlIncident Handling Report
IRIhttps://w3id.org/dpv/risk#IdentificationControlhttps://w3id.org/dpv/risk#IncidentHandlingReport
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionControl to identify characteristics of eventA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
- + - + - + - + - - - - - + @@ -7876,37 +9670,28 @@

Identity Fraud

- + - - - - + - + - - - - - - - - + + - @@ -7914,44 +9699,51 @@

Identity Fraud

- -
-

Identity Theft

+
+

Incident Impact Assessment

TermIdentityFraudIncidentIdentifier Prefix risk
LabelIdentity FraudIncident Identifier
IRIhttps://w3id.org/dpv/risk#IdentityFraudhttps://w3id.org/dpv/risk#IncidentIdentifier
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Identity FraudIdentifier associated with an incident
SourceENISA Threat Taxonomy 2016
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + - + - - - - + + + + @@ -7960,28 +9752,22 @@

Identity Theft

- + - - - - + - + - - - - + @@ -7990,7 +9776,7 @@

Identity Theft

- @@ -7999,40 +9785,46 @@

Identity Theft

-
-

Illegal Data Processing

+
+

Incident Mitigated

TermIdentityTheftIncidentImpactAssessment Prefix risk
LabelIdentity TheftIncident Impact Assessment
IRIhttps://w3id.org/dpv/risk#IdentityThefthttps://w3id.org/dpv/risk#IncidentImpactAssessment
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:ImpactAssessment + → dpv:RiskAssessment + → dpv:Assessment + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasAssessment, + dpv:hasImpactAssessment, + dpv:hasOrganisationalMeasure, + dpv:hasRiskAssessment, + dpv:hasTechnicalOrganisationalMeasure +
DefinitionSomething that acts as or causes Identity TheftAn impact assessment associated with a incident
SourceENISA Threat Taxonomy 2016
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + - + - - + + + + @@ -8041,31 +9833,22 @@

Illegal Data Processing

- + - - - - + - - - - + - + - - - - + @@ -8074,7 +9857,7 @@

Illegal Data Processing

- @@ -8082,37 +9865,35 @@

Illegal Data Processing

- -
-

Impact Control

+
+

Incident Mitigation Measure

TermIllegalDataProcessingIncidentMitigated Prefix risk
LabelIllegal Data ProcessingIncident Mitigated
IRIhttps://w3id.org/dpv/risk#IllegalDataProcessinghttps://w3id.org/dpv/risk#IncidentMitigated
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasContext, + dpv:hasStatus +
DefinitionSomething that acts as or causes Illegal Processing of DataThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2022-08-172024-02-14
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
- + - + - + - + - @@ -8120,8 +9901,7 @@

Impact Control

@@ -8132,7 +9912,7 @@

Impact Control

- + @@ -8148,15 +9928,12 @@

Impact Control

- - - - + - @@ -8164,41 +9941,45 @@

Impact Control

-
-

Incident

+ +
+

Incident Near Miss

TermImpactControlIncidentMitigationMeasure Prefix risk
LabelImpact ControlIncident Mitigation Measure
IRIhttps://w3id.org/dpv/risk#ImpactControlhttps://w3id.org/dpv/risk#IncidentMitigationMeasure
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure + dpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:isMitigatedByMeasure
DefinitionRisk Mitigation Measure that controls ImpactsA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
- + - + - + - + - - @@ -8209,16 +9990,10 @@

Incident

- + - - - - - - - + @@ -8228,48 +10003,42 @@

Incident

- + - - - - + - + -
TermIncidentIncidentNearMiss Prefix risk
LabelIncidentIncident Near Miss
IRIhttps://w3id.org/dpv/risk#Incidenthttps://w3id.org/dpv/risk#IncidentNearMiss
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation risk:hasIncident + dpv:hasContext, + dpv:hasStatus
DefinitionAn actual or occured eventThe state where an incident was almost successful in taking place i.e. "it came very close"
Usage NoteIncident is realised or materialised risk
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0070 :: Indicating personal data involved in an incident
Date Created2024-05-192024-02-14
Date Modified2024-08-16
ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio FernandezHarshvardhan J. Pandit
See More: section CORE in DEX - , section INCIDENT in DEX + section INCIDENT-STATUS in RISK
- - -
-

Incident Assessment Report

+
+

Incident Notice

- + - + - + @@ -8281,8 +10050,7 @@

Incident Assessment Report

- @@ -8290,8 +10058,8 @@

Incident Assessment Report

- @@ -8303,7 +10071,7 @@

Incident Assessment Report

- + @@ -8333,23 +10101,23 @@

Incident Assessment Report

-
-

Incident Concluded

+
+

Incident Ongoing

TermIncidentAssessmentReportIncidentNotice Prefix risk
LabelIncident Assessment ReportIncident Notice
IRIhttps://w3id.org/dpv/risk#IncidentAssessmentReporthttps://w3id.org/dpv/risk#IncidentNotice
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities + dpv:Noticedpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, + dpv:hasNotice, + dpv:hasOrganisationalMeasure, dpv:hasTechnicalOrganisationalMeasure
DefinitionA report describing the assessment of an incident in terms of its effects or impactsNotice associated with an Incident
- + - + - + @@ -8381,7 +10149,7 @@

Incident Concluded

- + @@ -8413,23 +10181,23 @@

Incident Concluded

-
-

Incident Concluding Report

+
+

Incident Ongoing Report

TermIncidentConcludedIncidentOngoing Prefix risk
LabelIncident ConcludedIncident Ongoing
IRIhttps://w3id.org/dpv/risk#IncidentConcludedhttps://w3id.org/dpv/risk#IncidentOngoing
DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringThe incident is ongoing i.e. still active
- + - + - + @@ -8463,7 +10231,7 @@

Incident Concluding Report

- + @@ -8492,23 +10260,23 @@

Incident Concluding Report

-
-

Incident Detection Report

+
+

Incident Preliminary Report

TermIncidentConcludingReportIncidentOngoingReport Prefix risk
LabelIncident Concluding ReportIncident Ongoing Report
IRIhttps://w3id.org/dpv/risk#IncidentConcludingReporthttps://w3id.org/dpv/risk#IncidentOngoingReport
DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
- + - + - + @@ -8542,7 +10310,7 @@

Incident Detection Report

- + @@ -8571,45 +10339,45 @@

Incident Detection Report

- -
-

Incident Halted

+
+

Incident Register

TermIncidentDetectionReportIncidentPreliminaryReport Prefix risk
LabelIncident Detection ReportIncident Preliminary Report
IRIhttps://w3id.org/dpv/risk#IncidentDetectionReporthttps://w3id.org/dpv/risk#IncidentPreliminaryReport
DefinitionA report describing the detection of a IncidentA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
- + - + - + - + - - @@ -8620,7 +10388,7 @@

Incident Halted

- + @@ -8633,7 +10401,7 @@

Incident Halted

- + @@ -8644,7 +10412,7 @@

Incident Halted

- @@ -8652,23 +10420,23 @@

Incident Halted

-
-

Incident Handling Report

+
+

Incident Report

TermIncidentHaltedIncidentRegister Prefix risk
LabelIncident HaltedIncident Register
IRIhttps://w3id.org/dpv/risk#IncidentHaltedhttps://w3id.org/dpv/risk#IncidentRegister
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringA register recording incidentes, their reports, notifications, and other related activities
Date Created2024-02-142024-05-19
See More: section INCIDENT-STATUS in RISK + section INCIDENT in RISK
- + - + - + @@ -8680,8 +10448,7 @@

Incident Handling Report

- @@ -8702,7 +10469,7 @@

Incident Handling Report

- + @@ -8731,23 +10498,23 @@

Incident Handling Report

-
-

Incident Identifier

+
+

Incident Status

TermIncidentHandlingReportIncidentReport Prefix risk
LabelIncident Handling ReportIncident Report
IRIhttps://w3id.org/dpv/risk#IncidentHandlingReporthttps://w3id.org/dpv/risk#IncidentReport
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities + dpv:RecordsOfActivitiesdpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceDocumented information about an incident, its handling, assessments,and notifications
- + - + - + @@ -8757,10 +10524,19 @@

Incident Identifier

- + + + - + + + + @@ -8769,10 +10545,13 @@

Incident Identifier

- + + + + @@ -8782,15 +10561,18 @@

Incident Identifier

- + - + + + + - @@ -8798,49 +10580,45 @@

Incident Identifier

-
-

Incident Impact Assessment

+ +
+

Incident Status Unknown

TermIncidentIdentifierIncidentStatus Prefix risk
LabelIncident IdentifierIncident Status
IRIhttps://w3id.org/dpv/risk#IncidentIdentifierhttps://w3id.org/dpv/risk#IncidentStatus
rdfs:Class, skos:Concept
Broader/Parent types dpv:Status + → dpv:Context +
Object of relation dpv:hasContext, + dpv:hasStatus +
DefinitionIdentifier associated with an incidentStatus associated with an incident
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
Date Created2024-05-192024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT in RISK + section INCIDENT-STATUS in DEX
- + - + - + - + - - @@ -8851,7 +10629,7 @@

Incident Impact Assessment

- + @@ -8864,7 +10642,7 @@

Incident Impact Assessment

- + @@ -8875,7 +10653,7 @@

Incident Impact Assessment

- @@ -8884,23 +10662,23 @@

Incident Impact Assessment

-
-

Incident Mitigated

+
+

Incident Suspected

TermIncidentImpactAssessmentIncidentStatusUnknown Prefix risk
LabelIncident Impact AssessmentIncident Status Unknown
IRIhttps://w3id.org/dpv/risk#IncidentImpactAssessmenthttps://w3id.org/dpv/risk#IncidentStatusUnknown
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types dpv:ImpactAssessment - → dpv:RiskAssessment - → dpv:Assessment - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasAssessment, - dpv:hasImpactAssessment, - dpv:hasOrganisationalMeasure, - dpv:hasRiskAssessment, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasContext, + dpv:hasStatus
DefinitionAn impact assessment associated with a incidentThe status of a incident is unknown
Date Created2024-05-192024-02-14
See More: section INCIDENT in RISK + section INCIDENT-STATUS in RISK
- + - + - + @@ -8932,7 +10710,7 @@

Incident Mitigated

- + @@ -8964,23 +10742,23 @@

Incident Mitigated

-
-

Incident Mitigation Measure

+
+

Incident Suspected Report

TermIncidentMitigatedIncidentSuspected Prefix risk
LabelIncident MitigatedIncident Suspected
IRIhttps://w3id.org/dpv/risk#IncidentMitigatedhttps://w3id.org/dpv/risk#IncidentSuspected
DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
- + - + - + @@ -8992,15 +10770,18 @@

Incident Mitigation Measure

- - @@ -9011,7 +10792,7 @@

Incident Mitigation Measure

- + @@ -9041,23 +10822,23 @@

Incident Mitigation Measure

-
-

Incident Near Miss

+
+

Incident Terminated

TermIncidentMitigationMeasureIncidentSuspectedReport Prefix risk
LabelIncident Mitigation MeasureIncident Suspected Report
IRIhttps://w3id.org/dpv/risk#IncidentMitigationMeasurehttps://w3id.org/dpv/risk#IncidentSuspectedReport
Broader/Parent types dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againA report describing the suspicion of an incident in the past or occuring
- + - + - + @@ -9089,7 +10870,7 @@

Incident Near Miss

- + @@ -9121,57 +10902,47 @@

Incident Near Miss

-
-

Incident Notice

+ +
+

Individual Health & Safety

TermIncidentNearMissIncidentTerminated Prefix risk
LabelIncident Near MissIncident Terminated
IRIhttps://w3id.org/dpv/risk#IncidentNearMisshttps://w3id.org/dpv/risk#IncidentTerminated
DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
- + - + - + - + - - - - - + - - - - + @@ -9181,17 +10952,14 @@

Incident Notice

- - - - + - @@ -9199,47 +10967,36 @@

Incident Notice

- -
-

Incident Ongoing

+
+

Individual Risk

TermIncidentNoticeIndividualHealthSafety Prefix risk
LabelIncident NoticeIndividual Health & Safety
IRIhttps://w3id.org/dpv/risk#IncidentNoticehttps://w3id.org/dpv/risk#IndividualHealthSafety
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:Notice - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
Object of relation dpv:hasNotice, - dpv:hasOrganisationalMeasure, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionNotice associated with an Incident
Date Created2024-05-19
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - + - - - - + @@ -9248,7 +11005,7 @@

Incident Ongoing

- + @@ -9259,20 +11016,14 @@

Incident Ongoing

- - - - + - - - - + - @@ -9280,48 +11031,40 @@

Incident Ongoing

-
-

Incident Ongoing Report

+ +
+

Informativeness Bias

TermIncidentOngoingIndividualRisk Prefix risk
LabelIncident OngoingIndividual Risk
IRIhttps://w3id.org/dpv/risk#IncidentOngoinghttps://w3id.org/dpv/risk#IndividualRisk
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context -
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe incident is ongoing i.e. still activeRisks and issues that affect or have the potential to affect specific individuals
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -9330,28 +11073,34 @@

Incident Ongoing Report

- + - + + + + - + - + + + + - @@ -9359,48 +11108,42 @@

Incident Ongoing Report

-
-

Incident Preliminary Report

+ +
+

In-Group Bias

TermIncidentOngoingReportInformativenessBias Prefix risk
LabelIncident Ongoing ReportInformativeness Bias
IRIhttps://w3id.org/dpv/risk#IncidentOngoingReporthttps://w3id.org/dpv/risk#InformativenessBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:EngineeringDecisionBias
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section INCIDENT in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -9409,28 +11152,34 @@

Incident Preliminary Report

- + - + + + + - + - + + + + - @@ -9438,47 +11187,40 @@

Incident Preliminary Report

-
-

Incident Register

+ +
+

Injury

TermIncidentPreliminaryReportInGroupBias Prefix risk
LabelIncident Preliminary ReportIn-Group Bias
IRIhttps://w3id.org/dpv/risk#IncidentPreliminaryReporthttps://w3id.org/dpv/risk#InGroupBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownBias that occurs when showing partiality to one's own group or own characteristics
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section INCIDENT in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -9487,22 +11229,28 @@

Incident Register

- + - + + + + - + - + + + + @@ -9511,7 +11259,7 @@

Incident Register

- @@ -9519,57 +11267,77 @@

Incident Register

-
-

Incident Report

+ +
+

None

TermIncidentRegisterInjury Prefix risk
LabelIncident RegisterInjury
IRIhttps://w3id.org/dpv/risk#IncidentRegisterhttps://w3id.org/dpv/risk#Injury
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA register recording incidentes, their reports, notifications, and other related activitiesSomething that acts as or causes Injury
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + + + + + + + + + + + - - - - + - - - - + @@ -9579,17 +11347,14 @@

Incident Report

- - - - + - @@ -9597,23 +11362,23 @@

Incident Report

-
-

Incident Status

+
+

Integrity Incident

TermIncidentReportIntegrityBreach Prefix risk
LabelIncident ReportNone
IRIhttps://w3id.org/dpv/risk#IncidentReporthttps://w3id.org/dpv/risk#IntegrityBreach
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:DataBreach + → risk:AvailabilityConcept +
Broader/Parent types risk:DataBreach + → risk:ConfidentialityConcept +
Broader/Parent types risk:DataBreach + → risk:IntegrityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionDocumented information about an incident, its handling, assessments,and notifications
Date Created2024-05-19
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -9625,15 +11390,14 @@

Incident Status

- - @@ -9644,13 +11408,10 @@

Incident Status

- + - - - @@ -9660,18 +11421,15 @@

Incident Status

- + - - - - + - @@ -9680,46 +11438,40 @@

Incident Status

-
-

Incident Status Unknown

+
+

Intentional Misuse

TermIncidentStatusIntegrityIncident Prefix risk
LabelIncident StatusIntegrity Incident
IRIhttps://w3id.org/dpv/risk#IncidentStatushttps://w3id.org/dpv/risk#IntegrityIncident
Broader/Parent types dpv:Status - → dpv:Context + risk:Incident + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus + risk:hasIncident
DefinitionStatus associated with an incidentIncident where the integrity of information or system has been affected
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
Date Created2024-02-142024-05-19
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in DEX + section INCIDENT in RISK
- + - + - + - + - - - - - + @@ -9728,7 +11480,7 @@

Incident Status Unknown

- + @@ -9739,20 +11491,14 @@

Incident Status Unknown

- - - - + - - - - + - @@ -9761,46 +11507,43 @@

Incident Status Unknown

-
-

Incident Suspected

+
+

Intercept Communications

TermIncidentStatusUnknownIntentionalMisuse Prefix risk
LabelIncident Status UnknownIntentional Misuse
IRIhttps://w3id.org/dpv/risk#IncidentStatusUnknownhttps://w3id.org/dpv/risk#IntentionalMisuse
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:UserRisks + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe status of a incident is unknownIntentional Misuse
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - - - - + @@ -9809,22 +11552,31 @@

Incident Suspected

- + - + + + + - + + + + - + - + + + + @@ -9833,7 +11585,7 @@

Incident Suspected

- @@ -9841,48 +11593,45 @@

Incident Suspected

-
-

Incident Suspected Report

+ + + + + +
+

Judicial Costs

TermIncidentSuspectedInterceptCommunications Prefix risk
LabelIncident SuspectedIntercept Communications
IRIhttps://w3id.org/dpv/risk#IncidentSuspectedhttps://w3id.org/dpv/risk#InterceptCommunications
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingSomething that acts as or causes Interception of Communications
Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2024-02-142022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -9891,7 +11640,7 @@

Incident Suspected Report

- + @@ -9902,17 +11651,14 @@

Incident Suspected Report

- - - - + - @@ -9921,46 +11667,40 @@

Incident Suspected Report

-
-

Incident Terminated

+
+

Judicial Penalty

TermIncidentSuspectedReportJudicialCosts Prefix risk
LabelIncident Suspected ReportJudicial Costs
IRIhttps://w3id.org/dpv/risk#IncidentSuspectedReporthttps://w3id.org/dpv/risk#JudicialCosts
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA report describing the suspicion of an incident in the past or occuringSomething that involves or causes judicial costs to be paid
Date Created2024-05-19
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -9969,7 +11709,7 @@

Incident Terminated

- + @@ -9980,20 +11720,14 @@

Incident Terminated

- - - - + - - - - + - @@ -10002,23 +11736,23 @@

Incident Terminated

-
-

Individual Health & Safety

+
+

Legal Risk

TermIncidentTerminatedJudicialPenalty Prefix risk
LabelIncident TerminatedJudicial Penalty
IRIhttps://w3id.org/dpv/risk#IncidentTerminatedhttps://w3id.org/dpv/risk#JudicialPenalty
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringSomething that involves or causes judicial penalties to be paid
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -10030,7 +11764,7 @@

Individual Health & Safety

- @@ -10041,7 +11775,10 @@

Individual Health & Safety

- + + + + @@ -10066,33 +11803,38 @@

Individual Health & Safety

-
-

Individual Risk

+ +
+

Lose of Credibility

TermIndividualHealthSafetyLegalRisk Prefix risk
LabelIndividual Health & SafetyLegal Risk
IRIhttps://w3id.org/dpv/risk#IndividualHealthSafetyhttps://w3id.org/dpv/risk#LegalRisk
Broader/Parent types risk:IndividualRisk + dpv:RiskConcept
DefinitionRisks and issues that have their basis in legal requirements and enforcement
- + - + - + - + - + + + @@ -10104,20 +11846,32 @@

Individual Risk

- + - + + + + - - - + + + + + + + + + + + + @@ -10131,23 +11885,23 @@

Individual Risk

-
-

Injury

+
+

Lose of Customer Confidence

TermIndividualRiskLoseCredibility Prefix risk
LabelIndividual RiskLose of Credibility
IRIhttps://w3id.org/dpv/risk#IndividualRiskhttps://w3id.org/dpv/risk#LoseCredibility
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ReputationalRisk + → dpv:RiskConcept +
DefinitionRisks and issues that affect or have the potential to affect specific individualsSomething that acts as or causes Loss of Credibility
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -10159,7 +11913,8 @@

Injury

- @@ -10172,7 +11927,7 @@

Injury

- + @@ -10211,23 +11966,23 @@

Injury

-
-

None

+
+

Lose of Goodwill

TermInjuryLoseCustomerConfidence Prefix risk
LabelInjuryLose of Customer Confidence
IRIhttps://w3id.org/dpv/risk#Injuryhttps://w3id.org/dpv/risk#LoseCustomerConfidence
Broader/Parent types risk:IndividualRisk + risk:ReputationalRisk + → dpv:RiskConcept
DefinitionSomething that acts as or causes InjurySomething that acts as or causes Loss of Customer Confidence
- + - + - + @@ -10239,36 +11994,7 @@

None

- - - - - - - - - - - - - @@ -10280,19 +12006,34 @@

None

- + + + + - + + + + - - - + + + + + + + + + + + + @@ -10305,44 +12046,41 @@

None

-
-

Integrity Incident

+ +
+

Lose of Negotiating Capacity

TermIntegrityBreachLoseGoodwill Prefix risk
LabelNoneLose of Goodwill
IRIhttps://w3id.org/dpv/risk#IntegrityBreachhttps://w3id.org/dpv/risk#LoseGoodwill
Broader/Parent types risk:DataBreach - → risk:AvailabilityConcept -
Broader/Parent types risk:DataBreach - → risk:ConfidentialityConcept -
Broader/Parent types risk:DataBreach - → risk:IntegrityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:AvailabilityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:ConfidentialityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:IntegrityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:ReputationalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Loss of Goodwill
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - - + @@ -10351,28 +12089,37 @@

Integrity Incident

- + - + + + + - + - - + + + + + + + + - @@ -10381,23 +12128,23 @@

Integrity Incident

-
-

Intentional Misuse

+
+

Lose of Opportunity

TermIntegrityIncidentLoseNegotiatingCapacity Prefix risk
LabelIntegrity IncidentLose of Negotiating Capacity
IRIhttps://w3id.org/dpv/risk#IntegrityIncidenthttps://w3id.org/dpv/risk#LoseNegotiatingCapacity
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:Incident + risk:ReputationalRiskdpv:RiskConcept
Object of relation risk:hasIncident -
DefinitionIncident where the integrity of information or system has been affectedSomething that acts as or causes Loss of Negotiating Capacity
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -10409,7 +12156,7 @@

Intentional Misuse

- @@ -10423,20 +12170,32 @@

Intentional Misuse

- + - + + + + - - - + + + + + + + + + + + + @@ -10450,23 +12209,23 @@

Intentional Misuse

-
-

Intercept Communications

+
+

Lose of Reputation

TermIntentionalMisuseLoseOpportunity Prefix risk
LabelIntentional MisuseLose of Opportunity
IRIhttps://w3id.org/dpv/risk#IntentionalMisusehttps://w3id.org/dpv/risk#LoseOpportunity
Broader/Parent types risk:UserRisks + risk:ReputationalRiskdpv:RiskConcept
DefinitionIntentional MisuseSomething that acts as or causes Loss of Opportunity
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -10478,10 +12237,7 @@

Intercept Communications

- - - @@ -10495,12 +12251,9 @@

Intercept Communications

- + - - - - + @@ -10537,27 +12290,23 @@

Intercept Communications

- - - - -
-

Judicial Costs

+
+

Lose of Trust

TermInterceptCommunicationsLoseReputation Prefix risk
LabelIntercept CommunicationsLose of Reputation
IRIhttps://w3id.org/dpv/risk#InterceptCommunicationshttps://w3id.org/dpv/risk#LoseReputation
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat + risk:ReputationalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Interception of CommunicationsSomething that acts as or causes Loss of Reputation
Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
- + - + - + @@ -10569,7 +12318,7 @@

Judicial Costs

- @@ -10583,20 +12332,32 @@

Judicial Costs

- + - + + + + - - - + + + + + + + + + + + + @@ -10610,40 +12371,52 @@

Judicial Costs

-
-

Judicial Penalty

+
+

Low Likelihood

TermJudicialCostsLoseTrust Prefix risk
LabelJudicial CostsLose of Trust
IRIhttps://w3id.org/dpv/risk#JudicialCostshttps://w3id.org/dpv/risk#LoseTrust
Broader/Parent types risk:FinancialImpact + risk:ReputationalRiskdpv:RiskConcept
DefinitionSomething that involves or causes judicial costs to be paidSomething that acts as or causes Loss of Trust
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - + + + + - + + + + @@ -10652,9 +12425,12 @@

Judicial Penalty

- + - + + + + @@ -10663,14 +12439,20 @@

Judicial Penalty

- + + + + - + + + + - @@ -10679,39 +12461,52 @@

Judicial Penalty

-
-

Legal Risk

+
+

Low Risk

TermJudicialPenaltyLowLikelihood Prefix risk
LabelJudicial PenaltyLow Likelihood
IRIhttps://w3id.org/dpv/risk#JudicialPenaltyhttps://w3id.org/dpv/risk#LowLikelihood
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
Object of relation dpv:hasLikelihood +
DefinitionSomething that involves or causes judicial penalties to be paidLevel where Likelihood is Low
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - + + + + - + + + + @@ -10720,9 +12515,12 @@

Legal Risk

- + - + + + + @@ -10731,14 +12529,20 @@

Legal Risk

- + + + + - + + + + - @@ -10747,40 +12551,52 @@

Legal Risk

-
-

Lose of Credibility

+
+

Low Severity

TermLegalRiskLowRisk Prefix risk
LabelLegal RiskLow Risk
IRIhttps://w3id.org/dpv/risk#LegalRiskhttps://w3id.org/dpv/risk#LowRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
Object of relation dpv:hasRiskLevel +
DefinitionRisks and issues that have their basis in legal requirements and enforcementLevel where Risk is Low
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - + + + + - + + + + @@ -10789,28 +12605,25 @@

Lose of Credibility

- + - + + + + - - - - + - + - - - - + @@ -10819,7 +12632,7 @@

Lose of Credibility

- @@ -10828,23 +12641,23 @@

Lose of Credibility

-
-

Lose of Customer Confidence

+
+

Malicious Code Attack

TermLoseCredibilityLowSeverity Prefix risk
LabelLose of CredibilityLow Severity
IRIhttps://w3id.org/dpv/risk#LoseCredibilityhttps://w3id.org/dpv/risk#LowSeverity
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
Broader/Parent types risk:7SeverityLevels + → dpv:Severity
Object of relation dpv:hasSeverity +
DefinitionSomething that acts as or causes Loss of CredibilityLevel where Severity is Low
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + @@ -10856,8 +12669,17 @@

Lose of Customer Confidence

- + + + + + + @@ -10870,7 +12692,7 @@

Lose of Customer Confidence

- + @@ -10879,7 +12701,7 @@

Lose of Customer Confidence

- + @@ -10909,23 +12731,23 @@

Lose of Customer Confidence

-
-

Lose of Goodwill

+
+

Malware Attack

TermLoseCustomerConfidenceMaliciousCodeAttack Prefix risk
LabelLose of Customer ConfidenceMalicious Code Attack
IRIhttps://w3id.org/dpv/risk#LoseCustomerConfidencehttps://w3id.org/dpv/risk#MaliciousCodeAttack
Broader/Parent types risk:ReputationalRisk + risk:AvailabilityConcept +
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionSomething that acts as or causes Loss of Customer ConfidenceSomething that acts as or causes Malicious Code Attack
SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
- + - + - + @@ -10937,8 +12759,17 @@

Lose of Goodwill

- + + + + + + @@ -10951,7 +12782,7 @@

Lose of Goodwill

- + @@ -10960,7 +12791,7 @@

Lose of Goodwill

- + @@ -10990,23 +12821,23 @@

Lose of Goodwill

-
-

Lose of Negotiating Capacity

+
+

Material Damage

TermLoseGoodwillMalwareAttack Prefix risk
LabelLose of GoodwillMalware Attack
IRIhttps://w3id.org/dpv/risk#LoseGoodwillhttps://w3id.org/dpv/risk#MalwareAttack
Broader/Parent types risk:ReputationalRisk + risk:AvailabilityConcept +
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionSomething that acts as or causes Loss of GoodwillSomething that acts as or causes Malware Attack
SourceISO/IEC 27005:2018ENISA Methodology for Sectoral Cybersecurity Assessments
- + - + - + @@ -11018,7 +12849,7 @@

Lose of Negotiating Capacity

- @@ -11032,23 +12863,23 @@

Lose of Negotiating Capacity

- + - + + + + - - - - + - + @@ -11071,23 +12902,23 @@

Lose of Negotiating Capacity

-
-

Lose of Opportunity

+
+

Misuse

TermLoseNegotiatingCapacityMaterialDamage Prefix risk
LabelLose of Negotiating CapacityMaterial Damage
IRIhttps://w3id.org/dpv/risk#LoseNegotiatingCapacityhttps://w3id.org/dpv/risk#MaterialDamage
Broader/Parent types risk:ReputationalRisk + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Loss of Negotiating CapacitySomething that acts as or causes Material Damage
Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
SourceISO/IEC 27005:2018
Date Created2022-08-172022-03-30
Date Modified
- + - + - + @@ -11099,7 +12930,7 @@

Lose of Opportunity

- @@ -11113,23 +12944,20 @@

Lose of Opportunity

- + - - - - + - + @@ -11137,7 +12965,7 @@

Lose of Opportunity

- + @@ -11152,40 +12980,52 @@

Lose of Opportunity

-
-

Lose of Reputation

+
+

Moderate Likelihood

TermLoseOpportunityMisuse Prefix risk
LabelLose of OpportunityMisuse
IRIhttps://w3id.org/dpv/risk#LoseOpportunityhttps://w3id.org/dpv/risk#Misuse
Broader/Parent types risk:ReputationalRisk + risk:UserRisksdpv:RiskConcept
DefinitionSomething that acts as or causes Loss of OpportunitySomething that acts as or causes Misuse
SourceISO/IEC 27005:2018
Date Created2022-08-172024-06-11
Date Modified
ContributorsHarshvardhan J. PanditDelaram Golpayegani
- + - + - + - + - + + + + - + + + + @@ -11194,28 +13034,25 @@

Lose of Reputation

- + - + + + + - - - - + - + - - - - + @@ -11224,7 +13061,7 @@

Lose of Reputation

- @@ -11233,40 +13070,52 @@

Lose of Reputation

-
-

Lose of Trust

+
+

Moderate Risk

TermLoseReputationModerateLikelihood Prefix risk
LabelLose of ReputationModerate Likelihood
IRIhttps://w3id.org/dpv/risk#LoseReputationhttps://w3id.org/dpv/risk#ModerateLikelihood
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
Object of relation dpv:hasLikelihood +
DefinitionSomething that acts as or causes Loss of ReputationLevel where Likelihood is Moderate
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - + + + + - + + + + @@ -11275,28 +13124,25 @@

Lose of Trust

- + - + + + + - - - - + - + - - - - + @@ -11305,7 +13151,7 @@

Lose of Trust

- @@ -11314,50 +13160,50 @@

Lose of Trust

-
-

Low Likelihood

+
+

Moderate Severity

TermLoseTrustModerateRisk Prefix risk
LabelLose of TrustModerate Risk
IRIhttps://w3id.org/dpv/risk#LoseTrusthttps://w3id.org/dpv/risk#ModerateRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
Object of relation dpv:hasRiskLevel +
DefinitionSomething that acts as or causes Loss of TrustLevel where Risk is Moderate
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - - - - @@ -11368,11 +13214,11 @@

Low Likelihood

- + - + @@ -11404,50 +13250,46 @@

Low Likelihood

-
-

Low Risk

+
+

Monitor Consequence

TermLowLikelihoodModerateSeverity Prefix risk
LabelLow LikelihoodModerate Severity
IRIhttps://w3id.org/dpv/risk#LowLikelihoodhttps://w3id.org/dpv/risk#ModerateSeverity
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood + risk:3SeverityLevels + → dpv:Severity
Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood + risk:5SeverityLevels + → dpv:Severity
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:7SeverityLevels + → dpv:Severity
Object of relation dpv:hasLikelihood + dpv:hasSeverity
DefinitionLevel where Likelihood is LowLevel where Severity is Moderate
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
- + - + - + - - - - - - - - + + + + - - @@ -11458,12 +13300,9 @@

Low Risk

- + - - - - + @@ -11474,7 +13313,7 @@

Low Risk

- + @@ -11485,7 +13324,7 @@

Low Risk

- @@ -11494,50 +13333,45 @@

Low Risk

-
-

Low Severity

+
+

Monitor Control

TermLowRiskMonitorConsequence Prefix risk
LabelLow RiskMonitor Consequence
IRIhttps://w3id.org/dpv/risk#LowRiskhttps://w3id.org/dpv/risk#MonitorConsequence
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
rdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasRiskLevel + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Risk is LowControl that monitors a Risk Consequence
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Date Created2022-08-182024-05-19
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - @@ -11548,11 +13382,11 @@

Low Severity

- + - + @@ -11564,7 +13398,7 @@

Low Severity

- + @@ -11575,7 +13409,7 @@

Low Severity

- @@ -11584,49 +13418,48 @@

Low Severity

-
-

Malicious Code Attack

+
+

Monitor Impact

TermLowSeverityMonitorControl Prefix risk
LabelLow SeverityMonitor Control
IRIhttps://w3id.org/dpv/risk#LowSeverityhttps://w3id.org/dpv/risk#MonitorControl
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasSeverity + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Severity is LowRisk Mitigation Measure that uses controls to monitor events
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
Date Created2022-08-182024-05-19
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - - - + + + + @@ -11635,28 +13468,22 @@

Malicious Code Attack

- + - - - - + - + - - - - + @@ -11665,7 +13492,7 @@

Malicious Code Attack

- @@ -11674,49 +13501,48 @@

Malicious Code Attack

-
-

Malware Attack

+
+

Monitor Risk

TermMaliciousCodeAttackMonitorImpact Prefix risk
LabelMalicious Code AttackMonitor Impact
IRIhttps://w3id.org/dpv/risk#MaliciousCodeAttackhttps://w3id.org/dpv/risk#MonitorImpact
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
Broader/Parent types risk:IntegrityConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Malicious Code AttackControl that monitors a Risk Impact
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - - - + + + + @@ -11725,28 +13551,22 @@

Malware Attack

- + - - - - + - + - - - - + @@ -11755,7 +13575,7 @@

Malware Attack

- @@ -11764,40 +13584,48 @@

Malware Attack

-
-

Material Damage

+
+

Monitor Control

TermMalwareAttackMonitorRisk Prefix risk
LabelMalware AttackMonitor Risk
IRIhttps://w3id.org/dpv/risk#MalwareAttackhttps://w3id.org/dpv/risk#MonitorRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
Broader/Parent types risk:IntegrityConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Malware AttackControl that monitors a Risk
SourceENISA Methodology for Sectoral Cybersecurity Assessments
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + @@ -11806,12 +13634,9 @@

Material Damage

- + - - - - + @@ -11822,12 +13647,9 @@

Material Damage

- + - - - - + @@ -11836,7 +13658,7 @@

Material Damage

- @@ -11845,40 +13667,48 @@

Material Damage

-
-

Misuse

+
+

Monitor Risk Source

TermMaterialDamageMonitorRiskControl Prefix risk
LabelMaterial DamageMonitor Control
IRIhttps://w3id.org/dpv/risk#MaterialDamagehttps://w3id.org/dpv/risk#MonitorRiskControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Material DamageControl that monitors another Control
Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
Date Created2022-03-302024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + @@ -11887,7 +13717,7 @@

Misuse

- + @@ -11900,21 +13730,18 @@

Misuse

- + - - - - + - + - @@ -11923,50 +13750,46 @@

Misuse

-
-

Moderate Likelihood

+
+

Monitor Vulnerabilities

TermMisuseMonitorRiskSource Prefix risk
LabelMisuseMonitor Risk Source
IRIhttps://w3id.org/dpv/risk#Misusehttps://w3id.org/dpv/risk#MonitorRiskSource
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:UserRisks - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes MisuseControl that monitors a Risk Source
Date Created2024-06-112024-05-19
Date Modified2024-08-16
ContributorsDelaram GolpayeganiHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - @@ -11977,12 +13800,9 @@

Moderate Likelihood

- + - - - - + @@ -11993,7 +13813,7 @@

Moderate Likelihood

- + @@ -12004,7 +13824,7 @@

Moderate Likelihood

- @@ -12013,52 +13833,40 @@

Moderate Likelihood

-
-

Moderate Risk

+
+

Non-Material Damage

TermModerateLikelihoodMonitorVulnerabilities Prefix risk
LabelModerate LikelihoodMonitor Vulnerabilities
IRIhttps://w3id.org/dpv/risk#ModerateLikelihoodhttps://w3id.org/dpv/risk#MonitorVulnerabilities
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Likelihood is ModerateControl that monitors a Risk Vulnerability
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Date Created2022-08-182024-05-19
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - - - - + @@ -12067,11 +13875,11 @@

Moderate Risk

- + - + @@ -12083,9 +13891,12 @@

Moderate Risk

- + - + + + + @@ -12094,7 +13905,7 @@

Moderate Risk

- @@ -12103,52 +13914,42 @@

Moderate Risk

-
-

Moderate Severity

+
+

Non-Normality Bias

TermModerateRiskNonMaterialDamage Prefix risk
LabelModerate RiskNon-Material Damage
IRIhttps://w3id.org/dpv/risk#ModerateRiskhttps://w3id.org/dpv/risk#NonMaterialDamage
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:LegalRisk + → dpv:RiskConcept
Object of relation dpv:hasRiskLevel -
DefinitionLevel where Risk is ModerateSomething that acts as or causes Non-Material Damage
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1The criteria for what is considered material damage is based in jurisdictional laws and norms
Date Created2022-08-182022-03-30
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - - - - - + @@ -12157,34 +13958,34 @@

Moderate Severity

- + - - - - + - + + + + - + - + - @@ -12193,48 +13994,43 @@

Moderate Severity

-
-

Monitor Consequence

+
+

Non-Response Bias

TermModerateSeverityNonNormalityBias Prefix risk
LabelModerate SeverityNon-Normality Bias
IRIhttps://w3id.org/dpv/risk#ModerateSeverityhttps://w3id.org/dpv/risk#NonNormalityBias
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasSeverity -
DefinitionLevel where Severity is ModerateBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Source
Date Created2022-08-182024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-LEVELS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -12243,31 +14039,34 @@

Monitor Consequence

- + - + + + + - + - + - @@ -12276,47 +14075,39 @@

Monitor Consequence

-
-

Monitor Control

+
+

Operational Security Risk

TermMonitorConsequenceNonResponseBias Prefix risk
LabelMonitor ConsequenceNon-Response Bias
IRIhttps://w3id.org/dpv/risk#MonitorConsequencehttps://w3id.org/dpv/risk#NonResponseBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk ConsequenceBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias
Source
Date Created2024-05-192024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -12325,12 +14116,9 @@

Monitor Control

- + - - - - + @@ -12339,20 +14127,14 @@

Monitor Control

- - - - + - - - - + - @@ -12361,48 +14143,41 @@

Monitor Control

-
-

Monitor Impact

+
+

Out-Group Homogeneity Bias

TermMonitorControlOperationalSecurityRisk Prefix risk
LabelMonitor ControlOperational Security Risk
IRIhttps://w3id.org/dpv/risk#MonitorControlhttps://w3id.org/dpv/risk#OperationalSecurityRisk
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionRisk Mitigation Measure that uses controls to monitor eventsRisks and issues that arise during operational processes
Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
Date Created2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -12411,31 +14186,34 @@

Monitor Impact

- + - + + + + - + - + - @@ -12444,48 +14222,40 @@

Monitor Impact

-
-

Monitor Risk

+
+

Payment

TermMonitorImpactOutGroupHomogeneityBias Prefix risk
LabelMonitor ImpactOut-Group Homogeneity Bias
IRIhttps://w3id.org/dpv/risk#MonitorImpacthttps://w3id.org/dpv/risk#OutGroupHomogeneityBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk ImpactBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics
Source
Date Created2024-05-192024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -12494,7 +14264,7 @@

Monitor Risk

- + @@ -12507,18 +14277,21 @@

Monitor Risk

- + - + + + + - + - @@ -12527,48 +14300,40 @@

Monitor Risk

-
-

Monitor Control

+
+

Personal Safety Endangerment

TermMonitorRiskPayment Prefix risk
LabelMonitor RiskPayment
IRIhttps://w3id.org/dpv/risk#MonitorRiskhttps://w3id.org/dpv/risk#Payment
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a RiskSomething that acts as or provides payment e.g. to access a service or purchase resources
Date Created2024-05-192024-04-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -12577,22 +14342,28 @@

Monitor Control

- + - + + + + - + - + + + + @@ -12601,7 +14372,7 @@

Monitor Control

- @@ -12610,48 +14381,43 @@

Monitor Control

-
-

Monitor Risk Source

+
+

Phishing Scam

TermMonitorRiskControlPersonalSafetyEndangerment Prefix risk
LabelMonitor ControlPersonal Safety Endangerment
IRIhttps://w3id.org/dpv/risk#MonitorRiskControlhttps://w3id.org/dpv/risk#PersonalSafetyEndangerment
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors another ControlSomething that acts as or causes Personal Safety Endangerment
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - - - - + @@ -12660,22 +14426,28 @@

Monitor Risk Source

- + - + + + + - + - + + + + @@ -12684,7 +14456,7 @@

Monitor Risk Source

- @@ -12693,48 +14465,39 @@

Monitor Risk Source

-
-

Monitor Vulnerabilities

+
+

Physical Assault

TermMonitorRiskSourcePhishingScam Prefix risk
LabelMonitor Risk SourcePhishing Scam
IRIhttps://w3id.org/dpv/risk#MonitorRiskSourcehttps://w3id.org/dpv/risk#PhishingScam
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk SourceSomething that acts as or causes Phishing Scam
SourceENISA Threat Landscape for Ransomware Attacks 2022
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -12743,22 +14506,28 @@

Monitor Vulnerabilities

- + - + + + + - + - + + + + @@ -12767,7 +14536,7 @@

Monitor Vulnerabilities

- @@ -12776,23 +14545,23 @@

Monitor Vulnerabilities

-
-

Non-Material Damage

+
+

Physical Harm

TermMonitorVulnerabilitiesPhysicalAssault Prefix risk
LabelMonitor VulnerabilitiesPhysical Assault
IRIhttps://w3id.org/dpv/risk#MonitorVulnerabilitieshttps://w3id.org/dpv/risk#PhysicalAssault
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk VulnerabilitySomething that acts as or causes Physical Assault
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -12804,8 +14573,7 @@

Non-Material Damage

- @@ -12816,14 +14584,8 @@

Non-Material Damage

- - - - - - - - + + @@ -12832,18 +14594,9 @@

Non-Material Damage

- - - - - - - - - - - - + + + @@ -12857,23 +14610,23 @@

Non-Material Damage

-
-

Operational Security Risk

+
+

Privacy

TermNonMaterialDamagePhysicalHarm Prefix risk
LabelNon-Material DamagePhysical Harm
IRIhttps://w3id.org/dpv/risk#NonMaterialDamagehttps://w3id.org/dpv/risk#PhysicalHarm
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:IndividualRisk
DefinitionSomething that acts as or causes Non-Material Damage
Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
Date Created2022-03-30
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -12885,7 +14638,7 @@

Operational Security Risk

- @@ -12896,10 +14649,7 @@

Operational Security Risk

- - - - + @@ -12925,23 +14675,23 @@

Operational Security Risk

-
-

Payment

+
+

Psychological Harm

TermOperationalSecurityRiskPrivacy Prefix risk
LabelOperational Security RiskPrivacy
IRIhttps://w3id.org/dpv/risk#OperationalSecurityRiskhttps://w3id.org/dpv/risk#Privacy
Broader/Parent types dpv:RiskConcept + risk:IndividualRisk
DefinitionRisks and issues that arise during operational processes
- + - + - + @@ -12953,8 +14703,7 @@

Payment

- @@ -12967,20 +14716,23 @@

Payment

- + - + + + + - + @@ -12988,7 +14740,7 @@

Payment

- + @@ -13003,23 +14755,23 @@

Payment

-
-

Personal Safety Endangerment

+
+

Public Order Breach

TermPaymentPsychologicalHarm Prefix risk
LabelPaymentPsychological Harm
IRIhttps://w3id.org/dpv/risk#Paymenthttps://w3id.org/dpv/risk#PsychologicalHarm
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:IndividualRisk
DefinitionSomething that acts as or provides payment e.g. to access a service or purchase resourcesSomething that acts as or causes Psychological Harm
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2024-04-142022-08-17
Date Modified
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
- + - + - + @@ -13031,7 +14783,7 @@

Personal Safety Endangerment

- @@ -13045,7 +14797,7 @@

Personal Safety Endangerment

- + @@ -13084,43 +14836,47 @@

Personal Safety Endangerment

-
-

Phishing Scam

+
+

Recovery Control

TermPersonalSafetyEndangermentPublicOrderBreach Prefix risk
LabelPersonal Safety EndangermentPublic Order Breach
IRIhttps://w3id.org/dpv/risk#PersonalSafetyEndangermenthttps://w3id.org/dpv/risk#PublicOrderBreach
Broader/Parent types risk:SocietalRisk + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Personal Safety EndangermentSomething that acts as or causes Public Order Breach
- + - + - + - + - - - - + + + + @@ -13129,37 +14885,28 @@

Phishing Scam

- + - - - - + - + - - - - - - - - + + - @@ -13168,39 +14915,48 @@

Phishing Scam

-
-

Physical Assault

+
+

Reduce Likelihood

TermPhishingScamRecoveryControl Prefix risk
LabelPhishing ScamRecovery Control
IRIhttps://w3id.org/dpv/risk#PhishingScamhttps://w3id.org/dpv/risk#RecoveryControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Phishing ScamControl to recover from event
SourceENISA Threat Landscape for Ransomware Attacks 2022
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + @@ -13209,28 +14965,22 @@

Physical Assault

- + - - - - + - + - - - - + @@ -13239,7 +14989,7 @@

Physical Assault

- @@ -13248,46 +14998,58 @@

Physical Assault

-
-

Physical Harm

+
+

Reduce Severity

TermPhysicalAssaultReduceLikelihood Prefix risk
LabelPhysical AssaultReduce Likelihood
IRIhttps://w3id.org/dpv/risk#PhysicalAssaulthttps://w3id.org/dpv/risk#ReduceLikelihood
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:IndividualRisk + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Physical AssaultControl that reduces the likelihood of an event
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + - + + + + @@ -13297,14 +15059,20 @@

Physical Harm

- + + + + - + + + + - @@ -13313,46 +15081,57 @@

Physical Harm

-
-

Privacy

+
+

Reduction Control

TermPhysicalHarmReduceSeverity Prefix risk
LabelPhysical HarmReduce Severity
IRIhttps://w3id.org/dpv/risk#PhysicalHarmhttps://w3id.org/dpv/risk#ReduceSeverity
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:IndividualRisk + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionControl that reduces the severity of an event
Date Created2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + - + + + + @@ -13362,14 +15141,17 @@

Privacy

- + + + + - @@ -13378,23 +15160,25 @@

Privacy

-
-

Psychological Harm

+ + +
+

Re-identification

TermPrivacyReductionControl Prefix risk
LabelPrivacyReduction Control
IRIhttps://w3id.org/dpv/risk#Privacyhttps://w3id.org/dpv/risk#ReductionControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:IndividualRisk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionControl that reduces the likelihood or severity of an event
Date Created2024-05-19
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -13406,7 +15190,11 @@

Psychological Harm

- + + @@ -13419,23 +15207,23 @@

Psychological Harm

- + - + + + + - - - - + - + @@ -13458,40 +15246,47 @@

Psychological Harm

-
-

Public Order Breach

+
+

Remedy Control

TermPsychologicalHarmReidentification Prefix risk
LabelPsychological HarmRe-identification
IRIhttps://w3id.org/dpv/risk#PsychologicalHarmhttps://w3id.org/dpv/risk#Reidentification
Broader/Parent types risk:IndividualRisk + risk:ConfidentialityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
DefinitionSomething that acts as or causes Psychological HarmSomething that acts as or causes Re-identification
Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172022-08-19
Date Modified
- + - + - + - + - - + + + + @@ -13500,37 +15295,28 @@

Public Order Breach

- + - - - - + - + - - - - - - - - + + - @@ -13539,23 +15325,23 @@

Public Order Breach

-
-

Recovery Control

+
+

Remove Consequence

TermPublicOrderBreachRemedyControl Prefix risk
LabelPublic Order BreachRemedy Control
IRIhttps://w3id.org/dpv/risk#PublicOrderBreachhttps://w3id.org/dpv/risk#RemedyControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Public Order BreachControl to remedy consequences of event
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -13567,7 +15353,8 @@

Recovery Control

- @@ -13588,7 +15375,7 @@

Recovery Control

- + @@ -13604,7 +15391,10 @@

Recovery Control

- + + + + @@ -13618,23 +15408,23 @@

Recovery Control

-
-

Reduce Likelihood

+
+

Remove Impact

TermRecoveryControlRemoveConsequence Prefix risk
LabelRecovery ControlRemove Consequence
IRIhttps://w3id.org/dpv/risk#RecoveryControlhttps://w3id.org/dpv/risk#RemoveConsequence
Broader/Parent types risk:RiskControl + risk:ConsequenceControl + → risk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
DefinitionControl to recover from eventControl that removes Consequence i.e. prevents it from materialising
2024-05-19
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -13646,7 +15436,7 @@

Reduce Likelihood

- - + @@ -13701,23 +15491,23 @@

Reduce Likelihood

-
-

Reduce Severity

+
+

Remove Source

TermReduceLikelihoodRemoveImpact Prefix risk
LabelReduce LikelihoodRemove Impact
IRIhttps://w3id.org/dpv/risk#ReduceLikelihoodhttps://w3id.org/dpv/risk#RemoveImpact
Broader/Parent types risk:ReductionControl + risk:ImpactControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -13668,7 +15458,7 @@

Reduce Likelihood

DefinitionControl that reduces the likelihood of an eventControl that removes Impact i.e. prevents it from materialising
- + - + - + @@ -13729,7 +15519,7 @@

Reduce Severity

- - + @@ -13784,47 +15574,40 @@

Reduce Severity

-
-

Reduction Control

+
+

Remuneration

TermReduceSeverityRemoveSource Prefix risk
LabelReduce SeverityRemove Source
IRIhttps://w3id.org/dpv/risk#ReduceSeverityhttps://w3id.org/dpv/risk#RemoveSource
Broader/Parent types risk:ReductionControl + risk:SourceControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -13751,7 +15541,7 @@

Reduce Severity

DefinitionControl that reduces the severity of an eventControl that removes the risk source
- + - + - + - + - - - - - + @@ -13833,7 +15616,7 @@

Reduction Control

- + @@ -13846,15 +15629,21 @@

Reduction Control

- + - - + + + + + + + + - @@ -13863,25 +15652,23 @@

Reduction Control

- - -
-

Re-identification

+
+

Reputational Risk

TermReductionControlRenumeration Prefix risk
LabelReduction ControlRemuneration
IRIhttps://w3id.org/dpv/risk#ReductionControlhttps://w3id.org/dpv/risk#Renumeration
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that reduces the likelihood or severity of an eventSomething that acts as or provides renumeration which is in monetary or financial form
Date Created2024-05-192024-04-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -13893,11 +15680,7 @@

Re-identification

- - - @@ -13910,12 +15693,9 @@

Re-identification

- + - - - - + @@ -13924,18 +15704,9 @@

Re-identification

- - - - - - - - - - - - + + + @@ -13949,47 +15720,41 @@

Re-identification

-
-

Remedy Control

+
+

Requirements Bias

TermReidentificationReputationalRisk Prefix risk
LabelRe-identificationReputational Risk
IRIhttps://w3id.org/dpv/risk#Reidentificationhttps://w3id.org/dpv/risk#ReputationalRisk
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskConcept
DefinitionSomething that acts as or causes Re-identificationRisks and issues that affect the reputation of the organisation
Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
Date Created2022-08-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - - + @@ -13998,28 +15763,37 @@

Remedy Control

- + - + + + + - + + + + - + - + + + + - @@ -14028,48 +15802,40 @@

Remedy Control

-
-

Remove Consequence

+
+

Reward

TermRemedyControlRequirementsBias Prefix risk
LabelRemedy ControlRequirements Bias
IRIhttps://w3id.org/dpv/risk#RemedyControlhttps://w3id.org/dpv/risk#RequirementsBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl to remedy consequences of eventBias that occurs in or during requirements creation
Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifest
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -14078,7 +15844,7 @@

Remove Consequence

- + @@ -14091,18 +15857,21 @@

Remove Consequence

- + - + + + + - + - @@ -14111,48 +15880,40 @@

Remove Consequence

-
-

Remove Impact

+
+

Prevent Exercising of Rights

TermRemoveConsequenceReward Prefix risk
LabelRemove ConsequenceReward
IRIhttps://w3id.org/dpv/risk#RemoveConsequencehttps://w3id.org/dpv/risk#Reward
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that removes Consequence i.e. prevents it from materialisingSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
Date Created2024-05-192024-04-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -14161,9 +15922,12 @@

Remove Impact

- + - + + + + @@ -14174,18 +15938,21 @@

Remove Impact

- + - + + + + - + - @@ -14194,46 +15961,48 @@

Remove Impact

-
-

Remove Source

+
+

Impact to Rights

TermRemoveImpactRightsExercisePrevention Prefix risk
LabelRemove ImpactPrevent Exercising of Rights
IRIhttps://w3id.org/dpv/risk#RemoveImpacthttps://w3id.org/dpv/risk#RightsExercisePrevention
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that removes Impact i.e. prevents it from materialisingSomething that acts as or causes Prevent Exercising of Rights
Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
Date Created2024-05-192022-08-18
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - @@ -14244,22 +16013,31 @@

Remove Source

- + - + + + + - + + + + - + - + + + + @@ -14268,7 +16046,7 @@

Remove Source

- @@ -14277,23 +16055,23 @@

Remove Source

-
-

Remuneration

+
+

Limitation of Rights

TermRemoveSourceRightsImpact Prefix risk
LabelRemove SourceImpact to Rights
IRIhttps://w3id.org/dpv/risk#RemoveSourcehttps://w3id.org/dpv/risk#RightsImpact
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Impact + → dpv:Consequence + → dpv:RiskConcept +
Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasConsequence, + dpv:hasImpact
DefinitionControl that removes the risk sourceSomething that acts as or causes Impact to Rights
Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -14305,7 +16083,7 @@

Remuneration

- @@ -14319,9 +16097,12 @@

Remuneration

- + - + + + + @@ -14332,7 +16113,7 @@

Remuneration

- + @@ -14355,23 +16136,23 @@

Remuneration

-
-

Reputational Risk

+
+

Violation of Rights

TermRenumerationRightsLimitation Prefix risk
LabelRemunerationLimitation of Rights
IRIhttps://w3id.org/dpv/risk#Renumerationhttps://w3id.org/dpv/risk#RightsLimitation
Broader/Parent types risk:FinancialImpact + risk:SocietalRiskdpv:RiskConcept
DefinitionSomething that acts as or provides renumeration which is in monetary or financial formSomething that acts as or causes Limitation of Rights
Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
Date Created2024-04-142022-08-18
Date Modified
- + - + - + @@ -14383,7 +16164,8 @@

Reputational Risk

- @@ -14396,9 +16178,12 @@

Reputational Risk

- + - + + + + @@ -14407,9 +16192,18 @@

Reputational Risk

- - - + + + + + + + + + + + + @@ -14420,39 +16214,42 @@

Reputational Risk

TermReputationalRiskRightsViolation Prefix risk
LabelReputational RiskViolation of Rights
IRIhttps://w3id.org/dpv/risk#ReputationalRiskhttps://w3id.org/dpv/risk#RightsViolation
Broader/Parent types dpv:RiskConcept + risk:SocietalRisk + → dpv:RiskConcept
DefinitionRisks and issues that affect the reputation of the organisationSomething that acts as or causes Violation of Rights
Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
Date Created2022-08-18
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
+ + + + - -
-

Reward

+
+

Risk Analysis

- + - + - + - + - @@ -14465,34 +16262,34 @@

Reward

- + - + + + + - + - - - - + - + - @@ -14500,37 +16297,35 @@

Reward

- -
-

Prevent Exercising of Rights

+
+

Risk Assessment

TermRewardRiskAnalysis Prefix risk
LabelRewardRisk Analysis
IRIhttps://w3id.org/dpv/risk#Rewardhttps://w3id.org/dpv/risk#RiskAnalysis
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
DefinitionSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or feeA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
SourceIEC 31010:2019
Date Created2024-04-142022-08-18
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- + - + - + - + - @@ -14543,37 +16338,31 @@

Prevent Exercising of Rights

- + - - - - + - + + + + - + - - - - - - - - + + - @@ -14581,49 +16370,44 @@

Prevent Exercising of Rights

- -
-

Impact to Rights

+
+

Risk Control

TermRightsExercisePreventionRiskAssessment Prefix risk
LabelPrevent Exercising of RightsRisk Assessment
IRIhttps://w3id.org/dpv/risk#RightsExercisePreventionhttps://w3id.org/dpv/risk#RiskAssessment
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskManagement
DefinitionSomething that acts as or causes Prevent Exercising of RightsAssessment of risk involving its identification, analysis, and evaluation
Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
Source
Date Created2022-08-182024-02-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- + - + - + - + - - - - @@ -14634,40 +16418,31 @@

Impact to Rights

- + - - - - + + + + - - - - + - + - - - - - - - - + + - @@ -14675,38 +16450,33 @@

Impact to Rights

- -
-

Limitation of Rights

+
+

Risk Management

TermRightsImpactRiskControl Prefix risk
LabelImpact to RightsRisk Control
IRIhttps://w3id.org/dpv/risk#RightsImpacthttps://w3id.org/dpv/risk#RiskControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types dpv:Impact - → dpv:Consequence - → dpv:RiskConcept -
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasConsequence, - dpv:hasImpact + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionSomething that acts as or causes Impact to RightsControl that modifies risk
Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in DEX
- + - + - + - + - - - + @@ -14718,37 +16488,31 @@

Limitation of Rights

- + - - - - + - + + + + - + - - - - - - - - + + - @@ -14757,36 +16521,36 @@

Limitation of Rights

-
-

Violation of Rights

+
+

Risk Matrix

TermRightsLimitationRiskManagement Prefix risk
LabelLimitation of RightsRisk Management
IRIhttps://w3id.org/dpv/risk#RightsLimitationhttps://w3id.org/dpv/risk#RiskManagement
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Limitation of RightsSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
Source
Date Created2022-08-182024-06-12
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- + - + - + - + - @@ -14799,77 +16563,72 @@

Violation of Rights

- + - - - - + - + + + + - + - - - - + - + -
TermRightsViolationRiskMatrix Prefix risk
LabelViolation of RightsRisk Matrix
IRIhttps://w3id.org/dpv/risk#RightsViolationhttps://w3id.org/dpv/risk#RiskMatrix
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAssessment
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
DefinitionSomething that acts as or causes Violation of RightsCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
SourceIEC 31010:2019
Date Created2022-08-182024-02-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- - - - -
-

Risk Analysis

+ +
+

Risk Matrix 3x3

- + - + - + - + - @@ -14883,23 +16642,20 @@

Risk Analysis

- + - - - - + - + @@ -14910,7 +16666,7 @@

Risk Analysis

- @@ -14918,35 +16674,38 @@

Risk Analysis

-
-

Risk Assessment

+ +
+

Risk Matrix 5x5

TermRiskAnalysisRiskMatrix3x3 Prefix risk
LabelRisk AnalysisRisk Matrix 3x3
IRIhttps://w3id.org/dpv/risk#RiskAnalysishttps://w3id.org/dpv/risk#RiskMatrix3x3
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types risk:RiskAssessment + risk:RiskMatrix + → risk:RiskAssessmentrisk:RiskManagement
DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
SourceIEC 31010:2019
Date Created2022-08-182022-08-17
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + - + - @@ -14959,31 +16718,31 @@

Risk Assessment

- + - - - - + - + - + + + + - @@ -14991,46 +16750,42 @@

Risk Assessment

-
-

Risk Control

+ +
+

Risk Matrix 7x7

TermRiskAssessmentRiskMatrix5x5 Prefix risk
LabelRisk AssessmentRisk Matrix 5x5
IRIhttps://w3id.org/dpv/risk#RiskAssessmenthttps://w3id.org/dpv/risk#RiskMatrix5x5
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types risk:RiskManagement + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
DefinitionAssessment of risk involving its identification, analysis, and evaluationA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
Source
Date Created2024-02-142022-08-17
ContributorsHarshvardhan J. Pandit
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + - + - - - - - + @@ -15039,13 +16794,10 @@

Risk Control

- + - - - @@ -15055,15 +16807,18 @@

Risk Control

- + - + + + + - @@ -15071,23 +16826,23 @@

Risk Control

-
-

Risk Management

+
+

Risk Source

TermRiskControlRiskMatrix7x7 Prefix risk
LabelRisk ControlRisk Matrix 7x7
IRIhttps://w3id.org/dpv/risk#RiskControlhttps://w3id.org/dpv/risk#RiskMatrix7x7
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that modifies riskA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
Date Created2024-05-192022-08-17
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in DEX + section RISK-MATRIX in RISK
- + - + - + @@ -15097,10 +16852,17 @@

Risk Management

- + + + - + + + + @@ -15109,25 +16871,25 @@

Risk Management

- + - - - - + - + - + + + + @@ -15142,35 +16904,37 @@

Risk Management

-
-

Risk Matrix

+
+

Low Risk (RM3x3 S:1 L:1)

TermRiskManagementRiskSource Prefix risk
LabelRisk ManagementRisk Source
IRIhttps://w3id.org/dpv/risk#RiskManagementhttps://w3id.org/dpv/risk#RiskSource
rdfs:Class, skos:Concept
Broader/Parent types dpv:RiskConcept +
Object of relation risk:hasRiskSource +
DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
Source
Date Created2024-06-122024-02-14
Date Modified2024-08-16
- + - + - + - + - @@ -15184,23 +16948,20 @@

Risk Matrix

- + - - - - + - + @@ -15211,7 +16972,7 @@

Risk Matrix

- @@ -15220,23 +16981,23 @@

Risk Matrix

-
-

Risk Matrix 3x3

+
+

Low Risk (RM3x3 S:1 L:2)

TermRiskMatrixRM3x3S1L1 Prefix risk
LabelRisk MatrixLow Risk (RM3x3 S:1 L:1)
IRIhttps://w3id.org/dpv/risk#RiskMatrixhttps://w3id.org/dpv/risk#RM3x3S1L1
Typerdfs:Class, skos:Concept, risk:RiskAssessmentrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types risk:RiskAssessment + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessmentrisk:RiskManagement
DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
SourceIEC 31010:2019
Date Created2024-02-142022-08-17
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + @@ -15248,7 +17009,8 @@

Risk Matrix 3x3

- @@ -15263,7 +17025,7 @@

Risk Matrix 3x3

- + @@ -15296,23 +17058,23 @@

Risk Matrix 3x3

-
-

Risk Matrix 5x5

+
+

Moderate Risk (RM3x3 S:1 L:3)

TermRiskMatrix3x3RM3x3S1L2 Prefix risk
LabelRisk Matrix 3x3Low Risk (RM3x3 S:1 L:2)
IRIhttps://w3id.org/dpv/risk#RiskMatrix3x3https://w3id.org/dpv/risk#RM3x3S1L2
Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
- + - + - + @@ -15324,7 +17086,8 @@

Risk Matrix 5x5

- @@ -15339,7 +17102,7 @@

Risk Matrix 5x5

- + @@ -15372,23 +17135,23 @@

Risk Matrix 5x5

-
-

Risk Matrix 7x7

+
+

Low Risk (RM3x3 S:2 L:1)

TermRiskMatrix5x5RM3x3S1L3 Prefix risk
LabelRisk Matrix 5x5Moderate Risk (RM3x3 S:1 L:3)
IRIhttps://w3id.org/dpv/risk#RiskMatrix5x5https://w3id.org/dpv/risk#RM3x3S1L3
Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
- + - + - + @@ -15400,7 +17163,8 @@

Risk Matrix 7x7

- @@ -15415,7 +17179,7 @@

Risk Matrix 7x7

- + @@ -15447,43 +17211,43 @@

Risk Matrix 7x7

-
-

Risk Source

+ +
+

Moderate Risk (RM3x3 S:2 L:2)

TermRiskMatrix7x7RM3x3S2L1 Prefix risk
LabelRisk Matrix 7x7Low Risk (RM3x3 S:2 L:1)
IRIhttps://w3id.org/dpv/risk#RiskMatrix7x7https://w3id.org/dpv/risk#RM3x3S2L1
Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
- + - + - + - + - - - - - + @@ -15492,7 +17256,7 @@

Risk Source

- + @@ -15505,18 +17269,18 @@

Risk Source

- + + - - - - + + + - @@ -15525,23 +17289,23 @@

Risk Source

-
-

Low Risk (RM3x3 S:1 L:1)

+
+

High Risk (RM3x3 S:2 L:3)

TermRiskSourceRM3x3S2L2 Prefix risk
LabelRisk SourceModerate Risk (RM3x3 S:2 L:2)
IRIhttps://w3id.org/dpv/risk#RiskSourcehttps://w3id.org/dpv/risk#RM3x3S2L2
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
Object of relation risk:hasRiskSource -
DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
Date Created2024-02-142022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + @@ -15569,7 +17333,7 @@

Low Risk (RM3x3 S:1 L:1)

- + @@ -15602,23 +17366,23 @@

Low Risk (RM3x3 S:1 L:1)

-
-

Low Risk (RM3x3 S:1 L:2)

+
+

Moderate Risk (RM3x3 S:3 L:1)

TermRM3x3S1L1RM3x3S2L3 Prefix risk
LabelLow Risk (RM3x3 S:1 L:1)High Risk (RM3x3 S:2 L:3)
IRIhttps://w3id.org/dpv/risk#RM3x3S1L1https://w3id.org/dpv/risk#RM3x3S2L3
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
- + - + - + @@ -15646,7 +17410,7 @@

Low Risk (RM3x3 S:1 L:2)

- + @@ -15679,23 +17443,23 @@

Low Risk (RM3x3 S:1 L:2)

-
-

Moderate Risk (RM3x3 S:1 L:3)

+
+

High Risk (RM3x3 S:3 L:2)

TermRM3x3S1L2RM3x3S3L1 Prefix risk
LabelLow Risk (RM3x3 S:1 L:2)Moderate Risk (RM3x3 S:3 L:1)
IRIhttps://w3id.org/dpv/risk#RM3x3S1L2https://w3id.org/dpv/risk#RM3x3S3L1
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -15723,7 +17487,7 @@

Moderate Risk (RM3x3 S:1 L:3)

- + @@ -15756,23 +17520,23 @@

Moderate Risk (RM3x3 S:1 L:3)

-
-

Low Risk (RM3x3 S:2 L:1)

+
+

High Risk (RM3x3 S:3 L:3)

TermRM3x3S1L3RM3x3S3L2 Prefix risk
LabelModerate Risk (RM3x3 S:1 L:3)High Risk (RM3x3 S:3 L:2)
IRIhttps://w3id.org/dpv/risk#RM3x3S1L3https://w3id.org/dpv/risk#RM3x3S3L2
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -15800,7 +17564,7 @@

Low Risk (RM3x3 S:2 L:1)

- + @@ -15833,23 +17597,23 @@

Low Risk (RM3x3 S:2 L:1)

-
-

Moderate Risk (RM3x3 S:2 L:2)

+
+

Very Low Risk (RM5x5 S:1 L:1)

TermRM3x3S2L1RM3x3S3L3 Prefix risk
LabelLow Risk (RM3x3 S:2 L:1)High Risk (RM3x3 S:3 L:3)
IRIhttps://w3id.org/dpv/risk#RM3x3S2L1https://w3id.org/dpv/risk#RM3x3S3L3
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
- + - + - + @@ -15861,7 +17625,7 @@

Moderate Risk (RM3x3 S:2 L:2)

- - + @@ -15910,23 +17674,23 @@

Moderate Risk (RM3x3 S:2 L:2)

-
-

High Risk (RM3x3 S:2 L:3)

+
+

Very Low Risk (RM5x5 S:1 L:2)

TermRM3x3S2L2RM5x5S1L1 Prefix risk
LabelModerate Risk (RM3x3 S:2 L:2)Very Low Risk (RM5x5 S:1 L:1)
IRIhttps://w3id.org/dpv/risk#RM3x3S2L2https://w3id.org/dpv/risk#RM5x5S1L1
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -15877,7 +17641,7 @@

Moderate Risk (RM3x3 S:2 L:2)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -15938,7 +17702,7 @@

High Risk (RM3x3 S:2 L:3)

- - + @@ -15987,23 +17751,23 @@

High Risk (RM3x3 S:2 L:3)

-
-

Moderate Risk (RM3x3 S:3 L:1)

+
+

Very Low Risk (RM5x5 S:1 L:3)

TermRM3x3S2L3RM5x5S1L2 Prefix risk
LabelHigh Risk (RM3x3 S:2 L:3)Very Low Risk (RM5x5 S:1 L:2)
IRIhttps://w3id.org/dpv/risk#RM3x3S2L3https://w3id.org/dpv/risk#RM5x5S1L2
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -15954,7 +17718,7 @@

High Risk (RM3x3 S:2 L:3)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
- + - + - + @@ -16015,7 +17779,7 @@

Moderate Risk (RM3x3 S:3 L:1)

- - + @@ -16064,23 +17828,23 @@

Moderate Risk (RM3x3 S:3 L:1)

-
-

High Risk (RM3x3 S:3 L:2)

+
+

Low Risk (RM5x5 S:1 L:4)

TermRM3x3S3L1RM5x5S1L3 Prefix risk
LabelModerate Risk (RM3x3 S:3 L:1)Very Low Risk (RM5x5 S:1 L:3)
IRIhttps://w3id.org/dpv/risk#RM3x3S3L1https://w3id.org/dpv/risk#RM5x5S1L3
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -16031,7 +17795,7 @@

Moderate Risk (RM3x3 S:3 L:1)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
- + - + - + @@ -16092,7 +17856,7 @@

High Risk (RM3x3 S:3 L:2)

- - + @@ -16141,23 +17905,23 @@

High Risk (RM3x3 S:3 L:2)

-
-

High Risk (RM3x3 S:3 L:3)

+
+

Low Risk (RM5x5 S:1 L:5)

TermRM3x3S3L2RM5x5S1L4 Prefix risk
LabelHigh Risk (RM3x3 S:3 L:2)Low Risk (RM5x5 S:1 L:4)
IRIhttps://w3id.org/dpv/risk#RM3x3S3L2https://w3id.org/dpv/risk#RM5x5S1L4
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -16108,7 +17872,7 @@

High Risk (RM3x3 S:3 L:2)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
- + - + - + @@ -16169,7 +17933,7 @@

High Risk (RM3x3 S:3 L:3)

- - + @@ -16218,23 +17982,23 @@

High Risk (RM3x3 S:3 L:3)

-
-

Very Low Risk (RM5x5 S:1 L:1)

+
+

Very Low Risk (RM5x5 S:2 L:1)

TermRM3x3S3L3RM5x5S1L5 Prefix risk
LabelHigh Risk (RM3x3 S:3 L:3)Low Risk (RM5x5 S:1 L:5)
IRIhttps://w3id.org/dpv/risk#RM3x3S3L3https://w3id.org/dpv/risk#RM5x5S1L5
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -16185,7 +17949,7 @@

High Risk (RM3x3 S:3 L:3)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
- + - + - + @@ -16262,7 +18026,7 @@

Very Low Risk (RM5x5 S:1 L:1)

- + @@ -16295,23 +18059,23 @@

Very Low Risk (RM5x5 S:1 L:1)

-
-

Very Low Risk (RM5x5 S:1 L:2)

+
+

Low Risk (RM5x5 S:2 L:2)

TermRM5x5S1L1RM5x5S2L1 Prefix risk
LabelVery Low Risk (RM5x5 S:1 L:1)Very Low Risk (RM5x5 S:2 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L1https://w3id.org/dpv/risk#RM5x5S2L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -16339,7 +18103,7 @@

Very Low Risk (RM5x5 S:1 L:2)

- + @@ -16372,23 +18136,23 @@

Very Low Risk (RM5x5 S:1 L:2)

-
-

Very Low Risk (RM5x5 S:1 L:3)

+
+

Moderate Risk (RM5x5 S:2 L:3)

TermRM5x5S1L2RM5x5S2L2 Prefix risk
LabelVery Low Risk (RM5x5 S:1 L:2)Low Risk (RM5x5 S:2 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L2https://w3id.org/dpv/risk#RM5x5S2L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
- + - + - + @@ -16416,7 +18180,7 @@

Very Low Risk (RM5x5 S:1 L:3)

- + @@ -16449,23 +18213,23 @@

Very Low Risk (RM5x5 S:1 L:3)

-
-

Low Risk (RM5x5 S:1 L:4)

+
+

Moderate Risk (RM5x5 S:2 L:4)

TermRM5x5S1L3RM5x5S2L3 Prefix risk
LabelVery Low Risk (RM5x5 S:1 L:3)Moderate Risk (RM5x5 S:2 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L3https://w3id.org/dpv/risk#RM5x5S2L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
- + - + - + @@ -16493,7 +18257,7 @@

Low Risk (RM5x5 S:1 L:4)

- + @@ -16526,23 +18290,23 @@

Low Risk (RM5x5 S:1 L:4)

-
-

Low Risk (RM5x5 S:1 L:5)

+
+

High Risk (RM5x5 S:2 L:5)

TermRM5x5S1L4RM5x5S2L4 Prefix risk
LabelLow Risk (RM5x5 S:1 L:4)Moderate Risk (RM5x5 S:2 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L4https://w3id.org/dpv/risk#RM5x5S2L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
- + - + - + @@ -16570,7 +18334,7 @@

Low Risk (RM5x5 S:1 L:5)

- + @@ -16603,23 +18367,23 @@

Low Risk (RM5x5 S:1 L:5)

-
-

Very Low Risk (RM5x5 S:2 L:1)

+
+

Very Low Risk (RM5x5 S:3 L:1)

TermRM5x5S1L5RM5x5S2L5 Prefix risk
LabelLow Risk (RM5x5 S:1 L:5)High Risk (RM5x5 S:2 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L5https://w3id.org/dpv/risk#RM5x5S2L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
- + - + - + @@ -16647,7 +18411,7 @@

Very Low Risk (RM5x5 S:2 L:1)

- + @@ -16680,23 +18444,23 @@

Very Low Risk (RM5x5 S:2 L:1)

-
-

Low Risk (RM5x5 S:2 L:2)

+
+

Moderate Risk (RM5x5 S:3 L:2)

TermRM5x5S2L1RM5x5S3L1 Prefix risk
LabelVery Low Risk (RM5x5 S:2 L:1)Very Low Risk (RM5x5 S:3 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L1https://w3id.org/dpv/risk#RM5x5S3L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -16724,7 +18488,7 @@

Low Risk (RM5x5 S:2 L:2)

- + @@ -16757,23 +18521,23 @@

Low Risk (RM5x5 S:2 L:2)

-
-

Moderate Risk (RM5x5 S:2 L:3)

+
+

Moderate Risk (RM5x5 S:3 L:3)

TermRM5x5S2L2RM5x5S3L2 Prefix risk
LabelLow Risk (RM5x5 S:2 L:2)Moderate Risk (RM5x5 S:3 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L2https://w3id.org/dpv/risk#RM5x5S3L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -16801,7 +18565,7 @@

Moderate Risk (RM5x5 S:2 L:3)

- + @@ -16834,23 +18598,23 @@

Moderate Risk (RM5x5 S:2 L:3)

-
-

Moderate Risk (RM5x5 S:2 L:4)

+
+

High Risk (RM5x5 S:3 L:4)

TermRM5x5S2L3RM5x5S3L3 Prefix risk
LabelModerate Risk (RM5x5 S:2 L:3)Moderate Risk (RM5x5 S:3 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L3https://w3id.org/dpv/risk#RM5x5S3L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
- + - + - + @@ -16878,7 +18642,7 @@

Moderate Risk (RM5x5 S:2 L:4)

- + @@ -16911,23 +18675,23 @@

Moderate Risk (RM5x5 S:2 L:4)

-
-

High Risk (RM5x5 S:2 L:5)

+
+

Very High Risk (RM5x5 S:3 L:5)

TermRM5x5S2L4RM5x5S3L4 Prefix risk
LabelModerate Risk (RM5x5 S:2 L:4)High Risk (RM5x5 S:3 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L4https://w3id.org/dpv/risk#RM5x5S3L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
- + - + - + @@ -16955,7 +18719,7 @@

High Risk (RM5x5 S:2 L:5)

- + @@ -16988,23 +18752,23 @@

High Risk (RM5x5 S:2 L:5)

-
-

Very Low Risk (RM5x5 S:3 L:1)

+
+

Low Risk (RM5x5 S:4 L:1)

TermRM5x5S2L5RM5x5S3L5 Prefix risk
LabelHigh Risk (RM5x5 S:2 L:5)Very High Risk (RM5x5 S:3 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L5https://w3id.org/dpv/risk#RM5x5S3L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -17032,7 +18796,7 @@

Very Low Risk (RM5x5 S:3 L:1)

- + @@ -17065,23 +18829,23 @@

Very Low Risk (RM5x5 S:3 L:1)

-
-

Moderate Risk (RM5x5 S:3 L:2)

+
+

Moderate Risk (RM5x5 S:4 L:2)

TermRM5x5S3L1RM5x5S4L1 Prefix risk
LabelVery Low Risk (RM5x5 S:3 L:1)Low Risk (RM5x5 S:4 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L1https://w3id.org/dpv/risk#RM5x5S4L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -17109,7 +18873,7 @@

Moderate Risk (RM5x5 S:3 L:2)

- + @@ -17142,23 +18906,23 @@

Moderate Risk (RM5x5 S:3 L:2)

-
-

Moderate Risk (RM5x5 S:3 L:3)

+
+

High Risk (RM5x5 S:4 L:3)

TermRM5x5S3L2RM5x5S4L2 Prefix risk
LabelModerate Risk (RM5x5 S:3 L:2)Moderate Risk (RM5x5 S:4 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L2https://w3id.org/dpv/risk#RM5x5S4L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -17186,7 +18950,7 @@

Moderate Risk (RM5x5 S:3 L:3)

- + @@ -17219,23 +18983,23 @@

Moderate Risk (RM5x5 S:3 L:3)

-
-

High Risk (RM5x5 S:3 L:4)

+
+

Very High Risk (RM5x5 S:4 L:4)

TermRM5x5S3L3RM5x5S4L3 Prefix risk
LabelModerate Risk (RM5x5 S:3 L:3)High Risk (RM5x5 S:4 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L3https://w3id.org/dpv/risk#RM5x5S4L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -17263,7 +19027,7 @@

High Risk (RM5x5 S:3 L:4)

- + @@ -17296,23 +19060,23 @@

High Risk (RM5x5 S:3 L:4)

-
-

Very High Risk (RM5x5 S:3 L:5)

+
+

Very High Risk (RM5x5 S:4 L:5)

TermRM5x5S3L4RM5x5S4L4 Prefix risk
LabelHigh Risk (RM5x5 S:3 L:4)Very High Risk (RM5x5 S:4 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L4https://w3id.org/dpv/risk#RM5x5S4L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -17340,7 +19104,7 @@

Very High Risk (RM5x5 S:3 L:5)

- + @@ -17373,23 +19137,23 @@

Very High Risk (RM5x5 S:3 L:5)

-
-

Low Risk (RM5x5 S:4 L:1)

+
+

Low Risk (RM5x5 S:5 L:1)

TermRM5x5S3L5RM5x5S4L5 Prefix risk
LabelVery High Risk (RM5x5 S:3 L:5)Very High Risk (RM5x5 S:4 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L5https://w3id.org/dpv/risk#RM5x5S4L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -17417,7 +19181,7 @@

Low Risk (RM5x5 S:4 L:1)

- + @@ -17450,23 +19214,23 @@

Low Risk (RM5x5 S:4 L:1)

-
-

Moderate Risk (RM5x5 S:4 L:2)

+
+

High Risk (RM5x5 S:5 L:2)

TermRM5x5S4L1RM5x5S5L1 Prefix risk
LabelLow Risk (RM5x5 S:4 L:1)Low Risk (RM5x5 S:5 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L1https://w3id.org/dpv/risk#RM5x5S5L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -17494,7 +19258,7 @@

Moderate Risk (RM5x5 S:4 L:2)

- + @@ -17527,23 +19291,23 @@

Moderate Risk (RM5x5 S:4 L:2)

-
-

High Risk (RM5x5 S:4 L:3)

+
+

High Risk (RM5x5 S:5 L:3)

TermRM5x5S4L2RM5x5S5L2 Prefix risk
LabelModerate Risk (RM5x5 S:4 L:2)High Risk (RM5x5 S:5 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L2https://w3id.org/dpv/risk#RM5x5S5L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
- + - + - + @@ -17571,7 +19335,7 @@

High Risk (RM5x5 S:4 L:3)

- + @@ -17604,23 +19368,23 @@

High Risk (RM5x5 S:4 L:3)

-
-

Very High Risk (RM5x5 S:4 L:4)

+
+

Very High Risk (RM5x5 S:5 L:4)

TermRM5x5S4L3RM5x5S5L3 Prefix risk
LabelHigh Risk (RM5x5 S:4 L:3)High Risk (RM5x5 S:5 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L3https://w3id.org/dpv/risk#RM5x5S5L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -17648,7 +19412,7 @@

Very High Risk (RM5x5 S:4 L:4)

- + @@ -17681,23 +19445,23 @@

Very High Risk (RM5x5 S:4 L:4)

-
-

Very High Risk (RM5x5 S:4 L:5)

+
+

Very High Risk (RM5x5 S:5 L:5)

TermRM5x5S4L4RM5x5S5L4 Prefix risk
LabelVery High Risk (RM5x5 S:4 L:4)Very High Risk (RM5x5 S:5 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L4https://w3id.org/dpv/risk#RM5x5S5L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -17725,7 +19489,7 @@

Very High Risk (RM5x5 S:4 L:5)

- + @@ -17758,23 +19522,23 @@

Very High Risk (RM5x5 S:4 L:5)

-
-

Low Risk (RM5x5 S:5 L:1)

+
+

Extremely Low Risk (RM7x7 S:1 L:1)

TermRM5x5S4L5RM5x5S5L5 Prefix risk
LabelVery High Risk (RM5x5 S:4 L:5)Very High Risk (RM5x5 S:5 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L5https://w3id.org/dpv/risk#RM5x5S5L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -17786,7 +19550,7 @@

Low Risk (RM5x5 S:5 L:1)

- - + @@ -17835,23 +19599,23 @@

Low Risk (RM5x5 S:5 L:1)

-
-

High Risk (RM5x5 S:5 L:2)

+
+

Extremely Low Risk (RM7x7 S:1 L:2)

TermRM5x5S5L1RM7x7S1L1 Prefix risk
LabelLow Risk (RM5x5 S:5 L:1)Extremely Low Risk (RM7x7 S:1 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L1https://w3id.org/dpv/risk#RM7x7S1L1
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17802,7 +19566,7 @@

Low Risk (RM5x5 S:5 L:1)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -17863,7 +19627,7 @@

High Risk (RM5x5 S:5 L:2)

- - + @@ -17912,23 +19676,23 @@

High Risk (RM5x5 S:5 L:2)

-
-

High Risk (RM5x5 S:5 L:3)

+
+

Extremely Low Risk (RM7x7 S:1 L:3)

TermRM5x5S5L2RM7x7S1L2 Prefix risk
LabelHigh Risk (RM5x5 S:5 L:2)Extremely Low Risk (RM7x7 S:1 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L2https://w3id.org/dpv/risk#RM7x7S1L2
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17879,7 +19643,7 @@

High Risk (RM5x5 S:5 L:2)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
- + - + - + @@ -17940,7 +19704,7 @@

High Risk (RM5x5 S:5 L:3)

- - + @@ -17989,23 +19753,23 @@

High Risk (RM5x5 S:5 L:3)

-
-

Very High Risk (RM5x5 S:5 L:4)

+
+

Very Low Risk (RM7x7 S:1 L:4)

TermRM5x5S5L3RM7x7S1L3 Prefix risk
LabelHigh Risk (RM5x5 S:5 L:3)Extremely Low Risk (RM7x7 S:1 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L3https://w3id.org/dpv/risk#RM7x7S1L3
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17956,7 +19720,7 @@

High Risk (RM5x5 S:5 L:3)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
- + - + - + @@ -18017,7 +19781,7 @@

Very High Risk (RM5x5 S:5 L:4)

- - + @@ -18066,23 +19830,23 @@

Very High Risk (RM5x5 S:5 L:4)

-
-

Very High Risk (RM5x5 S:5 L:5)

+
+

Very Low Risk (RM7x7 S:1 L:5)

TermRM5x5S5L4RM7x7S1L4 Prefix risk
LabelVery High Risk (RM5x5 S:5 L:4)Very Low Risk (RM7x7 S:1 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L4https://w3id.org/dpv/risk#RM7x7S1L4
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18033,7 +19797,7 @@

Very High Risk (RM5x5 S:5 L:4)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
- + - + - + @@ -18094,7 +19858,7 @@

Very High Risk (RM5x5 S:5 L:5)

- - + @@ -18143,23 +19907,23 @@

Very High Risk (RM5x5 S:5 L:5)

-
-

Extremely Low Risk (RM7x7 S:1 L:1)

+
+

Very Low Risk (RM7x7 S:1 L:6)

TermRM5x5S5L5RM7x7S1L5 Prefix risk
LabelVery High Risk (RM5x5 S:5 L:5)Very Low Risk (RM7x7 S:1 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L5https://w3id.org/dpv/risk#RM7x7S1L5
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18110,7 +19874,7 @@

Very High Risk (RM5x5 S:5 L:5)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
- + - + - + @@ -18187,7 +19951,7 @@

Extremely Low Risk (RM7x7 S:1 L:1)

- + @@ -18220,23 +19984,23 @@

Extremely Low Risk (RM7x7 S:1 L:1)

-
-

Extremely Low Risk (RM7x7 S:1 L:2)

+
+

Low Risk (RM7x7 S:1 L:7)

TermRM7x7S1L1RM7x7S1L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:1 L:1)Very Low Risk (RM7x7 S:1 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L1https://w3id.org/dpv/risk#RM7x7S1L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
- + - + - + @@ -18264,7 +20028,7 @@

Extremely Low Risk (RM7x7 S:1 L:2)

- + @@ -18297,23 +20061,23 @@

Extremely Low Risk (RM7x7 S:1 L:2)

-
-

Extremely Low Risk (RM7x7 S:1 L:3)

+
+

Extremely Low Risk (RM7x7 S:2 L:1)

TermRM7x7S1L2RM7x7S1L7 Prefix risk
LabelExtremely Low Risk (RM7x7 S:1 L:2)Low Risk (RM7x7 S:1 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L2https://w3id.org/dpv/risk#RM7x7S1L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
- + - + - + @@ -18341,7 +20105,7 @@

Extremely Low Risk (RM7x7 S:1 L:3)

- + @@ -18374,23 +20138,23 @@

Extremely Low Risk (RM7x7 S:1 L:3)

-
-

Very Low Risk (RM7x7 S:1 L:4)

+
+

Extremely Low Risk (RM7x7 S:2 L:2)

TermRM7x7S1L3RM7x7S2L1 Prefix risk
LabelExtremely Low Risk (RM7x7 S:1 L:3)Extremely Low Risk (RM7x7 S:2 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L3https://w3id.org/dpv/risk#RM7x7S2L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -18418,7 +20182,7 @@

Very Low Risk (RM7x7 S:1 L:4)

- + @@ -18451,23 +20215,23 @@

Very Low Risk (RM7x7 S:1 L:4)

-
-

Very Low Risk (RM7x7 S:1 L:5)

+
+

Very Low Risk (RM7x7 S:2 L:3)

TermRM7x7S1L4RM7x7S2L2 Prefix risk
LabelVery Low Risk (RM7x7 S:1 L:4)Extremely Low Risk (RM7x7 S:2 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L4https://w3id.org/dpv/risk#RM7x7S2L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
- + - + - + @@ -18495,7 +20259,7 @@

Very Low Risk (RM7x7 S:1 L:5)

- + @@ -18528,23 +20292,23 @@

Very Low Risk (RM7x7 S:1 L:5)

-
-

Very Low Risk (RM7x7 S:1 L:6)

+
+

Low Risk (RM7x7 S:2 L:4)

TermRM7x7S1L5RM7x7S2L3 Prefix risk
LabelVery Low Risk (RM7x7 S:1 L:5)Very Low Risk (RM7x7 S:2 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L5https://w3id.org/dpv/risk#RM7x7S2L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
- + - + - + @@ -18572,7 +20336,7 @@

Very Low Risk (RM7x7 S:1 L:6)

- + @@ -18605,23 +20369,23 @@

Very Low Risk (RM7x7 S:1 L:6)

-
-

Low Risk (RM7x7 S:1 L:7)

+
+

Low Risk (RM7x7 S:2 L:5)

TermRM7x7S1L6RM7x7S2L4 Prefix risk
LabelVery Low Risk (RM7x7 S:1 L:6)Low Risk (RM7x7 S:2 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L6https://w3id.org/dpv/risk#RM7x7S2L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
- + - + - + @@ -18649,7 +20413,7 @@

Low Risk (RM7x7 S:1 L:7)

- + @@ -18682,23 +20446,23 @@

Low Risk (RM7x7 S:1 L:7)

-
-

Extremely Low Risk (RM7x7 S:2 L:1)

+
+

Moderate Risk (RM7x7 S:2 L:6)

TermRM7x7S1L7RM7x7S2L5 Prefix risk
LabelLow Risk (RM7x7 S:1 L:7)Low Risk (RM7x7 S:2 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L7https://w3id.org/dpv/risk#RM7x7S2L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
- + - + - + @@ -18726,7 +20490,7 @@

Extremely Low Risk (RM7x7 S:2 L:1)

- + @@ -18759,23 +20523,23 @@

Extremely Low Risk (RM7x7 S:2 L:1)

-
-

Extremely Low Risk (RM7x7 S:2 L:2)

+
+

Moderate Risk (RM7x7 S:2 L:7)

TermRM7x7S2L1RM7x7S2L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:2 L:1)Moderate Risk (RM7x7 S:2 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L1https://w3id.org/dpv/risk#RM7x7S2L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
- + - + - + @@ -18803,7 +20567,7 @@

Extremely Low Risk (RM7x7 S:2 L:2)

- + @@ -18836,23 +20600,23 @@

Extremely Low Risk (RM7x7 S:2 L:2)

-
-

Very Low Risk (RM7x7 S:2 L:3)

+
+

Extremely Low Risk (RM7x7 S:3 L:1)

TermRM7x7S2L2RM7x7S2L7 Prefix risk
LabelExtremely Low Risk (RM7x7 S:2 L:2)Moderate Risk (RM7x7 S:2 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L2https://w3id.org/dpv/risk#RM7x7S2L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
- + - + - + @@ -18880,7 +20644,7 @@

Very Low Risk (RM7x7 S:2 L:3)

- + @@ -18913,23 +20677,23 @@

Very Low Risk (RM7x7 S:2 L:3)

-
-

Low Risk (RM7x7 S:2 L:4)

+
+

Very Low Risk (RM7x7 S:3 L:2)

TermRM7x7S2L3RM7x7S3L1 Prefix risk
LabelVery Low Risk (RM7x7 S:2 L:3)Extremely Low Risk (RM7x7 S:3 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L3https://w3id.org/dpv/risk#RM7x7S3L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -18957,7 +20721,7 @@

Low Risk (RM7x7 S:2 L:4)

- + @@ -18990,23 +20754,23 @@

Low Risk (RM7x7 S:2 L:4)

-
-

Low Risk (RM7x7 S:2 L:5)

+
+

Low Risk (RM7x7 S:3 L:3)

TermRM7x7S2L4RM7x7S3L2 Prefix risk
LabelLow Risk (RM7x7 S:2 L:4)Very Low Risk (RM7x7 S:3 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L4https://w3id.org/dpv/risk#RM7x7S3L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -19034,7 +20798,7 @@

Low Risk (RM7x7 S:2 L:5)

- + @@ -19067,23 +20831,23 @@

Low Risk (RM7x7 S:2 L:5)

-
-

Moderate Risk (RM7x7 S:2 L:6)

+
+

Moderate Risk (RM7x7 S:3 L:4)

TermRM7x7S2L5RM7x7S3L3 Prefix risk
LabelLow Risk (RM7x7 S:2 L:5)Low Risk (RM7x7 S:3 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L5https://w3id.org/dpv/risk#RM7x7S3L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
- + - + - + @@ -19111,7 +20875,7 @@

Moderate Risk (RM7x7 S:2 L:6)

- + @@ -19144,23 +20908,23 @@

Moderate Risk (RM7x7 S:2 L:6)

-
-

Moderate Risk (RM7x7 S:2 L:7)

+
+

High Risk (RM7x7 S:3 L:5)

TermRM7x7S2L6RM7x7S3L4 Prefix risk
LabelModerate Risk (RM7x7 S:2 L:6)Moderate Risk (RM7x7 S:3 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L6https://w3id.org/dpv/risk#RM7x7S3L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
- + - + - + @@ -19188,7 +20952,7 @@

Moderate Risk (RM7x7 S:2 L:7)

- + @@ -19221,23 +20985,23 @@

Moderate Risk (RM7x7 S:2 L:7)

-
-

Extremely Low Risk (RM7x7 S:3 L:1)

+
+

High Risk (RM7x7 S:3 L:6)

TermRM7x7S2L7RM7x7S3L5 Prefix risk
LabelModerate Risk (RM7x7 S:2 L:7)High Risk (RM7x7 S:3 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L7https://w3id.org/dpv/risk#RM7x7S3L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
- + - + - + @@ -19265,7 +21029,7 @@

Extremely Low Risk (RM7x7 S:3 L:1)

- + @@ -19298,23 +21062,23 @@

Extremely Low Risk (RM7x7 S:3 L:1)

-
-

Very Low Risk (RM7x7 S:3 L:2)

+
+

Very High Risk (RM7x7 S:3 L:7)

TermRM7x7S3L1RM7x7S3L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:3 L:1)High Risk (RM7x7 S:3 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L1https://w3id.org/dpv/risk#RM7x7S3L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
- + - + - + @@ -19342,7 +21106,7 @@

Very Low Risk (RM7x7 S:3 L:2)

- + @@ -19375,23 +21139,23 @@

Very Low Risk (RM7x7 S:3 L:2)

-
-

Low Risk (RM7x7 S:3 L:3)

+
+

Extremely Low Risk (RM7x7 S:4 L:1)

TermRM7x7S3L2RM7x7S3L7 Prefix risk
LabelVery Low Risk (RM7x7 S:3 L:2)Very High Risk (RM7x7 S:3 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L2https://w3id.org/dpv/risk#RM7x7S3L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
- + - + - + @@ -19419,7 +21183,7 @@

Low Risk (RM7x7 S:3 L:3)

- + @@ -19452,23 +21216,23 @@

Low Risk (RM7x7 S:3 L:3)

-
-

Moderate Risk (RM7x7 S:3 L:4)

+
+

Low Risk (RM7x7 S:4 L:2)

TermRM7x7S3L3RM7x7S4L1 Prefix risk
LabelLow Risk (RM7x7 S:3 L:3)Extremely Low Risk (RM7x7 S:4 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L3https://w3id.org/dpv/risk#RM7x7S4L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -19496,7 +21260,7 @@

Moderate Risk (RM7x7 S:3 L:4)

- + @@ -19529,23 +21293,23 @@

Moderate Risk (RM7x7 S:3 L:4)

-
-

High Risk (RM7x7 S:3 L:5)

+
+

Moderate Risk (RM7x7 S:4 L:3)

TermRM7x7S3L4RM7x7S4L2 Prefix risk
LabelModerate Risk (RM7x7 S:3 L:4)Low Risk (RM7x7 S:4 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L4https://w3id.org/dpv/risk#RM7x7S4L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -19573,7 +21337,7 @@

High Risk (RM7x7 S:3 L:5)

- + @@ -19606,23 +21370,23 @@

High Risk (RM7x7 S:3 L:5)

-
-

High Risk (RM7x7 S:3 L:6)

+
+

High Risk (RM7x7 S:4 L:4)

TermRM7x7S3L5RM7x7S4L3 Prefix risk
LabelHigh Risk (RM7x7 S:3 L:5)Moderate Risk (RM7x7 S:4 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L5https://w3id.org/dpv/risk#RM7x7S4L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -19650,7 +21414,7 @@

High Risk (RM7x7 S:3 L:6)

- + @@ -19683,23 +21447,23 @@

High Risk (RM7x7 S:3 L:6)

-
-

Very High Risk (RM7x7 S:3 L:7)

+
+

High Risk (RM7x7 S:4 L:5)

TermRM7x7S3L6RM7x7S4L4 Prefix risk
LabelHigh Risk (RM7x7 S:3 L:6)High Risk (RM7x7 S:4 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L6https://w3id.org/dpv/risk#RM7x7S4L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -19727,7 +21491,7 @@

Very High Risk (RM7x7 S:3 L:7)

- + @@ -19760,23 +21524,23 @@

Very High Risk (RM7x7 S:3 L:7)

-
-

Extremely Low Risk (RM7x7 S:4 L:1)

+
+

Very High Risk (RM7x7 S:4 L:6)

TermRM7x7S3L7RM7x7S4L5 Prefix risk
LabelVery High Risk (RM7x7 S:3 L:7)High Risk (RM7x7 S:4 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L7https://w3id.org/dpv/risk#RM7x7S4L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
- + - + - + @@ -19804,7 +21568,7 @@

Extremely Low Risk (RM7x7 S:4 L:1)

- + @@ -19837,23 +21601,23 @@

Extremely Low Risk (RM7x7 S:4 L:1)

-
-

Low Risk (RM7x7 S:4 L:2)

+
+

Very High Risk (RM7x7 S:4 L:7)

TermRM7x7S4L1RM7x7S4L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:4 L:1)Very High Risk (RM7x7 S:4 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L1https://w3id.org/dpv/risk#RM7x7S4L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -19881,7 +21645,7 @@

Low Risk (RM7x7 S:4 L:2)

- + @@ -19914,23 +21678,23 @@

Low Risk (RM7x7 S:4 L:2)

-
-

Moderate Risk (RM7x7 S:4 L:3)

+
+

Very Low Risk (RM7x7 S:5 L:1)

TermRM7x7S4L2RM7x7S4L7 Prefix risk
LabelLow Risk (RM7x7 S:4 L:2)Very High Risk (RM7x7 S:4 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L2https://w3id.org/dpv/risk#RM7x7S4L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
- + - + - + @@ -19958,7 +21722,7 @@

Moderate Risk (RM7x7 S:4 L:3)

- + @@ -19991,23 +21755,23 @@

Moderate Risk (RM7x7 S:4 L:3)

-
-

High Risk (RM7x7 S:4 L:4)

+
+

Low Risk (RM7x7 S:5 L:2)

TermRM7x7S4L3RM7x7S5L1 Prefix risk
LabelModerate Risk (RM7x7 S:4 L:3)Very Low Risk (RM7x7 S:5 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L3https://w3id.org/dpv/risk#RM7x7S5L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
- + - + - + @@ -20035,7 +21799,7 @@

High Risk (RM7x7 S:4 L:4)

- + @@ -20068,23 +21832,23 @@

High Risk (RM7x7 S:4 L:4)

-
-

High Risk (RM7x7 S:4 L:5)

+
+

Moderate Risk (RM7x7 S:5 L:3)

TermRM7x7S4L4RM7x7S5L2 Prefix risk
LabelHigh Risk (RM7x7 S:4 L:4)Low Risk (RM7x7 S:5 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L4https://w3id.org/dpv/risk#RM7x7S5L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -20112,7 +21876,7 @@

High Risk (RM7x7 S:4 L:5)

- + @@ -20145,23 +21909,23 @@

High Risk (RM7x7 S:4 L:5)

-
-

Very High Risk (RM7x7 S:4 L:6)

+
+

High Risk (RM7x7 S:5 L:4)

TermRM7x7S4L5RM7x7S5L3 Prefix risk
LabelHigh Risk (RM7x7 S:4 L:5)Moderate Risk (RM7x7 S:5 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L5https://w3id.org/dpv/risk#RM7x7S5L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -20189,7 +21953,7 @@

Very High Risk (RM7x7 S:4 L:6)

- + @@ -20222,23 +21986,23 @@

Very High Risk (RM7x7 S:4 L:6)

-
-

Very High Risk (RM7x7 S:4 L:7)

+
+

Very High Risk (RM7x7 S:5 L:5)

TermRM7x7S4L6RM7x7S5L4 Prefix risk
LabelVery High Risk (RM7x7 S:4 L:6)High Risk (RM7x7 S:5 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L6https://w3id.org/dpv/risk#RM7x7S5L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -20266,7 +22030,7 @@

Very High Risk (RM7x7 S:4 L:7)

- + @@ -20299,23 +22063,23 @@

Very High Risk (RM7x7 S:4 L:7)

-
-

Very Low Risk (RM7x7 S:5 L:1)

+
+

Extremely High Risk (RM7x7 S:5 L:6)

TermRM7x7S4L7RM7x7S5L5 Prefix risk
LabelVery High Risk (RM7x7 S:4 L:7)Very High Risk (RM7x7 S:5 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L7https://w3id.org/dpv/risk#RM7x7S5L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -20343,7 +22107,7 @@

Very Low Risk (RM7x7 S:5 L:1)

- + @@ -20376,23 +22140,23 @@

Very Low Risk (RM7x7 S:5 L:1)

-
-

Low Risk (RM7x7 S:5 L:2)

+
+

Extremely High Risk (RM7x7 S:5 L:7)

TermRM7x7S5L1RM7x7S5L6 Prefix risk
LabelVery Low Risk (RM7x7 S:5 L:1)Extremely High Risk (RM7x7 S:5 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L1https://w3id.org/dpv/risk#RM7x7S5L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
- + - + - + @@ -20420,7 +22184,7 @@

Low Risk (RM7x7 S:5 L:2)

- + @@ -20453,23 +22217,23 @@

Low Risk (RM7x7 S:5 L:2)

-
-

Moderate Risk (RM7x7 S:5 L:3)

+
+

Very Low Risk (RM7x7 S:6 L:1)

TermRM7x7S5L2RM7x7S5L7 Prefix risk
LabelLow Risk (RM7x7 S:5 L:2)Extremely High Risk (RM7x7 S:5 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L2https://w3id.org/dpv/risk#RM7x7S5L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
- + - + - + @@ -20497,7 +22261,7 @@

Moderate Risk (RM7x7 S:5 L:3)

- + @@ -20530,23 +22294,23 @@

Moderate Risk (RM7x7 S:5 L:3)

-
-

High Risk (RM7x7 S:5 L:4)

+
+

Moderate Risk (RM7x7 S:6 L:2)

TermRM7x7S5L3RM7x7S6L1 Prefix risk
LabelModerate Risk (RM7x7 S:5 L:3)Very Low Risk (RM7x7 S:6 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L3https://w3id.org/dpv/risk#RM7x7S6L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
- + - + - + @@ -20574,7 +22338,7 @@

High Risk (RM7x7 S:5 L:4)

- + @@ -20607,23 +22371,23 @@

High Risk (RM7x7 S:5 L:4)

-
-

Very High Risk (RM7x7 S:5 L:5)

+
+

High Risk (RM7x7 S:6 L:3)

TermRM7x7S5L4RM7x7S6L2 Prefix risk
LabelHigh Risk (RM7x7 S:5 L:4)Moderate Risk (RM7x7 S:6 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L4https://w3id.org/dpv/risk#RM7x7S6L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
- + - + - + @@ -20651,7 +22415,7 @@

Very High Risk (RM7x7 S:5 L:5)

- + @@ -20684,23 +22448,23 @@

Very High Risk (RM7x7 S:5 L:5)

-
-

Extremely High Risk (RM7x7 S:5 L:6)

+
+

Very High Risk (RM7x7 S:6 L:4)

TermRM7x7S5L5RM7x7S6L3 Prefix risk
LabelVery High Risk (RM7x7 S:5 L:5)High Risk (RM7x7 S:6 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L5https://w3id.org/dpv/risk#RM7x7S6L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
- + - + - + @@ -20728,7 +22492,7 @@

Extremely High Risk (RM7x7 S:5 L:6)

- + @@ -20761,23 +22525,23 @@

Extremely High Risk (RM7x7 S:5 L:6)

-
-

Extremely High Risk (RM7x7 S:5 L:7)

+
+

Very High Risk (RM7x7 S:6 L:5)

TermRM7x7S5L6RM7x7S6L4 Prefix risk
LabelExtremely High Risk (RM7x7 S:5 L:6)Very High Risk (RM7x7 S:6 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L6https://w3id.org/dpv/risk#RM7x7S6L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
- + - + - + @@ -20805,7 +22569,7 @@

Extremely High Risk (RM7x7 S:5 L:7)

- + @@ -20838,23 +22602,23 @@

Extremely High Risk (RM7x7 S:5 L:7)

-
-

Very Low Risk (RM7x7 S:6 L:1)

+
+

Extremely High Risk (RM7x7 S:6 L:6)

TermRM7x7S5L7RM7x7S6L5 Prefix risk
LabelExtremely High Risk (RM7x7 S:5 L:7)Very High Risk (RM7x7 S:6 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L7https://w3id.org/dpv/risk#RM7x7S6L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -20882,7 +22646,7 @@

Very Low Risk (RM7x7 S:6 L:1)

- + @@ -20915,23 +22679,23 @@

Very Low Risk (RM7x7 S:6 L:1)

-
-

Moderate Risk (RM7x7 S:6 L:2)

+
+

Extremely High Risk (RM7x7 S:6 L:7)

TermRM7x7S6L1RM7x7S6L6 Prefix risk
LabelVery Low Risk (RM7x7 S:6 L:1)Extremely High Risk (RM7x7 S:6 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L1https://w3id.org/dpv/risk#RM7x7S6L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
- + - + - + @@ -20959,7 +22723,7 @@

Moderate Risk (RM7x7 S:6 L:2)

- + @@ -20992,23 +22756,23 @@

Moderate Risk (RM7x7 S:6 L:2)

-
-

High Risk (RM7x7 S:6 L:3)

+
+

Low Risk (RM7x7 S:7 L:1)

TermRM7x7S6L2RM7x7S6L7 Prefix risk
LabelModerate Risk (RM7x7 S:6 L:2)Extremely High Risk (RM7x7 S:6 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L2https://w3id.org/dpv/risk#RM7x7S6L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
- + - + - + @@ -21036,7 +22800,7 @@

High Risk (RM7x7 S:6 L:3)

- + @@ -21069,23 +22833,23 @@

High Risk (RM7x7 S:6 L:3)

-
-

Very High Risk (RM7x7 S:6 L:4)

+
+

Moderate Risk (RM7x7 S:7 L:2)

TermRM7x7S6L3RM7x7S7L1 Prefix risk
LabelHigh Risk (RM7x7 S:6 L:3)Low Risk (RM7x7 S:7 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L3https://w3id.org/dpv/risk#RM7x7S7L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
- + - + - + @@ -21113,7 +22877,7 @@

Very High Risk (RM7x7 S:6 L:4)

- + @@ -21146,23 +22910,23 @@

Very High Risk (RM7x7 S:6 L:4)

-
-

Very High Risk (RM7x7 S:6 L:5)

+
+

High Risk (RM7x7 S:7 L:3)

TermRM7x7S6L4RM7x7S7L2 Prefix risk
LabelVery High Risk (RM7x7 S:6 L:4)Moderate Risk (RM7x7 S:7 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L4https://w3id.org/dpv/risk#RM7x7S7L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
- + - + - + @@ -21190,7 +22954,7 @@

Very High Risk (RM7x7 S:6 L:5)

- + @@ -21223,23 +22987,23 @@

Very High Risk (RM7x7 S:6 L:5)

-
-

Extremely High Risk (RM7x7 S:6 L:6)

+
+

Very High Risk (RM7x7 S:7 L:4)

TermRM7x7S6L5RM7x7S7L3 Prefix risk
LabelVery High Risk (RM7x7 S:6 L:5)High Risk (RM7x7 S:7 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L5https://w3id.org/dpv/risk#RM7x7S7L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
- + - + - + @@ -21267,7 +23031,7 @@

Extremely High Risk (RM7x7 S:6 L:6)

- + @@ -21300,23 +23064,23 @@

Extremely High Risk (RM7x7 S:6 L:6)

-
-

Extremely High Risk (RM7x7 S:6 L:7)

+
+

Extremely High Risk (RM7x7 S:7 L:5)

TermRM7x7S6L6RM7x7S7L4 Prefix risk
LabelExtremely High Risk (RM7x7 S:6 L:6)Very High Risk (RM7x7 S:7 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L6https://w3id.org/dpv/risk#RM7x7S7L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
- + - + - + @@ -21344,7 +23108,7 @@

Extremely High Risk (RM7x7 S:6 L:7)

- + @@ -21377,23 +23141,23 @@

Extremely High Risk (RM7x7 S:6 L:7)

-
-

Low Risk (RM7x7 S:7 L:1)

+
+

Extremely High Risk (RM7x7 S:7 L:6)

TermRM7x7S6L7RM7x7S7L5 Prefix risk
LabelExtremely High Risk (RM7x7 S:6 L:7)Extremely High Risk (RM7x7 S:7 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L7https://w3id.org/dpv/risk#RM7x7S7L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
- + - + - + @@ -21421,7 +23185,7 @@

Low Risk (RM7x7 S:7 L:1)

- + @@ -21454,23 +23218,23 @@

Low Risk (RM7x7 S:7 L:1)

-
-

Moderate Risk (RM7x7 S:7 L:2)

+
+

Extremely High Risk (RM7x7 S:7 L:7)

TermRM7x7S7L1RM7x7S7L6 Prefix risk
LabelLow Risk (RM7x7 S:7 L:1)Extremely High Risk (RM7x7 S:7 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S7L1https://w3id.org/dpv/risk#RM7x7S7L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
- + - + - + @@ -21498,7 +23262,7 @@

Moderate Risk (RM7x7 S:7 L:2)

- + @@ -21531,38 +23295,37 @@

Moderate Risk (RM7x7 S:7 L:2)

-
-

High Risk (RM7x7 S:7 L:3)

+
+

Rule-Based System Design

TermRM7x7S7L2RM7x7S7L7 Prefix risk
LabelModerate Risk (RM7x7 S:7 L:2)Extremely High Risk (RM7x7 S:7 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S7L2https://w3id.org/dpv/risk#RM7x7S7L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
- + - + - + - + - @@ -21575,31 +23338,37 @@

High Risk (RM7x7 S:7 L:3)

- + - + + + + - + + + + - + - + - @@ -21608,38 +23377,42 @@

High Risk (RM7x7 S:7 L:3)

-
-

Very High Risk (RM7x7 S:7 L:4)

+
+

Sabotage

TermRM7x7S7L3RuleBasedSystemDesign Prefix risk
LabelHigh Risk (RM7x7 S:7 L:3)Rule-Based System Design
IRIhttps://w3id.org/dpv/risk#RM7x7S7L3https://w3id.org/dpv/risk#RuleBasedSystemDesign
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighBias that occurs due to developer experience and expert advice having a significant influence on rule-based system design
Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
Source
Date Created2022-08-172024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-MATRIX in RISK + section BIAS in RISK
- + - + - + - + - + + + + @@ -21652,14 +23425,17 @@

Very High Risk (RM7x7 S:7 L:4)

- + - + + + + @@ -21667,7 +23443,10 @@

Very High Risk (RM7x7 S:7 L:4)

- + + + + @@ -21676,7 +23455,7 @@

Very High Risk (RM7x7 S:7 L:4)

- @@ -21685,38 +23464,39 @@

Very High Risk (RM7x7 S:7 L:4)

-
-

Extremely High Risk (RM7x7 S:7 L:5)

+
+

Sampling Bias

TermRM7x7S7L4Sabotage Prefix risk
LabelVery High Risk (RM7x7 S:7 L:4)Sabotage
IRIhttps://w3id.org/dpv/risk#RM7x7S7L4https://w3id.org/dpv/risk#Sabotage
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:AvailabilityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighSomething that acts as or causes Sabotage
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created 2022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-MATRIX in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - + + @@ -21729,31 +23509,34 @@

Extremely High Risk (RM7x7 S:7 L:5)

- + - + + + + - + - + - @@ -21762,38 +23545,39 @@

Extremely High Risk (RM7x7 S:7 L:5)

-
-

Extremely High Risk (RM7x7 S:7 L:6)

+
+

Scam

TermRM7x7S7L5SamplingBias Prefix risk
LabelExtremely High Risk (RM7x7 S:7 L:5)Sampling Bias
IRIhttps://w3id.org/dpv/risk#RM7x7S7L5https://w3id.org/dpv/risk#SamplingBias
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement +
Broader/Parent types risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighBias that occurs when data records are not collected randomly from the intended population
Source
Date Created2022-08-172024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-MATRIX in RISK + section BIAS in RISK
- + - + - + - + - + + @@ -21806,14 +23590,17 @@

Extremely High Risk (RM7x7 S:7 L:6)

- + - + + + + @@ -21821,7 +23608,10 @@

Extremely High Risk (RM7x7 S:7 L:6)

- + + + + @@ -21830,7 +23620,7 @@

Extremely High Risk (RM7x7 S:7 L:6)

- @@ -21839,38 +23629,45 @@

Extremely High Risk (RM7x7 S:7 L:6)

-
-

Extremely High Risk (RM7x7 S:7 L:7)

+
+

Security Attack

TermRM7x7S7L6Scam Prefix risk
LabelExtremely High Risk (RM7x7 S:7 L:6)Scam
IRIhttps://w3id.org/dpv/risk#RM7x7S7L6https://w3id.org/dpv/risk#Scam
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighSomething that acts as or causes Scam
SourceISO/IEC 27005:2018
Date Created 2022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-MATRIX in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + + + + + @@ -21883,7 +23680,7 @@

Extremely High Risk (RM7x7 S:7 L:7)

- + @@ -21894,20 +23691,14 @@

Extremely High Risk (RM7x7 S:7 L:7)

- - - - + - - - - + - @@ -21916,23 +23707,23 @@

Extremely High Risk (RM7x7 S:7 L:7)

-
-

Sabotage

+
+

Security Breach

TermRM7x7S7L7SecurityAttack Prefix risk
LabelExtremely High Risk (RM7x7 S:7 L:7)Security Attack
IRIhttps://w3id.org/dpv/risk#RM7x7S7L7https://w3id.org/dpv/risk#SecurityAttack
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:AvailabilityConcept +
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighSomething that acts as or causes an attack on security with the aim of undermining it
Date Created2022-08-17
ContributorsHarshvardhan J. Pandit
See More: section RISK-MATRIX in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -21947,11 +23738,14 @@

Sabotage

- + + @@ -21964,7 +23758,7 @@

Sabotage

- + @@ -21973,7 +23767,7 @@

Sabotage

- + @@ -22003,39 +23797,38 @@

Sabotage

-
-

Scam

+
+

Selection Bias

TermSabotageSecurityBreach Prefix risk
LabelSabotageSecurity Breach
IRIhttps://w3id.org/dpv/risk#Sabotagehttps://w3id.org/dpv/risk#SecurityBreach
risk:AvailabilityConcept
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:ConfidentialityConcept
Broader/Parent types risk:IntegrityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
DefinitionSomething that acts as or causes SabotageSomething that acts as or causes Security Breach
SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
- + - + - + - + - - - @@ -22048,7 +23841,7 @@

Scam

- + @@ -22057,28 +23850,25 @@

Scam

- + - + - - - - + - + - @@ -22087,23 +23877,28 @@

Scam

-
-

Security Attack

+ + + + + +
+

Sexual Violence

TermScamSelectionBias Prefix risk
LabelScamSelection Bias
IRIhttps://w3id.org/dpv/risk#Scamhttps://w3id.org/dpv/risk#SelectionBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes ScamBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + @@ -22115,17 +23910,7 @@

Security Attack

- - - - - - - @@ -22138,20 +23923,32 @@

Security Attack

- + - + + + + - - - + + + + + + + + + + + + @@ -22165,49 +23962,47 @@

Security Attack

-
-

Security Breach

+
+

Share Risk

TermSecurityAttackSexualViolence Prefix risk
LabelSecurity AttackSexual Violence
IRIhttps://w3id.org/dpv/risk#SecurityAttackhttps://w3id.org/dpv/risk#SexualViolence
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
Broader/Parent types risk:IntegrityConcept + risk:IndividualRisk
DefinitionSomething that acts as or causes an attack on security with the aim of undermining itSomething that acts as or causes Sexual Violence
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - - - - - + + + + @@ -22216,28 +24011,22 @@

Security Breach

- + - - - - + - + - - - - + @@ -22246,7 +24035,7 @@

Security Breach

- @@ -22255,40 +24044,37 @@

Security Breach

- - - - - -
-

Sexual Violence

+
+

Simpson'S Paradox Bias

TermSecurityBreachShareRisk Prefix risk
LabelSecurity BreachShare Risk
IRIhttps://w3id.org/dpv/risk#SecurityBreachhttps://w3id.org/dpv/risk#ShareRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:IntegrityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Security BreachRisk Mitigation Measure that shares Risk e.g. amongst stakeholders
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - @@ -22301,7 +24087,7 @@

Sexual Violence

- + @@ -22310,28 +24096,25 @@

Sexual Violence

- + - + - - - - + - + - @@ -22340,47 +24123,40 @@

Sexual Violence

-
-

Share Risk

+
+

Social Disadvantage

TermSexualViolenceSimpsonsParadoxBias Prefix risk
LabelSexual ViolenceSimpson'S Paradox Bias
IRIhttps://w3id.org/dpv/risk#SexualViolencehttps://w3id.org/dpv/risk#SimpsonsParadoxBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:IndividualRisk + risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Sexual ViolenceBias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -22389,7 +24165,7 @@

Share Risk

- + @@ -22402,18 +24178,21 @@

Share Risk

- + - + + + + - + - @@ -22422,36 +24201,37 @@

Share Risk

-
-

Social Disadvantage

+
+

Societal Bias

TermShareRiskSocialDisadvantage Prefix risk
LabelShare RiskSocial Disadvantage
IRIhttps://w3id.org/dpv/risk#ShareRiskhttps://w3id.org/dpv/risk#SocialDisadvantage
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionRisk Mitigation Measure that shares Risk e.g. amongst stakeholdersSomething that acts as or causes Social Disadvantage
Date Created2024-05-192022-08-19
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - @@ -22464,34 +24244,34 @@

Social Disadvantage

- + - + + + + - + - - - - + - + - @@ -22807,6 +24587,85 @@

Spoofing

+
+

Statistical Bias

+
TermSocialDisadvantageSocietalBias Prefix risk
LabelSocial DisadvantageSocietal Bias
IRIhttps://w3id.org/dpv/risk#SocialDisadvantagehttps://w3id.org/dpv/risk#SocietalBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Social DisadvantageBias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society
Source
Date Created2022-08-192024-09-13
Date Modified2024-08-16
ContributorsGeorg P. KrogDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermStatisticalBiasPrefixrisk
LabelStatistical Bias
IRIhttps://w3id.org/dpv/risk#StatisticalBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:DataBias + → risk:Bias + → risk:RiskConcept +
DefinitionBias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in RISK +
+
+ + +

System Failure

@@ -26016,6 +27875,10 @@

Properties

+ + + + @@ -26200,6 +28063,15 @@

caused by vulnerability

+ + + + + + + + + @@ -26236,6 +28108,18 @@

caused by vulnerability

+ + + + + + + + + + + + @@ -26364,6 +28248,9 @@

exploits vulnerability

+ + + @@ -26756,6 +28643,9 @@

has vulnerability

+ + + @@ -26824,6 +28714,12 @@

has vulnerability

+ + + + + + @@ -27088,6 +28984,15 @@

is vulnerability of

+ + + + + + + + + @@ -27209,6 +29114,9 @@

refers to risk

+ + + @@ -27611,6 +29519,24 @@

refers to risk

+ + + + + + + + + + + + + + + + + + @@ -27768,13 +29694,23 @@

External

+ + + + + + + + + + @@ -27801,9 +29737,12 @@

External

+ + + @@ -27817,6 +29756,18 @@

External

+ + + + + + + + + + + + @@ -27909,6 +29860,11 @@

External

+ + + + + @@ -27917,6 +29873,7 @@

External

+ @@ -28013,16 +29970,31 @@

External

+ + + + + + + + + + + + + + + @@ -28184,6 +30156,9 @@

External

+ + + @@ -28472,10 +30447,28 @@

External

+ + + + + + + + + + + + + + + + + + @@ -28615,6 +30608,7 @@

Contributors

  • Axel Polleres (Vienna University of Economics and Business)
  • Beatriz Esteves (IDLab, IMEC, Ghent University)
  • +
  • Daniel Doherty ()
  • Delaram Golpayegani (ADAPT Centre, Trinity College Dublin)
  • Fajar Ekaputra (Vienna University of Technology)
  • Georg P. Krog (Signatu AS)
  • diff --git a/2.1-dev/risk/index.html b/2.1-dev/risk/index.html index 4bef40b04..239452705 100644 --- a/2.1-dev/risk/index.html +++ b/2.1-dev/risk/index.html @@ -2099,6 +2099,117 @@

    Financial

    risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee go to full definition + +
+ + +
+

Bias

+

Note: These are intended to represent bias concepts in general e.g. applicable for any technology. The AI extension contains an additional set of concepts that extend these concepts to represent biases that are specific to the development and use of AI.

+
    +
  • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
      +
    • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition + +
    • +
    • + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition + +
    • +
    • + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition + +
    • +
    • + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition + +
    • +
    • + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition + +
    • +
    • + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition + +
    • +
    • + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition + +
    • +
    • + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition + +
    • +
    +
  • +
  • + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
      +
    • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition + +
    • +
    • + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition + +
    • +
    • + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
    • +
    • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition +
        +
      • + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition + +
      • +
      • + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition + +
      • +
      • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
          +
        • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition + +
        • +
        • + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition + +
        • +
        • + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition + +
        • +
        +
      • +
      +
    • +
@@ -3631,6 +3742,84 @@

Benefit

+
+

Bias

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermBiasPrefixrisk
LabelBias
IRIhttps://w3id.org/dpv/risk#Bias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskConcept +
DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +

Blackmail

@@ -4056,6 +4245,84 @@

Coercion

+
+

Cognitive Bias

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermCognitiveBiasPrefixrisk
LabelCognitive Bias
IRIhttps://w3id.org/dpv/risk#CognitiveBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:Bias + → risk:RiskConcept +
DefinitionBias that occurs when humans are processing and interpreting information
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + +

Compensation

@@ -4643,47 +4910,41 @@

Confidentiality Incident

-
-

Consequence Control

+
+

Confirmation Bias

- + - + - + - + - - - - - + @@ -4692,31 +4953,34 @@

Consequence Control

- + - + + + + - + - + - @@ -4725,47 +4989,42 @@

Consequence Control

-
-

Containment Control

+
+

Confounding Variables Bias

TermConsequenceControlConfirmationBias Prefix risk
LabelConsequence ControlConfirmation Bias
IRIhttps://w3id.org/dpv/risk#ConsequenceControlhttps://w3id.org/dpv/risk#ConfirmationBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionRisk Mitigation Measure that controls the ConsequencesBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information
Source
Date Created2024-05-192024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -4774,28 +5033,34 @@

Containment Control

- + - + + + + - + - + + + + - @@ -4804,40 +5069,47 @@

Containment Control

-
-

Copyright Violation

+
+

Consequence Control

TermContainmentControlConfoundingVariablesBias Prefix risk
LabelContainment ControlConfounding Variables Bias
IRIhttps://w3id.org/dpv/risk#ContainmentControlhttps://w3id.org/dpv/risk#ConfoundingVariablesBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl to contain eventBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - + + + + @@ -4846,28 +5118,22 @@

Copyright Violation

- + - - - - + - + - - - - + @@ -4876,52 +5142,54 @@

Copyright Violation

-
TermCopyrightViolationConsequenceControl Prefix risk
LabelCopyright ViolationConsequence Control
IRIhttps://w3id.org/dpv/risk#CopyrightViolationhttps://w3id.org/dpv/risk#ConsequenceControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Copyright ViolationRisk Mitigation Measure that controls the Consequences
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- - -
-

Cross-Border Incident

+ +
+

Containment Control

- + - + - + - + - - @@ -4932,7 +5200,7 @@

Cross-Border Incident

- + @@ -4953,7 +5221,7 @@

Cross-Border Incident

- @@ -4962,23 +5230,23 @@

Cross-Border Incident

-
-

Cryptojacking

+
+

Copyright Violation

TermCrossBorderIncidentContainmentControl Prefix risk
LabelCross-Border IncidentContainment Control
IRIhttps://w3id.org/dpv/risk#CrossBorderIncidenthttps://w3id.org/dpv/risk#ContainmentControl
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation risk:hasIncident + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionIncident involving cross-border or multiple jurisdictionsControl to contain event
See More: section INCIDENT in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -4990,10 +5258,7 @@

Cryptojacking

- - - @@ -5007,7 +5272,7 @@

Cryptojacking

- + @@ -5016,7 +5281,7 @@

Cryptojacking

- + @@ -5043,39 +5308,44 @@

Cryptojacking

TermCryptojackingCopyrightViolation Prefix risk
LabelCryptojackingCopyright Violation
IRIhttps://w3id.org/dpv/risk#Cryptojackinghttps://w3id.org/dpv/risk#CopyrightViolation
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ExternalSecurityThreat + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes CryptojackingSomething that acts as or causes Copyright Violation
SourceENISA Threat Landscape 2021ENISA Reference Incident Classification Taxonomy 2018
+ + -
-

Damage

+
+

Coverage Bias

- + - + - + - + - @@ -5088,34 +5358,34 @@

Damage

- + - + + + + - + - - - - + - + - @@ -5123,54 +5393,44 @@

Damage

- -
-

Data Breach

+
+

Cross-Border Incident

TermDamageCoverageBias Prefix risk
LabelDamageCoverage Bias
IRIhttps://w3id.org/dpv/risk#Damagehttps://w3id.org/dpv/risk#CoverageBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes DamageBias that occurs when a population represented in a dataset does not match the actual or real population that are being used
Source
Date Created2022-03-302024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - - - - - - - + + + + @@ -5179,40 +5439,28 @@

Data Breach

- + - - - - - - - + - + - - - - - - - - + + - @@ -5221,23 +5469,23 @@

Data Breach

-
-

Data Corruption

+
+

Cryptojacking

TermDataBreachCrossBorderIncident Prefix risk
LabelData BreachCross-Border Incident
IRIhttps://w3id.org/dpv/risk#DataBreachhttps://w3id.org/dpv/risk#CrossBorderIncident
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:SecurityBreach - → risk:AvailabilityConcept -
Broader/Parent types risk:SecurityBreach - → risk:ConfidentialityConcept -
Broader/Parent types risk:SecurityBreach - → risk:IntegrityConcept -
Broader/Parent types risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:Incidentdpv:RiskConcept
Object of relation risk:hasIncident +
DefinitionSomething that acts as or causes Data BreachIncident involving cross-border or multiple jurisdictions
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0071 :: Using risk controls to express how tech/org measures address the risk
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in DEX + section INCIDENT in RISK
- + - + - + @@ -5249,10 +5497,10 @@

Data Corruption

- - @@ -5266,19 +5514,16 @@

Data Corruption

- + - - - - + - + @@ -5307,44 +5552,41 @@

Data Corruption

-
-

Deliberate Incident

+ +
+

Damage

TermDataCorruptionCryptojacking Prefix risk
LabelData CorruptionCryptojacking
IRIhttps://w3id.org/dpv/risk#DataCorruptionhttps://w3id.org/dpv/risk#Cryptojacking
Broader/Parent types risk:IntegrityConcept + risk:AvailabilityConcept
Broader/Parent types risk:OperationalSecurityRisk + risk:ExternalSecurityThreatdpv:RiskConcept
DefinitionSomething that acts as or causes Corruption of DataSomething that acts as or causes Cryptojacking
Usage NoteThis concept was called "Corruption Data" in DPV 2.0
SourceISO/IEC 27005:2018ENISA Threat Landscape 2021
- + - + - + - + - - - - - + @@ -5353,7 +5595,7 @@

Deliberate Incident

- + @@ -5366,15 +5608,21 @@

Deliberate Incident

- + - - + + + + + + + + - @@ -5383,39 +5631,37 @@

Deliberate Incident

-
-

Denial of Service Attack (DoS)

+
+

Data Aggregation Bias

TermDeliberateIncidentDamage Prefix risk
LabelDeliberate IncidentDamage
IRIhttps://w3id.org/dpv/risk#DeliberateIncidenthttps://w3id.org/dpv/risk#Damage
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:Incident + risk:LegalRiskdpv:RiskConcept
Object of relation risk:hasIncident -
DefinitionIncident caused due to deliberate actions of a humanSomething that acts as or causes Damage
Date Created2024-05-192022-03-30
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - @@ -5428,7 +5674,7 @@

Denial of Service Attack (DoS)

- + @@ -5437,28 +5683,25 @@

Denial of Service Attack (DoS)

- + - + - - - - + - + - @@ -5467,47 +5710,40 @@

Denial of Service Attack (DoS)

-
-

Detection Control

+
+

Data Bias

TermDenialServiceAttackDataAggregationBias Prefix risk
LabelDenial of Service Attack (DoS)Data Aggregation Bias
IRIhttps://w3id.org/dpv/risk#DenialServiceAttackhttps://w3id.org/dpv/risk#DataAggregationBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Denial of Service Attack (DoS)Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -5516,28 +5752,34 @@

Detection Control

- + - + + + + - + - + + + + - @@ -5546,23 +5788,23 @@

Detection Control

-
-

Detriment

+
+

Data Breach

TermDetectionControlDataBias Prefix risk
LabelDetection ControlData Bias
IRIhttps://w3id.org/dpv/risk#DetectionControlhttps://w3id.org/dpv/risk#DataBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl to detect eventBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + @@ -5574,7 +5816,20 @@

Detriment

- + + + + + + @@ -5588,20 +5843,26 @@

Detriment

- + + + + - + + + + - + @@ -5609,13 +5870,13 @@

Detriment

- + - @@ -5624,23 +5885,23 @@

Detriment

-
-

Discrimination

+
+

Data Corruption

TermDetrimentDataBreach Prefix risk
LabelDetrimentData Breach
IRIhttps://w3id.org/dpv/risk#Detrimenthttps://w3id.org/dpv/risk#DataBreach
Broader/Parent types risk:LegalRisk + risk:SecurityBreach + → risk:AvailabilityConcept +
Broader/Parent types risk:SecurityBreach + → risk:ConfidentialityConcept +
Broader/Parent types risk:SecurityBreach + → risk:IntegrityConcept +
Broader/Parent types risk:SecurityBreach + → risk:OperationalSecurityRiskdpv:RiskConcept
DefinitionSomething that acts as or causes DetrimentSomething that acts as or causes Data Breach
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0071 :: Using risk controls to express how tech/org measures address the risk
SourceISO/IEC 27005:2018
Date Created2022-03-232022-08-17
Date Modified
ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz EstevesHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONSEQUENCES in DEX
- + - + - + @@ -5652,7 +5913,10 @@

Discrimination

- + + @@ -5666,20 +5930,26 @@

Discrimination

- + - + + + + - + + + + - + @@ -5687,7 +5957,7 @@

Discrimination

- + @@ -5702,39 +5972,37 @@

Discrimination

-
-

Distributed Denial of Service Attack (DDoS)

+
+

Data Processing Bias

TermDiscriminationDataCorruption Prefix risk
LabelDiscriminationData Corruption
IRIhttps://w3id.org/dpv/risk#Discriminationhttps://w3id.org/dpv/risk#DataCorruption
Broader/Parent types risk:SocietalRisk + risk:IntegrityConcept +
Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept
DefinitionSomething that acts as or causes DiscriminationSomething that acts as or causes Corruption of Data
Usage NoteThis concept was called "Corruption Data" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2022-08-192022-08-17
Date Modified
ContributorsGeorg P. KrogHarshvardhan J. Pandit
- + - + - + - + - - - @@ -5747,7 +6015,7 @@

Distributed Denial of Service Attack (DDoS)

- + @@ -5756,28 +6024,25 @@

Distributed Denial of Service Attack (DDoS)

- + - + - - - - + - + - @@ -5785,23 +6050,23 @@

Distributed Denial of Service Attack (DDoS)

-
-

Environmental Incident

+
+

Deliberate Incident

TermDistributedDenialServiceAttackDataProcessingBias Prefix risk
LabelDistributed Denial of Service Attack (DDoS)Data Processing Bias
IRIhttps://w3id.org/dpv/risk#DistributedDenialServiceAttackhttps://w3id.org/dpv/risk#DataProcessingBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Distributed Denial of Service Attack (DDoS)Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + @@ -5831,7 +6096,7 @@

Environmental Incident

- + @@ -5861,23 +6126,23 @@

Environmental Incident

-
-

Environmental Risk

+
+

Denial of Service Attack (DoS)

TermEnvironmentalIncidentDeliberateIncident Prefix risk
LabelEnvironmental IncidentDeliberate Incident
IRIhttps://w3id.org/dpv/risk#EnvironmentalIncidenthttps://w3id.org/dpv/risk#DeliberateIncident
DefinitionIncident caused due to environmental factors outside human controlsIncident caused due to deliberate actions of a human
- + - + - + @@ -5889,7 +6154,11 @@

Environmental Risk

- + + @@ -5902,20 +6171,32 @@

Environmental Risk

- + - + + + + - - - + + + + + + + + + + + + @@ -5929,43 +6210,47 @@

Environmental Risk

-
-

Equipment Failure

+
+

Detection Control

TermEnvironmentalRiskDenialServiceAttack Prefix risk
LabelEnvironmental RiskDenial of Service Attack (DoS)
IRIhttps://w3id.org/dpv/risk#EnvironmentalRiskhttps://w3id.org/dpv/risk#DenialServiceAttack
Broader/Parent types dpv:RiskConcept + risk:AvailabilityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
DefinitionRisks and issues that have their origin in environment or can affect the environment at largeSomething that acts as or causes Denial of Service Attack (DoS)
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - + + + + @@ -5974,40 +6259,28 @@

Equipment Failure

- + - - - - + - - - - + - + - - - - - - - - + + - @@ -6016,23 +6289,23 @@

Equipment Failure

-
-

Equipment Malfunction

+
+

Detriment

TermEquipmentFailureDetectionControl Prefix risk
LabelEquipment FailureDetection Control
IRIhttps://w3id.org/dpv/risk#EquipmentFailurehttps://w3id.org/dpv/risk#DetectionControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Equipment FailureControl to detect event
Usage NoteHere equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -6044,10 +6317,7 @@

Equipment Malfunction

- - - @@ -6061,26 +6331,20 @@

Equipment Malfunction

- + - - - - + - - - - + - + @@ -6088,7 +6352,7 @@

Equipment Malfunction

- + @@ -6103,23 +6367,23 @@

Equipment Malfunction

-
-

Erroneous System Use

+
+

Discrimination

TermEquipmentMalfunctionDetriment Prefix risk
LabelEquipment MalfunctionDetriment
IRIhttps://w3id.org/dpv/risk#EquipmentMalfunctionhttps://w3id.org/dpv/risk#Detriment
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:OperationalSecurityRisk + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Equipment MalfunctionSomething that acts as or causes Detriment
Usage NoteHere equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-172022-03-23
Date Modified
ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
- + - + - + @@ -6131,7 +6395,7 @@

Erroneous System Use

- @@ -6145,23 +6409,20 @@

Erroneous System Use

- + - - - - + - + @@ -6169,7 +6430,7 @@

Erroneous System Use

- + @@ -6184,25 +6445,23 @@

Erroneous System Use

- - -
-

Exposure to Harmful Speech

+
+

Distributed Denial of Service Attack (DDoS)

TermErroneousSystemUseDiscrimination Prefix risk
LabelErroneous System UseDiscrimination
IRIhttps://w3id.org/dpv/risk#ErroneousSystemUsehttps://w3id.org/dpv/risk#Discrimination
Broader/Parent types risk:UserRisks + risk:SocietalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Erroneous System UseSomething that acts as or causes Discrimination
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-19
Date Modified
ContributorsHarshvardhan J. PanditGeorg P. Krog
- + - + - + @@ -6214,7 +6473,10 @@

Exposure to Harmful Speech

- + + @@ -6228,19 +6490,16 @@

Exposure to Harmful Speech

- + - - - - + - + @@ -6269,40 +6528,44 @@

Exposure to Harmful Speech

- -
-

External Security Threat

+
+

Environmental Incident

TermExposureToHarmfulSpeechDistributedDenialServiceAttack Prefix risk
LabelExposure to Harmful SpeechDistributed Denial of Service Attack (DDoS)
IRIhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeechhttps://w3id.org/dpv/risk#DistributedDenialServiceAttack
Broader/Parent types risk:SocietalRisk + risk:AvailabilityConcept +
Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept
DefinitionSomething that acts as or causes Harmful SpeechSomething that acts as or causes Distributed Denial of Service Attack (DDoS)
Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
- + - + - + - + - - + + + + @@ -6311,7 +6574,7 @@

External Security Threat

- + @@ -6322,14 +6585,17 @@

External Security Threat

- + + + + - @@ -6338,23 +6604,23 @@

External Security Threat

-
-

Extorsion

+
+

Environmental Risk

TermExternalSecurityThreatEnvironmentalIncident Prefix risk
LabelExternal Security ThreatEnvironmental Incident
IRIhttps://w3id.org/dpv/risk#ExternalSecurityThreathttps://w3id.org/dpv/risk#EnvironmentalIncident
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types dpv:RiskConcept + risk:Incident + → dpv:RiskConcept
Object of relation risk:hasIncident +
DefinitionConcepts associated with security threats that are likely to originate externallyIncident caused due to environmental factors outside human controls
Date Created2024-05-19
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + @@ -6366,11 +6632,7 @@

Extorsion

- - - @@ -6383,32 +6645,20 @@

Extorsion

- + - - - - + - - - - - - - - - - - - + + + @@ -6422,44 +6672,43 @@

Extorsion

-
-

Extremely High Likelihood

+
+

Equipment Failure

TermExtorsionEnvironmentalRisk Prefix risk
LabelExtorsionEnvironmental Risk
IRIhttps://w3id.org/dpv/risk#Extorsionhttps://w3id.org/dpv/risk#EnvironmentalRisk
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + dpv:RiskConcept
DefinitionSomething that acts as or causes ExtorsionRisks and issues that have their origin in environment or can affect the environment at large
SourceENISA Threat Taxonomy 2016
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - + + - - - - + @@ -6468,25 +6717,31 @@

Extremely High Likelihood

- + - + - + + + + - + - + + + + @@ -6495,7 +6750,7 @@

Extremely High Likelihood

- @@ -6504,44 +6759,43 @@

Extremely High Likelihood

-
-

Extremely High Risk

+
+

Equipment Malfunction

TermExtremelyHighLikelihoodEquipmentFailure Prefix risk
LabelExtremely High LikelihoodEquipment Failure
IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihoodhttps://w3id.org/dpv/risk#EquipmentFailure
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:AvailabilityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasLikelihood -
DefinitionLevel where Likelihood is Extremely HighSomething that acts as or causes Equipment Failure
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - - - - + @@ -6550,25 +6804,31 @@

Extremely High Risk

- + - + - + + + + - + - + + + + @@ -6577,7 +6837,7 @@

Extremely High Risk

- @@ -6586,44 +6846,40 @@

Extremely High Risk

-
-

Extremely High Severity

+
+

Erroneous System Use

TermExtremelyHighRiskEquipmentMalfunction Prefix risk
LabelExtremely High RiskEquipment Malfunction
IRIhttps://w3id.org/dpv/risk#ExtremelyHighRiskhttps://w3id.org/dpv/risk#EquipmentMalfunction
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:AvailabilityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasRiskLevel -
DefinitionLevel where Risk is Extremely HighSomething that acts as or causes Equipment Malfunction
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -6632,25 +6888,28 @@

Extremely High Severity

- + - - - - + - + + + + - + - + + + + @@ -6659,7 +6918,7 @@

Extremely High Severity

- @@ -6668,23 +6927,261 @@

Extremely High Severity

-
-

Extremely Low Likelihood

+ + +
+

Exposure to Harmful Speech

TermExtremelyHighSeverityErroneousSystemUse Prefix risk
LabelExtremely High SeverityErroneous System Use
IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverityhttps://w3id.org/dpv/risk#ErroneousSystemUse
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:UserRisks + → dpv:RiskConcept
Object of relation dpv:hasSeverity -
DefinitionLevel where Severity is Extremely HighSomething that acts as or causes Erroneous System Use
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowLikelihoodExposureToHarmfulSpeech Prefix risk
LabelExtremely Low LikelihoodExposure to Harmful Speech
IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihoodhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeech
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Harmful Speech
Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

External Security Threat

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExternalSecurityThreatPrefixrisk
LabelExternal Security Threat
IRIhttps://w3id.org/dpv/risk#ExternalSecurityThreat
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept +
DefinitionConcepts associated with security threats that are likely to originate externally
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Extorsion

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtorsionPrefixrisk
LabelExtorsion
IRIhttps://w3id.org/dpv/risk#Extorsion
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Extorsion
SourceENISA Threat Taxonomy 2016
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Extremely High Likelihood

+ + + + + + + + + + + + + + + @@ -6714,11 +7211,11 @@

Extremely Low Likelihood

- + - + @@ -6750,42 +7247,1372 @@

Extremely Low Likelihood

-
-

Extremely Low Risk

+
+

Extremely High Risk

TermExtremelyHighLikelihoodPrefixrisk
LabelExtremely High Likelihood
IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihood
DefinitionLevel where Likelihood is Extremely LowLevel where Likelihood is Extremely High
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
- + - + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowRiskExtremelyHighRisk Prefix risk
LabelExtremely Low RiskExtremely High Risk
IRIhttps://w3id.org/dpv/risk#ExtremelyLowRiskhttps://w3id.org/dpv/risk#ExtremelyHighRisk
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
Object of relation dpv:hasRiskLevel +
DefinitionLevel where Risk is Extremely High
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely High Severity

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyHighSeverityPrefixrisk
LabelExtremely High Severity
IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverity
Typerdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:7SeverityLevels + → dpv:Severity +
Object of relation dpv:hasSeverity +
DefinitionLevel where Severity is Extremely High
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely Low Likelihood

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowLikelihoodPrefixrisk
LabelExtremely Low Likelihood
IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihood
Typerdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood +
Object of relation dpv:hasLikelihood +
DefinitionLevel where Likelihood is Extremely Low
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely Low Risk

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowRiskPrefixrisk
LabelExtremely Low Risk
IRIhttps://w3id.org/dpv/risk#ExtremelyLowRisk
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
Object of relation dpv:hasRiskLevel +
DefinitionLevel where Risk is Extremely Low
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely Low Severity

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowSeverityPrefixrisk
LabelExtremely Low Severity
IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverity
Typerdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:7SeverityLevels + → dpv:Severity +
Object of relation dpv:hasSeverity +
DefinitionLevel where Severity is Extremely Low
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Fee

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFeePrefixrisk
LabelFee
IRIhttps://w3id.org/dpv/risk#Fee
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:FinancialImpact + → dpv:RiskConcept +
DefinitionSomething that acts as or provides fees e.g. for using a service
Source
Date Created2024-04-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Financial Impact

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFinancialImpactPrefixrisk
LabelFinancial Impact
IRIhttps://w3id.org/dpv/risk#FinancialImpact
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept +
DefinitionThings that cause or have the potential to impact financial resources
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Financial Loss

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFinancialLossPrefixrisk
LabelFinancial Loss
IRIhttps://w3id.org/dpv/risk#FinancialLoss
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:FinancialImpact + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Fraud

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFraudPrefixrisk
LabelFraud
IRIhttps://w3id.org/dpv/risk#Fraud
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Fraud
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Group Attribution Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermGroupAttributionBiasPrefixrisk
LabelGroup Attribution Bias
IRIhttps://w3id.org/dpv/risk#GroupAttributionBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:CognitiveBias + → risk:Bias + → risk:RiskConcept +
DefinitionBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in RISK +
+
+ + + +
+

Halt Source

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHaltSourcePrefixrisk
LabelHalt Source
IRIhttps://w3id.org/dpv/risk#HaltSource
Typerdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionControl that halts the risk source or prevents it from materialising
Date Created2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK +
+
+ + + +
+

Harm

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHarmPrefixrisk
LabelHarm
IRIhttps://w3id.org/dpv/risk#Harm
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IndividualRisk +
DefinitionSomething that acts as or causes Harm to humans
Usage NoteThis concept refers to the general abstract notion of harm
Date Created2022-08-13
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + + + + + + + + + + + +
+

High Likelihood

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHighLikelihoodPrefixrisk
LabelHigh Likelihood
IRIhttps://w3id.org/dpv/risk#HighLikelihood
Typerdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:3LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood +
Object of relation dpv:hasLikelihood +
DefinitionLevel where Likelihood is High
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

High Risk

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHighRiskPrefixrisk
LabelHigh Risk
IRIhttps://w3id.org/dpv/risk#HighRisk
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:3RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
Object of relation dpv:hasRiskLevel +
DefinitionLevel where Risk is High
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

High Severity

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHighSeverityPrefixrisk
LabelHigh Severity
IRIhttps://w3id.org/dpv/risk#HighSeverity
Typerdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:3SeverityLevels + → dpv:Severity +
Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
Broader/Parent types risk:7SeverityLevels + → dpv:Severity +
Object of relation dpv:hasSeverity +
DefinitionLevel where Severity is High
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Human Errors

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHumanErrorsPrefixrisk
LabelHuman Errors
IRIhttps://w3id.org/dpv/risk#HumanErrors
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:UserRisks + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Human Errors
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Identification Control

+ + + + + + + + + + + + + + + - + - - @@ -6796,12 +8623,9 @@

Extremely Low Risk

- + - - - - + @@ -6812,18 +8636,15 @@

Extremely Low Risk

- + - - - - + - @@ -6832,44 +8653,43 @@

Extremely Low Risk

-
-

Extremely Low Severity

+
+

Identity Fraud

TermIdentificationControlPrefixrisk
LabelIdentification Control
IRIhttps://w3id.org/dpv/risk#IdentificationControl
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasRiskLevel + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Risk is Extremely LowControl to identify characteristics of event
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-182024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - + + - - - - + @@ -6878,25 +8698,28 @@

Extremely Low Severity

- + - - - - + - + + + + - + - + + + + @@ -6905,7 +8728,7 @@

Extremely Low Severity

- @@ -6914,23 +8737,23 @@

Extremely Low Severity

-
-

Fee

+
+

Identity Theft

TermExtremelyLowSeverityIdentityFraud Prefix risk
LabelExtremely Low SeverityIdentity Fraud
IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverityhttps://w3id.org/dpv/risk#IdentityFraud
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:ConfidentialityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasSeverity -
DefinitionLevel where Severity is Extremely LowSomething that acts as or causes Identity Fraud
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
SourceENISA Threat Taxonomy 2016
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -6942,7 +8765,10 @@

Fee

- + + @@ -6956,7 +8782,7 @@

Fee

- + @@ -6965,14 +8791,14 @@

Fee

- + - + @@ -6980,7 +8806,7 @@

Fee

- + @@ -6995,23 +8821,23 @@

Fee

-
-

Financial Impact

+
+

Illegal Data Processing

TermFeeIdentityTheft Prefix risk
LabelFeeIdentity Theft
IRIhttps://w3id.org/dpv/risk#Feehttps://w3id.org/dpv/risk#IdentityTheft
Broader/Parent types risk:FinancialImpact + risk:ConfidentialityConcept +
Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept
DefinitionSomething that acts as or provides fees e.g. for using a serviceSomething that acts as or causes Identity Theft
SourceENISA Threat Taxonomy 2016
Date Created2024-04-142022-08-17
Date Modified
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
- + - + - + @@ -7023,7 +8849,8 @@

Financial Impact

- @@ -7036,20 +8863,35 @@

Financial Impact

- + - + + + + - + + + + - - - + + + + + + + + + + + + @@ -7063,40 +8905,47 @@

Financial Impact

-
-

Financial Loss

+
+

Impact Control

TermFinancialImpactIllegalDataProcessing Prefix risk
LabelFinancial ImpactIllegal Data Processing
IRIhttps://w3id.org/dpv/risk#FinancialImpacthttps://w3id.org/dpv/risk#IllegalDataProcessing
Broader/Parent types dpv:RiskConcept + risk:LegalRisk + → dpv:RiskConcept
DefinitionThings that cause or have the potential to impact financial resourcesSomething that acts as or causes Illegal Processing of Data
Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - + + + + @@ -7105,28 +8954,22 @@

Financial Loss

- + - - - - + - + - - - - + @@ -7135,7 +8978,7 @@

Financial Loss

- @@ -7144,39 +8987,37 @@

Financial Loss

-
-

Fraud

+
+

Implicit Bias

TermFinancialLossImpactControl Prefix risk
LabelFinancial LossImpact Control
IRIhttps://w3id.org/dpv/risk#FinancialLosshttps://w3id.org/dpv/risk#ImpactControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunityRisk Mitigation Measure that controls Impacts
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - @@ -7189,7 +9030,7 @@

Fraud

- + @@ -7198,28 +9039,25 @@

Fraud

- + - + - - - - + - + - @@ -7227,47 +9065,41 @@

Fraud

- -
-

Halt Source

+
+

Incident

TermFraudImplicitBias Prefix risk
LabelFraudImplicit Bias
IRIhttps://w3id.org/dpv/risk#Fraudhttps://w3id.org/dpv/risk#ImplicitBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes FraudBias that occurs when a human makes an association or assumption based on their mental models and memories
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - @@ -7278,10 +9110,16 @@

Halt Source

- + + + + + - + + + @@ -7291,59 +9129,73 @@

Halt Source

- + - + + + + - + -
TermHaltSourceIncident Prefix risk
LabelHalt SourceIncident
IRIhttps://w3id.org/dpv/risk#HaltSourcehttps://w3id.org/dpv/risk#Incident
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasIncident
DefinitionControl that halts the risk source or prevents it from materialisingAn actual or occured event
Usage NoteIncident is realised or materialised risk
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0070 :: Indicating personal data involved in an incident
Date Created2024-05-192024-02-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
See More: section RISK-CONTROLS in RISK + section CORE in DEX + , section INCIDENT in DEX
+ + - -
-

Harm

+
+

Incident Assessment Report

- + - + - + - + - - + + + + @@ -7352,12 +9204,9 @@

Harm

- + - - - - + @@ -7368,21 +9217,15 @@

Harm

- + - - - - - - - - + + - @@ -7391,60 +9234,44 @@

Harm

- - - - - - - - - - -
-

High Likelihood

+
+

Incident Concluded

TermHarmIncidentAssessmentReport Prefix risk
LabelHarmIncident Assessment Report
IRIhttps://w3id.org/dpv/risk#Harmhttps://w3id.org/dpv/risk#IncidentAssessmentReport
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:IndividualRisk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
DefinitionSomething that acts as or causes Harm to humansA report describing the assessment of an incident in terms of its effects or impacts
Usage NoteThis concept refers to the general abstract notion of harm
Date Created2022-08-132024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + - + - - - - - - @@ -7455,12 +9282,9 @@

High Likelihood

- + - - - - + @@ -7471,7 +9295,7 @@

High Likelihood

- + @@ -7482,7 +9306,7 @@

High Likelihood

- @@ -7490,51 +9314,46 @@

High Likelihood

- -
-

High Risk

+
+

Incident Concluding Report

TermHighLikelihoodIncidentConcluded Prefix risk
LabelHigh LikelihoodIncident Concluded
IRIhttps://w3id.org/dpv/risk#HighLikelihoodhttps://w3id.org/dpv/risk#IncidentConcluded
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasLikelihood + dpv:hasContext, + dpv:hasStatus
DefinitionLevel where Likelihood is HighThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-182024-02-14
See More: section RISK-LEVELS in RISK + section INCIDENT-STATUS in RISK
- + - + - + - + - - - - - - @@ -7545,12 +9364,9 @@

High Risk

- + - - - - + @@ -7561,18 +9377,15 @@

High Risk

- + - - - - + - @@ -7580,51 +9393,46 @@

High Risk

- -
-

High Severity

+
+

Incident Detection Report

TermHighRiskIncidentConcludingReport Prefix risk
LabelHigh RiskIncident Concluding Report
IRIhttps://w3id.org/dpv/risk#HighRiskhttps://w3id.org/dpv/risk#IncidentConcludingReport
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasRiskLevel + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionLevel where Risk is HighA report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-182024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
- + - + - + - + - - - - - - @@ -7635,12 +9443,9 @@

High Severity

- + - - - - + @@ -7651,18 +9456,15 @@

High Severity

- + - - - - + - @@ -7671,40 +9473,46 @@

High Severity

-
-

Human Errors

+
+

Incident Halted

TermHighSeverityIncidentDetectionReport Prefix risk
LabelHigh SeverityIncident Detection Report
IRIhttps://w3id.org/dpv/risk#HighSeverityhttps://w3id.org/dpv/risk#IncidentDetectionReport
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasSeverity + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionLevel where Severity is HighA report describing the detection of a Incident
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-182024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
- + - + - + - + - - + + + + @@ -7713,28 +9521,22 @@

Human Errors

- + - - - - + - + - - - - + @@ -7743,7 +9545,7 @@

Human Errors

- @@ -7751,46 +9553,46 @@

Human Errors

- -
-

Identification Control

+
+

Incident Handling Report

TermHumanErrorsIncidentHalted Prefix risk
LabelHuman ErrorsIncident Halted
IRIhttps://w3id.org/dpv/risk#HumanErrorshttps://w3id.org/dpv/risk#IncidentHalted
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types risk:UserRisks - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasContext, + dpv:hasStatus +
DefinitionSomething that acts as or causes Human ErrorsThe incident has halted or paused with a high likelihood of resuming or recurring
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-02-14
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
- + - + - + - + - - @@ -7801,7 +9603,7 @@

Identification Control

- + @@ -7822,7 +9624,7 @@

Identification Control

- @@ -7830,41 +9632,33 @@

Identification Control

- -
-

Identity Fraud

+
+

Incident Identifier

TermIdentificationControlIncidentHandlingReport Prefix risk
LabelIdentification ControlIncident Handling Report
IRIhttps://w3id.org/dpv/risk#IdentificationControlhttps://w3id.org/dpv/risk#IncidentHandlingReport
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionControl to identify characteristics of eventA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
- + - + - + - + - - - - - + @@ -7876,37 +9670,28 @@

Identity Fraud

- + - - - - + - + - - - - - - - - + + - @@ -7914,44 +9699,51 @@

Identity Fraud

- -
-

Identity Theft

+
+

Incident Impact Assessment

TermIdentityFraudIncidentIdentifier Prefix risk
LabelIdentity FraudIncident Identifier
IRIhttps://w3id.org/dpv/risk#IdentityFraudhttps://w3id.org/dpv/risk#IncidentIdentifier
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Identity FraudIdentifier associated with an incident
SourceENISA Threat Taxonomy 2016
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + - + - - - - + + + + @@ -7960,28 +9752,22 @@

Identity Theft

- + - - - - + - + - - - - + @@ -7990,7 +9776,7 @@

Identity Theft

- @@ -7999,40 +9785,46 @@

Identity Theft

-
-

Illegal Data Processing

+
+

Incident Mitigated

TermIdentityTheftIncidentImpactAssessment Prefix risk
LabelIdentity TheftIncident Impact Assessment
IRIhttps://w3id.org/dpv/risk#IdentityThefthttps://w3id.org/dpv/risk#IncidentImpactAssessment
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:ImpactAssessment + → dpv:RiskAssessment + → dpv:Assessment + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasAssessment, + dpv:hasImpactAssessment, + dpv:hasOrganisationalMeasure, + dpv:hasRiskAssessment, + dpv:hasTechnicalOrganisationalMeasure +
DefinitionSomething that acts as or causes Identity TheftAn impact assessment associated with a incident
SourceENISA Threat Taxonomy 2016
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + - + - - + + + + @@ -8041,31 +9833,22 @@

Illegal Data Processing

- + - - - - + - - - - + - + - - - - + @@ -8074,7 +9857,7 @@

Illegal Data Processing

- @@ -8082,37 +9865,35 @@

Illegal Data Processing

- -
-

Impact Control

+
+

Incident Mitigation Measure

TermIllegalDataProcessingIncidentMitigated Prefix risk
LabelIllegal Data ProcessingIncident Mitigated
IRIhttps://w3id.org/dpv/risk#IllegalDataProcessinghttps://w3id.org/dpv/risk#IncidentMitigated
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasContext, + dpv:hasStatus +
DefinitionSomething that acts as or causes Illegal Processing of DataThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2022-08-172024-02-14
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
- + - + - + - + - @@ -8120,8 +9901,7 @@

Impact Control

@@ -8132,7 +9912,7 @@

Impact Control

- + @@ -8148,15 +9928,12 @@

Impact Control

- - - - + - @@ -8164,41 +9941,45 @@

Impact Control

-
-

Incident

+ +
+

Incident Near Miss

TermImpactControlIncidentMitigationMeasure Prefix risk
LabelImpact ControlIncident Mitigation Measure
IRIhttps://w3id.org/dpv/risk#ImpactControlhttps://w3id.org/dpv/risk#IncidentMitigationMeasure
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure + dpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:isMitigatedByMeasure
DefinitionRisk Mitigation Measure that controls ImpactsA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
- + - + - + - + - - @@ -8209,16 +9990,10 @@

Incident

- + - - - - - - - + @@ -8228,48 +10003,42 @@

Incident

- + - - - - + - + -
TermIncidentIncidentNearMiss Prefix risk
LabelIncidentIncident Near Miss
IRIhttps://w3id.org/dpv/risk#Incidenthttps://w3id.org/dpv/risk#IncidentNearMiss
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation risk:hasIncident + dpv:hasContext, + dpv:hasStatus
DefinitionAn actual or occured eventThe state where an incident was almost successful in taking place i.e. "it came very close"
Usage NoteIncident is realised or materialised risk
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0070 :: Indicating personal data involved in an incident
Date Created2024-05-192024-02-14
Date Modified2024-08-16
ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio FernandezHarshvardhan J. Pandit
See More: section CORE in DEX - , section INCIDENT in DEX + section INCIDENT-STATUS in RISK
- - -
-

Incident Assessment Report

+
+

Incident Notice

- + - + - + @@ -8281,8 +10050,7 @@

Incident Assessment Report

- @@ -8290,8 +10058,8 @@

Incident Assessment Report

- @@ -8303,7 +10071,7 @@

Incident Assessment Report

- + @@ -8333,23 +10101,23 @@

Incident Assessment Report

-
-

Incident Concluded

+
+

Incident Ongoing

TermIncidentAssessmentReportIncidentNotice Prefix risk
LabelIncident Assessment ReportIncident Notice
IRIhttps://w3id.org/dpv/risk#IncidentAssessmentReporthttps://w3id.org/dpv/risk#IncidentNotice
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities + dpv:Noticedpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, + dpv:hasNotice, + dpv:hasOrganisationalMeasure, dpv:hasTechnicalOrganisationalMeasure
DefinitionA report describing the assessment of an incident in terms of its effects or impactsNotice associated with an Incident
- + - + - + @@ -8381,7 +10149,7 @@

Incident Concluded

- + @@ -8413,23 +10181,23 @@

Incident Concluded

-
-

Incident Concluding Report

+
+

Incident Ongoing Report

TermIncidentConcludedIncidentOngoing Prefix risk
LabelIncident ConcludedIncident Ongoing
IRIhttps://w3id.org/dpv/risk#IncidentConcludedhttps://w3id.org/dpv/risk#IncidentOngoing
DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringThe incident is ongoing i.e. still active
- + - + - + @@ -8463,7 +10231,7 @@

Incident Concluding Report

- + @@ -8492,23 +10260,23 @@

Incident Concluding Report

-
-

Incident Detection Report

+
+

Incident Preliminary Report

TermIncidentConcludingReportIncidentOngoingReport Prefix risk
LabelIncident Concluding ReportIncident Ongoing Report
IRIhttps://w3id.org/dpv/risk#IncidentConcludingReporthttps://w3id.org/dpv/risk#IncidentOngoingReport
DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
- + - + - + @@ -8542,7 +10310,7 @@

Incident Detection Report

- + @@ -8571,45 +10339,45 @@

Incident Detection Report

- -
-

Incident Halted

+
+

Incident Register

TermIncidentDetectionReportIncidentPreliminaryReport Prefix risk
LabelIncident Detection ReportIncident Preliminary Report
IRIhttps://w3id.org/dpv/risk#IncidentDetectionReporthttps://w3id.org/dpv/risk#IncidentPreliminaryReport
DefinitionA report describing the detection of a IncidentA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
- + - + - + - + - - @@ -8620,7 +10388,7 @@

Incident Halted

- + @@ -8633,7 +10401,7 @@

Incident Halted

- + @@ -8644,7 +10412,7 @@

Incident Halted

- @@ -8652,23 +10420,23 @@

Incident Halted

-
-

Incident Handling Report

+
+

Incident Report

TermIncidentHaltedIncidentRegister Prefix risk
LabelIncident HaltedIncident Register
IRIhttps://w3id.org/dpv/risk#IncidentHaltedhttps://w3id.org/dpv/risk#IncidentRegister
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringA register recording incidentes, their reports, notifications, and other related activities
Date Created2024-02-142024-05-19
See More: section INCIDENT-STATUS in RISK + section INCIDENT in RISK
- + - + - + @@ -8680,8 +10448,7 @@

Incident Handling Report

- @@ -8702,7 +10469,7 @@

Incident Handling Report

- + @@ -8731,23 +10498,23 @@

Incident Handling Report

-
-

Incident Identifier

+
+

Incident Status

TermIncidentHandlingReportIncidentReport Prefix risk
LabelIncident Handling ReportIncident Report
IRIhttps://w3id.org/dpv/risk#IncidentHandlingReporthttps://w3id.org/dpv/risk#IncidentReport
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities + dpv:RecordsOfActivitiesdpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceDocumented information about an incident, its handling, assessments,and notifications
- + - + - + @@ -8757,10 +10524,19 @@

Incident Identifier

- + + + - + + + + @@ -8769,10 +10545,13 @@

Incident Identifier

- + + + + @@ -8782,15 +10561,18 @@

Incident Identifier

- + - + + + + - @@ -8798,49 +10580,45 @@

Incident Identifier

-
-

Incident Impact Assessment

+ +
+

Incident Status Unknown

TermIncidentIdentifierIncidentStatus Prefix risk
LabelIncident IdentifierIncident Status
IRIhttps://w3id.org/dpv/risk#IncidentIdentifierhttps://w3id.org/dpv/risk#IncidentStatus
rdfs:Class, skos:Concept
Broader/Parent types dpv:Status + → dpv:Context +
Object of relation dpv:hasContext, + dpv:hasStatus +
DefinitionIdentifier associated with an incidentStatus associated with an incident
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
Date Created2024-05-192024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT in RISK + section INCIDENT-STATUS in DEX
- + - + - + - + - - @@ -8851,7 +10629,7 @@

Incident Impact Assessment

- + @@ -8864,7 +10642,7 @@

Incident Impact Assessment

- + @@ -8875,7 +10653,7 @@

Incident Impact Assessment

- @@ -8884,23 +10662,23 @@

Incident Impact Assessment

-
-

Incident Mitigated

+
+

Incident Suspected

TermIncidentImpactAssessmentIncidentStatusUnknown Prefix risk
LabelIncident Impact AssessmentIncident Status Unknown
IRIhttps://w3id.org/dpv/risk#IncidentImpactAssessmenthttps://w3id.org/dpv/risk#IncidentStatusUnknown
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types dpv:ImpactAssessment - → dpv:RiskAssessment - → dpv:Assessment - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasAssessment, - dpv:hasImpactAssessment, - dpv:hasOrganisationalMeasure, - dpv:hasRiskAssessment, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasContext, + dpv:hasStatus
DefinitionAn impact assessment associated with a incidentThe status of a incident is unknown
Date Created2024-05-192024-02-14
See More: section INCIDENT in RISK + section INCIDENT-STATUS in RISK
- + - + - + @@ -8932,7 +10710,7 @@

Incident Mitigated

- + @@ -8964,23 +10742,23 @@

Incident Mitigated

-
-

Incident Mitigation Measure

+
+

Incident Suspected Report

TermIncidentMitigatedIncidentSuspected Prefix risk
LabelIncident MitigatedIncident Suspected
IRIhttps://w3id.org/dpv/risk#IncidentMitigatedhttps://w3id.org/dpv/risk#IncidentSuspected
DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
- + - + - + @@ -8992,15 +10770,18 @@

Incident Mitigation Measure

- - @@ -9011,7 +10792,7 @@

Incident Mitigation Measure

- + @@ -9041,23 +10822,23 @@

Incident Mitigation Measure

-
-

Incident Near Miss

+
+

Incident Terminated

TermIncidentMitigationMeasureIncidentSuspectedReport Prefix risk
LabelIncident Mitigation MeasureIncident Suspected Report
IRIhttps://w3id.org/dpv/risk#IncidentMitigationMeasurehttps://w3id.org/dpv/risk#IncidentSuspectedReport
Broader/Parent types dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againA report describing the suspicion of an incident in the past or occuring
- + - + - + @@ -9089,7 +10870,7 @@

Incident Near Miss

- + @@ -9121,57 +10902,47 @@

Incident Near Miss

-
-

Incident Notice

+ +
+

Individual Health & Safety

TermIncidentNearMissIncidentTerminated Prefix risk
LabelIncident Near MissIncident Terminated
IRIhttps://w3id.org/dpv/risk#IncidentNearMisshttps://w3id.org/dpv/risk#IncidentTerminated
DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
- + - + - + - + - - - - - + - - - - + @@ -9181,17 +10952,14 @@

Incident Notice

- - - - + - @@ -9199,47 +10967,36 @@

Incident Notice

- -
-

Incident Ongoing

+
+

Individual Risk

TermIncidentNoticeIndividualHealthSafety Prefix risk
LabelIncident NoticeIndividual Health & Safety
IRIhttps://w3id.org/dpv/risk#IncidentNoticehttps://w3id.org/dpv/risk#IndividualHealthSafety
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:Notice - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
Object of relation dpv:hasNotice, - dpv:hasOrganisationalMeasure, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionNotice associated with an Incident
Date Created2024-05-19
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - + - - - - + @@ -9248,7 +11005,7 @@

Incident Ongoing

- + @@ -9259,20 +11016,14 @@

Incident Ongoing

- - - - + - - - - + - @@ -9280,48 +11031,40 @@

Incident Ongoing

-
-

Incident Ongoing Report

+ +
+

Informativeness Bias

TermIncidentOngoingIndividualRisk Prefix risk
LabelIncident OngoingIndividual Risk
IRIhttps://w3id.org/dpv/risk#IncidentOngoinghttps://w3id.org/dpv/risk#IndividualRisk
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context -
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe incident is ongoing i.e. still activeRisks and issues that affect or have the potential to affect specific individuals
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -9330,28 +11073,34 @@

Incident Ongoing Report

- + - + + + + - + - + + + + - @@ -9359,48 +11108,42 @@

Incident Ongoing Report

-
-

Incident Preliminary Report

+ +
+

In-Group Bias

TermIncidentOngoingReportInformativenessBias Prefix risk
LabelIncident Ongoing ReportInformativeness Bias
IRIhttps://w3id.org/dpv/risk#IncidentOngoingReporthttps://w3id.org/dpv/risk#InformativenessBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:EngineeringDecisionBias
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section INCIDENT in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -9409,28 +11152,34 @@

Incident Preliminary Report

- + - + + + + - + - + + + + - @@ -9438,47 +11187,40 @@

Incident Preliminary Report

-
-

Incident Register

+ +
+

Injury

TermIncidentPreliminaryReportInGroupBias Prefix risk
LabelIncident Preliminary ReportIn-Group Bias
IRIhttps://w3id.org/dpv/risk#IncidentPreliminaryReporthttps://w3id.org/dpv/risk#InGroupBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownBias that occurs when showing partiality to one's own group or own characteristics
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section INCIDENT in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -9487,22 +11229,28 @@

Incident Register

- + - + + + + - + - + + + + @@ -9511,7 +11259,7 @@

Incident Register

- @@ -9519,57 +11267,77 @@

Incident Register

-
-

Incident Report

+ +
+

None

TermIncidentRegisterInjury Prefix risk
LabelIncident RegisterInjury
IRIhttps://w3id.org/dpv/risk#IncidentRegisterhttps://w3id.org/dpv/risk#Injury
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA register recording incidentes, their reports, notifications, and other related activitiesSomething that acts as or causes Injury
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + + + + + + + + + + + - - - - + - - - - + @@ -9579,17 +11347,14 @@

Incident Report

- - - - + - @@ -9597,23 +11362,23 @@

Incident Report

-
-

Incident Status

+
+

Integrity Incident

TermIncidentReportIntegrityBreach Prefix risk
LabelIncident ReportNone
IRIhttps://w3id.org/dpv/risk#IncidentReporthttps://w3id.org/dpv/risk#IntegrityBreach
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:DataBreach + → risk:AvailabilityConcept +
Broader/Parent types risk:DataBreach + → risk:ConfidentialityConcept +
Broader/Parent types risk:DataBreach + → risk:IntegrityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionDocumented information about an incident, its handling, assessments,and notifications
Date Created2024-05-19
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -9625,15 +11390,14 @@

Incident Status

- - @@ -9644,13 +11408,10 @@

Incident Status

- + - - - @@ -9660,18 +11421,15 @@

Incident Status

- + - - - - + - @@ -9680,46 +11438,40 @@

Incident Status

-
-

Incident Status Unknown

+
+

Intentional Misuse

TermIncidentStatusIntegrityIncident Prefix risk
LabelIncident StatusIntegrity Incident
IRIhttps://w3id.org/dpv/risk#IncidentStatushttps://w3id.org/dpv/risk#IntegrityIncident
Broader/Parent types dpv:Status - → dpv:Context + risk:Incident + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus + risk:hasIncident
DefinitionStatus associated with an incidentIncident where the integrity of information or system has been affected
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
Date Created2024-02-142024-05-19
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in DEX + section INCIDENT in RISK
- + - + - + - + - - - - - + @@ -9728,7 +11480,7 @@

Incident Status Unknown

- + @@ -9739,20 +11491,14 @@

Incident Status Unknown

- - - - + - - - - + - @@ -9761,46 +11507,43 @@

Incident Status Unknown

-
-

Incident Suspected

+
+

Intercept Communications

TermIncidentStatusUnknownIntentionalMisuse Prefix risk
LabelIncident Status UnknownIntentional Misuse
IRIhttps://w3id.org/dpv/risk#IncidentStatusUnknownhttps://w3id.org/dpv/risk#IntentionalMisuse
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:UserRisks + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe status of a incident is unknownIntentional Misuse
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - - - - + @@ -9809,22 +11552,31 @@

Incident Suspected

- + - + + + + - + + + + - + - + + + + @@ -9833,7 +11585,7 @@

Incident Suspected

- @@ -9841,48 +11593,45 @@

Incident Suspected

-
-

Incident Suspected Report

+ + + + + +
+

Judicial Costs

TermIncidentSuspectedInterceptCommunications Prefix risk
LabelIncident SuspectedIntercept Communications
IRIhttps://w3id.org/dpv/risk#IncidentSuspectedhttps://w3id.org/dpv/risk#InterceptCommunications
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingSomething that acts as or causes Interception of Communications
Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2024-02-142022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -9891,7 +11640,7 @@

Incident Suspected Report

- + @@ -9902,17 +11651,14 @@

Incident Suspected Report

- - - - + - @@ -9921,46 +11667,40 @@

Incident Suspected Report

-
-

Incident Terminated

+
+

Judicial Penalty

TermIncidentSuspectedReportJudicialCosts Prefix risk
LabelIncident Suspected ReportJudicial Costs
IRIhttps://w3id.org/dpv/risk#IncidentSuspectedReporthttps://w3id.org/dpv/risk#JudicialCosts
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA report describing the suspicion of an incident in the past or occuringSomething that involves or causes judicial costs to be paid
Date Created2024-05-19
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -9969,7 +11709,7 @@

Incident Terminated

- + @@ -9980,20 +11720,14 @@

Incident Terminated

- - - - + - - - - + - @@ -10002,23 +11736,23 @@

Incident Terminated

-
-

Individual Health & Safety

+
+

Legal Risk

TermIncidentTerminatedJudicialPenalty Prefix risk
LabelIncident TerminatedJudicial Penalty
IRIhttps://w3id.org/dpv/risk#IncidentTerminatedhttps://w3id.org/dpv/risk#JudicialPenalty
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringSomething that involves or causes judicial penalties to be paid
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -10030,7 +11764,7 @@

Individual Health & Safety

- @@ -10041,7 +11775,10 @@

Individual Health & Safety

- + + + + @@ -10066,33 +11803,38 @@

Individual Health & Safety

-
-

Individual Risk

+ +
+

Lose of Credibility

TermIndividualHealthSafetyLegalRisk Prefix risk
LabelIndividual Health & SafetyLegal Risk
IRIhttps://w3id.org/dpv/risk#IndividualHealthSafetyhttps://w3id.org/dpv/risk#LegalRisk
Broader/Parent types risk:IndividualRisk + dpv:RiskConcept
DefinitionRisks and issues that have their basis in legal requirements and enforcement
- + - + - + - + - + + + @@ -10104,20 +11846,32 @@

Individual Risk

- + - + + + + - - - + + + + + + + + + + + + @@ -10131,23 +11885,23 @@

Individual Risk

-
-

Injury

+
+

Lose of Customer Confidence

TermIndividualRiskLoseCredibility Prefix risk
LabelIndividual RiskLose of Credibility
IRIhttps://w3id.org/dpv/risk#IndividualRiskhttps://w3id.org/dpv/risk#LoseCredibility
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ReputationalRisk + → dpv:RiskConcept +
DefinitionRisks and issues that affect or have the potential to affect specific individualsSomething that acts as or causes Loss of Credibility
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -10159,7 +11913,8 @@

Injury

- @@ -10172,7 +11927,7 @@

Injury

- + @@ -10211,23 +11966,23 @@

Injury

-
-

None

+
+

Lose of Goodwill

TermInjuryLoseCustomerConfidence Prefix risk
LabelInjuryLose of Customer Confidence
IRIhttps://w3id.org/dpv/risk#Injuryhttps://w3id.org/dpv/risk#LoseCustomerConfidence
Broader/Parent types risk:IndividualRisk + risk:ReputationalRisk + → dpv:RiskConcept
DefinitionSomething that acts as or causes InjurySomething that acts as or causes Loss of Customer Confidence
- + - + - + @@ -10239,36 +11994,7 @@

None

- - - - - - - - - - - - - @@ -10280,19 +12006,34 @@

None

- + + + + - + + + + - - - + + + + + + + + + + + + @@ -10305,44 +12046,41 @@

None

-
-

Integrity Incident

+ +
+

Lose of Negotiating Capacity

TermIntegrityBreachLoseGoodwill Prefix risk
LabelNoneLose of Goodwill
IRIhttps://w3id.org/dpv/risk#IntegrityBreachhttps://w3id.org/dpv/risk#LoseGoodwill
Broader/Parent types risk:DataBreach - → risk:AvailabilityConcept -
Broader/Parent types risk:DataBreach - → risk:ConfidentialityConcept -
Broader/Parent types risk:DataBreach - → risk:IntegrityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:AvailabilityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:ConfidentialityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:IntegrityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:ReputationalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Loss of Goodwill
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - - + @@ -10351,28 +12089,37 @@

Integrity Incident

- + - + + + + - + - - + + + + + + + + - @@ -10381,23 +12128,23 @@

Integrity Incident

-
-

Intentional Misuse

+
+

Lose of Opportunity

TermIntegrityIncidentLoseNegotiatingCapacity Prefix risk
LabelIntegrity IncidentLose of Negotiating Capacity
IRIhttps://w3id.org/dpv/risk#IntegrityIncidenthttps://w3id.org/dpv/risk#LoseNegotiatingCapacity
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:Incident + risk:ReputationalRiskdpv:RiskConcept
Object of relation risk:hasIncident -
DefinitionIncident where the integrity of information or system has been affectedSomething that acts as or causes Loss of Negotiating Capacity
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -10409,7 +12156,7 @@

Intentional Misuse

- @@ -10423,20 +12170,32 @@

Intentional Misuse

- + - + + + + - - - + + + + + + + + + + + + @@ -10450,23 +12209,23 @@

Intentional Misuse

-
-

Intercept Communications

+
+

Lose of Reputation

TermIntentionalMisuseLoseOpportunity Prefix risk
LabelIntentional MisuseLose of Opportunity
IRIhttps://w3id.org/dpv/risk#IntentionalMisusehttps://w3id.org/dpv/risk#LoseOpportunity
Broader/Parent types risk:UserRisks + risk:ReputationalRiskdpv:RiskConcept
DefinitionIntentional MisuseSomething that acts as or causes Loss of Opportunity
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -10478,10 +12237,7 @@

Intercept Communications

- - - @@ -10495,12 +12251,9 @@

Intercept Communications

- + - - - - + @@ -10537,27 +12290,23 @@

Intercept Communications

- - - - -
-

Judicial Costs

+
+

Lose of Trust

TermInterceptCommunicationsLoseReputation Prefix risk
LabelIntercept CommunicationsLose of Reputation
IRIhttps://w3id.org/dpv/risk#InterceptCommunicationshttps://w3id.org/dpv/risk#LoseReputation
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat + risk:ReputationalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Interception of CommunicationsSomething that acts as or causes Loss of Reputation
Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
- + - + - + @@ -10569,7 +12318,7 @@

Judicial Costs

- @@ -10583,20 +12332,32 @@

Judicial Costs

- + - + + + + - - - + + + + + + + + + + + + @@ -10610,40 +12371,52 @@

Judicial Costs

-
-

Judicial Penalty

+
+

Low Likelihood

TermJudicialCostsLoseTrust Prefix risk
LabelJudicial CostsLose of Trust
IRIhttps://w3id.org/dpv/risk#JudicialCostshttps://w3id.org/dpv/risk#LoseTrust
Broader/Parent types risk:FinancialImpact + risk:ReputationalRiskdpv:RiskConcept
DefinitionSomething that involves or causes judicial costs to be paidSomething that acts as or causes Loss of Trust
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - + + + + - + + + + @@ -10652,9 +12425,12 @@

Judicial Penalty

- + - + + + + @@ -10663,14 +12439,20 @@

Judicial Penalty

- + + + + - + + + + - @@ -10679,39 +12461,52 @@

Judicial Penalty

-
-

Legal Risk

+
+

Low Risk

TermJudicialPenaltyLowLikelihood Prefix risk
LabelJudicial PenaltyLow Likelihood
IRIhttps://w3id.org/dpv/risk#JudicialPenaltyhttps://w3id.org/dpv/risk#LowLikelihood
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
Object of relation dpv:hasLikelihood +
DefinitionSomething that involves or causes judicial penalties to be paidLevel where Likelihood is Low
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - + + + + - + + + + @@ -10720,9 +12515,12 @@

Legal Risk

- + - + + + + @@ -10731,14 +12529,20 @@

Legal Risk

- + + + + - + + + + - @@ -10747,40 +12551,52 @@

Legal Risk

-
-

Lose of Credibility

+
+

Low Severity

TermLegalRiskLowRisk Prefix risk
LabelLegal RiskLow Risk
IRIhttps://w3id.org/dpv/risk#LegalRiskhttps://w3id.org/dpv/risk#LowRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
Object of relation dpv:hasRiskLevel +
DefinitionRisks and issues that have their basis in legal requirements and enforcementLevel where Risk is Low
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - + + + + - + + + + @@ -10789,28 +12605,25 @@

Lose of Credibility

- + - + + + + - - - - + - + - - - - + @@ -10819,7 +12632,7 @@

Lose of Credibility

- @@ -10828,23 +12641,23 @@

Lose of Credibility

-
-

Lose of Customer Confidence

+
+

Malicious Code Attack

TermLoseCredibilityLowSeverity Prefix risk
LabelLose of CredibilityLow Severity
IRIhttps://w3id.org/dpv/risk#LoseCredibilityhttps://w3id.org/dpv/risk#LowSeverity
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
Broader/Parent types risk:7SeverityLevels + → dpv:Severity
Object of relation dpv:hasSeverity +
DefinitionSomething that acts as or causes Loss of CredibilityLevel where Severity is Low
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + @@ -10856,8 +12669,17 @@

Lose of Customer Confidence

- + + + + + + @@ -10870,7 +12692,7 @@

Lose of Customer Confidence

- + @@ -10879,7 +12701,7 @@

Lose of Customer Confidence

- + @@ -10909,23 +12731,23 @@

Lose of Customer Confidence

-
-

Lose of Goodwill

+
+

Malware Attack

TermLoseCustomerConfidenceMaliciousCodeAttack Prefix risk
LabelLose of Customer ConfidenceMalicious Code Attack
IRIhttps://w3id.org/dpv/risk#LoseCustomerConfidencehttps://w3id.org/dpv/risk#MaliciousCodeAttack
Broader/Parent types risk:ReputationalRisk + risk:AvailabilityConcept +
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionSomething that acts as or causes Loss of Customer ConfidenceSomething that acts as or causes Malicious Code Attack
SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
- + - + - + @@ -10937,8 +12759,17 @@

Lose of Goodwill

- + + + + + + @@ -10951,7 +12782,7 @@

Lose of Goodwill

- + @@ -10960,7 +12791,7 @@

Lose of Goodwill

- + @@ -10990,23 +12821,23 @@

Lose of Goodwill

-
-

Lose of Negotiating Capacity

+
+

Material Damage

TermLoseGoodwillMalwareAttack Prefix risk
LabelLose of GoodwillMalware Attack
IRIhttps://w3id.org/dpv/risk#LoseGoodwillhttps://w3id.org/dpv/risk#MalwareAttack
Broader/Parent types risk:ReputationalRisk + risk:AvailabilityConcept +
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionSomething that acts as or causes Loss of GoodwillSomething that acts as or causes Malware Attack
SourceISO/IEC 27005:2018ENISA Methodology for Sectoral Cybersecurity Assessments
- + - + - + @@ -11018,7 +12849,7 @@

Lose of Negotiating Capacity

- @@ -11032,23 +12863,23 @@

Lose of Negotiating Capacity

- + - + + + + - - - - + - + @@ -11071,23 +12902,23 @@

Lose of Negotiating Capacity

-
-

Lose of Opportunity

+
+

Misuse

TermLoseNegotiatingCapacityMaterialDamage Prefix risk
LabelLose of Negotiating CapacityMaterial Damage
IRIhttps://w3id.org/dpv/risk#LoseNegotiatingCapacityhttps://w3id.org/dpv/risk#MaterialDamage
Broader/Parent types risk:ReputationalRisk + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Loss of Negotiating CapacitySomething that acts as or causes Material Damage
Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
SourceISO/IEC 27005:2018
Date Created2022-08-172022-03-30
Date Modified
- + - + - + @@ -11099,7 +12930,7 @@

Lose of Opportunity

- @@ -11113,23 +12944,20 @@

Lose of Opportunity

- + - - - - + - + @@ -11137,7 +12965,7 @@

Lose of Opportunity

- + @@ -11152,40 +12980,52 @@

Lose of Opportunity

-
-

Lose of Reputation

+
+

Moderate Likelihood

TermLoseOpportunityMisuse Prefix risk
LabelLose of OpportunityMisuse
IRIhttps://w3id.org/dpv/risk#LoseOpportunityhttps://w3id.org/dpv/risk#Misuse
Broader/Parent types risk:ReputationalRisk + risk:UserRisksdpv:RiskConcept
DefinitionSomething that acts as or causes Loss of OpportunitySomething that acts as or causes Misuse
SourceISO/IEC 27005:2018
Date Created2022-08-172024-06-11
Date Modified
ContributorsHarshvardhan J. PanditDelaram Golpayegani
- + - + - + - + - + + + + - + + + + @@ -11194,28 +13034,25 @@

Lose of Reputation

- + - + + + + - - - - + - + - - - - + @@ -11224,7 +13061,7 @@

Lose of Reputation

- @@ -11233,40 +13070,52 @@

Lose of Reputation

-
-

Lose of Trust

+
+

Moderate Risk

TermLoseReputationModerateLikelihood Prefix risk
LabelLose of ReputationModerate Likelihood
IRIhttps://w3id.org/dpv/risk#LoseReputationhttps://w3id.org/dpv/risk#ModerateLikelihood
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
Object of relation dpv:hasLikelihood +
DefinitionSomething that acts as or causes Loss of ReputationLevel where Likelihood is Moderate
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - + + + + - + + + + @@ -11275,28 +13124,25 @@

Lose of Trust

- + - + + + + - - - - + - + - - - - + @@ -11305,7 +13151,7 @@

Lose of Trust

- @@ -11314,50 +13160,50 @@

Lose of Trust

-
-

Low Likelihood

+
+

Moderate Severity

TermLoseTrustModerateRisk Prefix risk
LabelLose of TrustModerate Risk
IRIhttps://w3id.org/dpv/risk#LoseTrusthttps://w3id.org/dpv/risk#ModerateRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
Object of relation dpv:hasRiskLevel +
DefinitionSomething that acts as or causes Loss of TrustLevel where Risk is Moderate
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - - - - @@ -11368,11 +13214,11 @@

Low Likelihood

- + - + @@ -11404,50 +13250,46 @@

Low Likelihood

-
-

Low Risk

+
+

Monitor Consequence

TermLowLikelihoodModerateSeverity Prefix risk
LabelLow LikelihoodModerate Severity
IRIhttps://w3id.org/dpv/risk#LowLikelihoodhttps://w3id.org/dpv/risk#ModerateSeverity
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood + risk:3SeverityLevels + → dpv:Severity
Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood + risk:5SeverityLevels + → dpv:Severity
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:7SeverityLevels + → dpv:Severity
Object of relation dpv:hasLikelihood + dpv:hasSeverity
DefinitionLevel where Likelihood is LowLevel where Severity is Moderate
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
- + - + - + - - - - - - - - + + + + - - @@ -11458,12 +13300,9 @@

Low Risk

- + - - - - + @@ -11474,7 +13313,7 @@

Low Risk

- + @@ -11485,7 +13324,7 @@

Low Risk

- @@ -11494,50 +13333,45 @@

Low Risk

-
-

Low Severity

+
+

Monitor Control

TermLowRiskMonitorConsequence Prefix risk
LabelLow RiskMonitor Consequence
IRIhttps://w3id.org/dpv/risk#LowRiskhttps://w3id.org/dpv/risk#MonitorConsequence
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
rdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasRiskLevel + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Risk is LowControl that monitors a Risk Consequence
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Date Created2022-08-182024-05-19
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - @@ -11548,11 +13382,11 @@

Low Severity

- + - + @@ -11564,7 +13398,7 @@

Low Severity

- + @@ -11575,7 +13409,7 @@

Low Severity

- @@ -11584,49 +13418,48 @@

Low Severity

-
-

Malicious Code Attack

+
+

Monitor Impact

TermLowSeverityMonitorControl Prefix risk
LabelLow SeverityMonitor Control
IRIhttps://w3id.org/dpv/risk#LowSeverityhttps://w3id.org/dpv/risk#MonitorControl
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasSeverity + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Severity is LowRisk Mitigation Measure that uses controls to monitor events
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
Date Created2022-08-182024-05-19
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - - - + + + + @@ -11635,28 +13468,22 @@

Malicious Code Attack

- + - - - - + - + - - - - + @@ -11665,7 +13492,7 @@

Malicious Code Attack

- @@ -11674,49 +13501,48 @@

Malicious Code Attack

-
-

Malware Attack

+
+

Monitor Risk

TermMaliciousCodeAttackMonitorImpact Prefix risk
LabelMalicious Code AttackMonitor Impact
IRIhttps://w3id.org/dpv/risk#MaliciousCodeAttackhttps://w3id.org/dpv/risk#MonitorImpact
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
Broader/Parent types risk:IntegrityConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Malicious Code AttackControl that monitors a Risk Impact
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - - - + + + + @@ -11725,28 +13551,22 @@

Malware Attack

- + - - - - + - + - - - - + @@ -11755,7 +13575,7 @@

Malware Attack

- @@ -11764,40 +13584,48 @@

Malware Attack

-
-

Material Damage

+
+

Monitor Control

TermMalwareAttackMonitorRisk Prefix risk
LabelMalware AttackMonitor Risk
IRIhttps://w3id.org/dpv/risk#MalwareAttackhttps://w3id.org/dpv/risk#MonitorRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
Broader/Parent types risk:IntegrityConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Malware AttackControl that monitors a Risk
SourceENISA Methodology for Sectoral Cybersecurity Assessments
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + @@ -11806,12 +13634,9 @@

Material Damage

- + - - - - + @@ -11822,12 +13647,9 @@

Material Damage

- + - - - - + @@ -11836,7 +13658,7 @@

Material Damage

- @@ -11845,40 +13667,48 @@

Material Damage

-
-

Misuse

+
+

Monitor Risk Source

TermMaterialDamageMonitorRiskControl Prefix risk
LabelMaterial DamageMonitor Control
IRIhttps://w3id.org/dpv/risk#MaterialDamagehttps://w3id.org/dpv/risk#MonitorRiskControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Material DamageControl that monitors another Control
Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
Date Created2022-03-302024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + @@ -11887,7 +13717,7 @@

Misuse

- + @@ -11900,21 +13730,18 @@

Misuse

- + - - - - + - + - @@ -11923,50 +13750,46 @@

Misuse

-
-

Moderate Likelihood

+
+

Monitor Vulnerabilities

TermMisuseMonitorRiskSource Prefix risk
LabelMisuseMonitor Risk Source
IRIhttps://w3id.org/dpv/risk#Misusehttps://w3id.org/dpv/risk#MonitorRiskSource
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:UserRisks - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes MisuseControl that monitors a Risk Source
Date Created2024-06-112024-05-19
Date Modified2024-08-16
ContributorsDelaram GolpayeganiHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - @@ -11977,12 +13800,9 @@

Moderate Likelihood

- + - - - - + @@ -11993,7 +13813,7 @@

Moderate Likelihood

- + @@ -12004,7 +13824,7 @@

Moderate Likelihood

- @@ -12013,52 +13833,40 @@

Moderate Likelihood

-
-

Moderate Risk

+
+

Non-Material Damage

TermModerateLikelihoodMonitorVulnerabilities Prefix risk
LabelModerate LikelihoodMonitor Vulnerabilities
IRIhttps://w3id.org/dpv/risk#ModerateLikelihoodhttps://w3id.org/dpv/risk#MonitorVulnerabilities
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Likelihood is ModerateControl that monitors a Risk Vulnerability
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Date Created2022-08-182024-05-19
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - - - - + @@ -12067,11 +13875,11 @@

Moderate Risk

- + - + @@ -12083,9 +13891,12 @@

Moderate Risk

- + - + + + + @@ -12094,7 +13905,7 @@

Moderate Risk

- @@ -12103,52 +13914,42 @@

Moderate Risk

-
-

Moderate Severity

+
+

Non-Normality Bias

TermModerateRiskNonMaterialDamage Prefix risk
LabelModerate RiskNon-Material Damage
IRIhttps://w3id.org/dpv/risk#ModerateRiskhttps://w3id.org/dpv/risk#NonMaterialDamage
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:LegalRisk + → dpv:RiskConcept
Object of relation dpv:hasRiskLevel -
DefinitionLevel where Risk is ModerateSomething that acts as or causes Non-Material Damage
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1The criteria for what is considered material damage is based in jurisdictional laws and norms
Date Created2022-08-182022-03-30
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - - - - - + @@ -12157,34 +13958,34 @@

Moderate Severity

- + - - - - + - + + + + - + - + - @@ -12193,48 +13994,43 @@

Moderate Severity

-
-

Monitor Consequence

+
+

Non-Response Bias

TermModerateSeverityNonNormalityBias Prefix risk
LabelModerate SeverityNon-Normality Bias
IRIhttps://w3id.org/dpv/risk#ModerateSeverityhttps://w3id.org/dpv/risk#NonNormalityBias
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasSeverity -
DefinitionLevel where Severity is ModerateBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Source
Date Created2022-08-182024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-LEVELS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -12243,31 +14039,34 @@

Monitor Consequence

- + - + + + + - + - + - @@ -12276,47 +14075,39 @@

Monitor Consequence

-
-

Monitor Control

+
+

Operational Security Risk

TermMonitorConsequenceNonResponseBias Prefix risk
LabelMonitor ConsequenceNon-Response Bias
IRIhttps://w3id.org/dpv/risk#MonitorConsequencehttps://w3id.org/dpv/risk#NonResponseBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk ConsequenceBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias
Source
Date Created2024-05-192024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -12325,12 +14116,9 @@

Monitor Control

- + - - - - + @@ -12339,20 +14127,14 @@

Monitor Control

- - - - + - - - - + - @@ -12361,48 +14143,41 @@

Monitor Control

-
-

Monitor Impact

+
+

Out-Group Homogeneity Bias

TermMonitorControlOperationalSecurityRisk Prefix risk
LabelMonitor ControlOperational Security Risk
IRIhttps://w3id.org/dpv/risk#MonitorControlhttps://w3id.org/dpv/risk#OperationalSecurityRisk
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionRisk Mitigation Measure that uses controls to monitor eventsRisks and issues that arise during operational processes
Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
Date Created2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -12411,31 +14186,34 @@

Monitor Impact

- + - + + + + - + - + - @@ -12444,48 +14222,40 @@

Monitor Impact

-
-

Monitor Risk

+
+

Payment

TermMonitorImpactOutGroupHomogeneityBias Prefix risk
LabelMonitor ImpactOut-Group Homogeneity Bias
IRIhttps://w3id.org/dpv/risk#MonitorImpacthttps://w3id.org/dpv/risk#OutGroupHomogeneityBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk ImpactBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics
Source
Date Created2024-05-192024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -12494,7 +14264,7 @@

Monitor Risk

- + @@ -12507,18 +14277,21 @@

Monitor Risk

- + - + + + + - + - @@ -12527,48 +14300,40 @@

Monitor Risk

-
-

Monitor Control

+
+

Personal Safety Endangerment

TermMonitorRiskPayment Prefix risk
LabelMonitor RiskPayment
IRIhttps://w3id.org/dpv/risk#MonitorRiskhttps://w3id.org/dpv/risk#Payment
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a RiskSomething that acts as or provides payment e.g. to access a service or purchase resources
Date Created2024-05-192024-04-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -12577,22 +14342,28 @@

Monitor Control

- + - + + + + - + - + + + + @@ -12601,7 +14372,7 @@

Monitor Control

- @@ -12610,48 +14381,43 @@

Monitor Control

-
-

Monitor Risk Source

+
+

Phishing Scam

TermMonitorRiskControlPersonalSafetyEndangerment Prefix risk
LabelMonitor ControlPersonal Safety Endangerment
IRIhttps://w3id.org/dpv/risk#MonitorRiskControlhttps://w3id.org/dpv/risk#PersonalSafetyEndangerment
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors another ControlSomething that acts as or causes Personal Safety Endangerment
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - - - - + @@ -12660,22 +14426,28 @@

Monitor Risk Source

- + - + + + + - + - + + + + @@ -12684,7 +14456,7 @@

Monitor Risk Source

- @@ -12693,48 +14465,39 @@

Monitor Risk Source

-
-

Monitor Vulnerabilities

+
+

Physical Assault

TermMonitorRiskSourcePhishingScam Prefix risk
LabelMonitor Risk SourcePhishing Scam
IRIhttps://w3id.org/dpv/risk#MonitorRiskSourcehttps://w3id.org/dpv/risk#PhishingScam
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk SourceSomething that acts as or causes Phishing Scam
SourceENISA Threat Landscape for Ransomware Attacks 2022
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -12743,22 +14506,28 @@

Monitor Vulnerabilities

- + - + + + + - + - + + + + @@ -12767,7 +14536,7 @@

Monitor Vulnerabilities

- @@ -12776,23 +14545,23 @@

Monitor Vulnerabilities

-
-

Non-Material Damage

+
+

Physical Harm

TermMonitorVulnerabilitiesPhysicalAssault Prefix risk
LabelMonitor VulnerabilitiesPhysical Assault
IRIhttps://w3id.org/dpv/risk#MonitorVulnerabilitieshttps://w3id.org/dpv/risk#PhysicalAssault
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk VulnerabilitySomething that acts as or causes Physical Assault
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -12804,8 +14573,7 @@

Non-Material Damage

- @@ -12816,14 +14584,8 @@

Non-Material Damage

- - - - - - - - + + @@ -12832,18 +14594,9 @@

Non-Material Damage

- - - - - - - - - - - - + + + @@ -12857,23 +14610,23 @@

Non-Material Damage

-
-

Operational Security Risk

+
+

Privacy

TermNonMaterialDamagePhysicalHarm Prefix risk
LabelNon-Material DamagePhysical Harm
IRIhttps://w3id.org/dpv/risk#NonMaterialDamagehttps://w3id.org/dpv/risk#PhysicalHarm
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:IndividualRisk
DefinitionSomething that acts as or causes Non-Material Damage
Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
Date Created2022-03-30
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -12885,7 +14638,7 @@

Operational Security Risk

- @@ -12896,10 +14649,7 @@

Operational Security Risk

- - - - + @@ -12925,23 +14675,23 @@

Operational Security Risk

-
-

Payment

+
+

Psychological Harm

TermOperationalSecurityRiskPrivacy Prefix risk
LabelOperational Security RiskPrivacy
IRIhttps://w3id.org/dpv/risk#OperationalSecurityRiskhttps://w3id.org/dpv/risk#Privacy
Broader/Parent types dpv:RiskConcept + risk:IndividualRisk
DefinitionRisks and issues that arise during operational processes
- + - + - + @@ -12953,8 +14703,7 @@

Payment

- @@ -12967,20 +14716,23 @@

Payment

- + - + + + + - + @@ -12988,7 +14740,7 @@

Payment

- + @@ -13003,23 +14755,23 @@

Payment

-
-

Personal Safety Endangerment

+
+

Public Order Breach

TermPaymentPsychologicalHarm Prefix risk
LabelPaymentPsychological Harm
IRIhttps://w3id.org/dpv/risk#Paymenthttps://w3id.org/dpv/risk#PsychologicalHarm
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:IndividualRisk
DefinitionSomething that acts as or provides payment e.g. to access a service or purchase resourcesSomething that acts as or causes Psychological Harm
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2024-04-142022-08-17
Date Modified
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
- + - + - + @@ -13031,7 +14783,7 @@

Personal Safety Endangerment

- @@ -13045,7 +14797,7 @@

Personal Safety Endangerment

- + @@ -13084,43 +14836,47 @@

Personal Safety Endangerment

-
-

Phishing Scam

+
+

Recovery Control

TermPersonalSafetyEndangermentPublicOrderBreach Prefix risk
LabelPersonal Safety EndangermentPublic Order Breach
IRIhttps://w3id.org/dpv/risk#PersonalSafetyEndangermenthttps://w3id.org/dpv/risk#PublicOrderBreach
Broader/Parent types risk:SocietalRisk + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Personal Safety EndangermentSomething that acts as or causes Public Order Breach
- + - + - + - + - - - - + + + + @@ -13129,37 +14885,28 @@

Phishing Scam

- + - - - - + - + - - - - - - - - + + - @@ -13168,39 +14915,48 @@

Phishing Scam

-
-

Physical Assault

+
+

Reduce Likelihood

TermPhishingScamRecoveryControl Prefix risk
LabelPhishing ScamRecovery Control
IRIhttps://w3id.org/dpv/risk#PhishingScamhttps://w3id.org/dpv/risk#RecoveryControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Phishing ScamControl to recover from event
SourceENISA Threat Landscape for Ransomware Attacks 2022
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + @@ -13209,28 +14965,22 @@

Physical Assault

- + - - - - + - + - - - - + @@ -13239,7 +14989,7 @@

Physical Assault

- @@ -13248,46 +14998,58 @@

Physical Assault

-
-

Physical Harm

+
+

Reduce Severity

TermPhysicalAssaultReduceLikelihood Prefix risk
LabelPhysical AssaultReduce Likelihood
IRIhttps://w3id.org/dpv/risk#PhysicalAssaulthttps://w3id.org/dpv/risk#ReduceLikelihood
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:IndividualRisk + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Physical AssaultControl that reduces the likelihood of an event
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + - + + + + @@ -13297,14 +15059,20 @@

Physical Harm

- + + + + - + + + + - @@ -13313,46 +15081,57 @@

Physical Harm

-
-

Privacy

+
+

Reduction Control

TermPhysicalHarmReduceSeverity Prefix risk
LabelPhysical HarmReduce Severity
IRIhttps://w3id.org/dpv/risk#PhysicalHarmhttps://w3id.org/dpv/risk#ReduceSeverity
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:IndividualRisk + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionControl that reduces the severity of an event
Date Created2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + - + + + + @@ -13362,14 +15141,17 @@

Privacy

- + + + + - @@ -13378,23 +15160,25 @@

Privacy

-
-

Psychological Harm

+ + +
+

Re-identification

TermPrivacyReductionControl Prefix risk
LabelPrivacyReduction Control
IRIhttps://w3id.org/dpv/risk#Privacyhttps://w3id.org/dpv/risk#ReductionControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:IndividualRisk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionControl that reduces the likelihood or severity of an event
Date Created2024-05-19
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -13406,7 +15190,11 @@

Psychological Harm

- + + @@ -13419,23 +15207,23 @@

Psychological Harm

- + - + + + + - - - - + - + @@ -13458,40 +15246,47 @@

Psychological Harm

-
-

Public Order Breach

+
+

Remedy Control

TermPsychologicalHarmReidentification Prefix risk
LabelPsychological HarmRe-identification
IRIhttps://w3id.org/dpv/risk#PsychologicalHarmhttps://w3id.org/dpv/risk#Reidentification
Broader/Parent types risk:IndividualRisk + risk:ConfidentialityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
DefinitionSomething that acts as or causes Psychological HarmSomething that acts as or causes Re-identification
Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172022-08-19
Date Modified
- + - + - + - + - - + + + + @@ -13500,37 +15295,28 @@

Public Order Breach

- + - - - - + - + - - - - - - - - + + - @@ -13539,23 +15325,23 @@

Public Order Breach

-
-

Recovery Control

+
+

Remove Consequence

TermPublicOrderBreachRemedyControl Prefix risk
LabelPublic Order BreachRemedy Control
IRIhttps://w3id.org/dpv/risk#PublicOrderBreachhttps://w3id.org/dpv/risk#RemedyControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Public Order BreachControl to remedy consequences of event
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -13567,7 +15353,8 @@

Recovery Control

- @@ -13588,7 +15375,7 @@

Recovery Control

- + @@ -13604,7 +15391,10 @@

Recovery Control

- + + + + @@ -13618,23 +15408,23 @@

Recovery Control

-
-

Reduce Likelihood

+
+

Remove Impact

TermRecoveryControlRemoveConsequence Prefix risk
LabelRecovery ControlRemove Consequence
IRIhttps://w3id.org/dpv/risk#RecoveryControlhttps://w3id.org/dpv/risk#RemoveConsequence
Broader/Parent types risk:RiskControl + risk:ConsequenceControl + → risk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
DefinitionControl to recover from eventControl that removes Consequence i.e. prevents it from materialising
2024-05-19
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -13646,7 +15436,7 @@

Reduce Likelihood

- - + @@ -13701,23 +15491,23 @@

Reduce Likelihood

-
-

Reduce Severity

+
+

Remove Source

TermReduceLikelihoodRemoveImpact Prefix risk
LabelReduce LikelihoodRemove Impact
IRIhttps://w3id.org/dpv/risk#ReduceLikelihoodhttps://w3id.org/dpv/risk#RemoveImpact
Broader/Parent types risk:ReductionControl + risk:ImpactControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -13668,7 +15458,7 @@

Reduce Likelihood

DefinitionControl that reduces the likelihood of an eventControl that removes Impact i.e. prevents it from materialising
- + - + - + @@ -13729,7 +15519,7 @@

Reduce Severity

- - + @@ -13784,47 +15574,40 @@

Reduce Severity

-
-

Reduction Control

+
+

Remuneration

TermReduceSeverityRemoveSource Prefix risk
LabelReduce SeverityRemove Source
IRIhttps://w3id.org/dpv/risk#ReduceSeverityhttps://w3id.org/dpv/risk#RemoveSource
Broader/Parent types risk:ReductionControl + risk:SourceControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -13751,7 +15541,7 @@

Reduce Severity

DefinitionControl that reduces the severity of an eventControl that removes the risk source
- + - + - + - + - - - - - + @@ -13833,7 +15616,7 @@

Reduction Control

- + @@ -13846,15 +15629,21 @@

Reduction Control

- + - - + + + + + + + + - @@ -13863,25 +15652,23 @@

Reduction Control

- - -
-

Re-identification

+
+

Reputational Risk

TermReductionControlRenumeration Prefix risk
LabelReduction ControlRemuneration
IRIhttps://w3id.org/dpv/risk#ReductionControlhttps://w3id.org/dpv/risk#Renumeration
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that reduces the likelihood or severity of an eventSomething that acts as or provides renumeration which is in monetary or financial form
Date Created2024-05-192024-04-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -13893,11 +15680,7 @@

Re-identification

- - - @@ -13910,12 +15693,9 @@

Re-identification

- + - - - - + @@ -13924,18 +15704,9 @@

Re-identification

- - - - - - - - - - - - + + + @@ -13949,47 +15720,41 @@

Re-identification

-
-

Remedy Control

+
+

Requirements Bias

TermReidentificationReputationalRisk Prefix risk
LabelRe-identificationReputational Risk
IRIhttps://w3id.org/dpv/risk#Reidentificationhttps://w3id.org/dpv/risk#ReputationalRisk
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskConcept
DefinitionSomething that acts as or causes Re-identificationRisks and issues that affect the reputation of the organisation
Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
Date Created2022-08-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - - + @@ -13998,28 +15763,37 @@

Remedy Control

- + - + + + + - + + + + - + - + + + + - @@ -14028,48 +15802,40 @@

Remedy Control

-
-

Remove Consequence

+
+

Reward

TermRemedyControlRequirementsBias Prefix risk
LabelRemedy ControlRequirements Bias
IRIhttps://w3id.org/dpv/risk#RemedyControlhttps://w3id.org/dpv/risk#RequirementsBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl to remedy consequences of eventBias that occurs in or during requirements creation
Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifest
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -14078,7 +15844,7 @@

Remove Consequence

- + @@ -14091,18 +15857,21 @@

Remove Consequence

- + - + + + + - + - @@ -14111,48 +15880,40 @@

Remove Consequence

-
-

Remove Impact

+
+

Prevent Exercising of Rights

TermRemoveConsequenceReward Prefix risk
LabelRemove ConsequenceReward
IRIhttps://w3id.org/dpv/risk#RemoveConsequencehttps://w3id.org/dpv/risk#Reward
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that removes Consequence i.e. prevents it from materialisingSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
Date Created2024-05-192024-04-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -14161,9 +15922,12 @@

Remove Impact

- + - + + + + @@ -14174,18 +15938,21 @@

Remove Impact

- + - + + + + - + - @@ -14194,46 +15961,48 @@

Remove Impact

-
-

Remove Source

+
+

Impact to Rights

TermRemoveImpactRightsExercisePrevention Prefix risk
LabelRemove ImpactPrevent Exercising of Rights
IRIhttps://w3id.org/dpv/risk#RemoveImpacthttps://w3id.org/dpv/risk#RightsExercisePrevention
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that removes Impact i.e. prevents it from materialisingSomething that acts as or causes Prevent Exercising of Rights
Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
Date Created2024-05-192022-08-18
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - @@ -14244,22 +16013,31 @@

Remove Source

- + - + + + + - + + + + - + - + + + + @@ -14268,7 +16046,7 @@

Remove Source

- @@ -14277,23 +16055,23 @@

Remove Source

-
-

Remuneration

+
+

Limitation of Rights

TermRemoveSourceRightsImpact Prefix risk
LabelRemove SourceImpact to Rights
IRIhttps://w3id.org/dpv/risk#RemoveSourcehttps://w3id.org/dpv/risk#RightsImpact
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Impact + → dpv:Consequence + → dpv:RiskConcept +
Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasConsequence, + dpv:hasImpact
DefinitionControl that removes the risk sourceSomething that acts as or causes Impact to Rights
Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -14305,7 +16083,7 @@

Remuneration

- @@ -14319,9 +16097,12 @@

Remuneration

- + - + + + + @@ -14332,7 +16113,7 @@

Remuneration

- + @@ -14355,23 +16136,23 @@

Remuneration

-
-

Reputational Risk

+
+

Violation of Rights

TermRenumerationRightsLimitation Prefix risk
LabelRemunerationLimitation of Rights
IRIhttps://w3id.org/dpv/risk#Renumerationhttps://w3id.org/dpv/risk#RightsLimitation
Broader/Parent types risk:FinancialImpact + risk:SocietalRiskdpv:RiskConcept
DefinitionSomething that acts as or provides renumeration which is in monetary or financial formSomething that acts as or causes Limitation of Rights
Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
Date Created2024-04-142022-08-18
Date Modified
- + - + - + @@ -14383,7 +16164,8 @@

Reputational Risk

- @@ -14396,9 +16178,12 @@

Reputational Risk

- + - + + + + @@ -14407,9 +16192,18 @@

Reputational Risk

- - - + + + + + + + + + + + + @@ -14420,39 +16214,42 @@

Reputational Risk

TermReputationalRiskRightsViolation Prefix risk
LabelReputational RiskViolation of Rights
IRIhttps://w3id.org/dpv/risk#ReputationalRiskhttps://w3id.org/dpv/risk#RightsViolation
Broader/Parent types dpv:RiskConcept + risk:SocietalRisk + → dpv:RiskConcept
DefinitionRisks and issues that affect the reputation of the organisationSomething that acts as or causes Violation of Rights
Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
Date Created2022-08-18
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
+ + + + - -
-

Reward

+
+

Risk Analysis

- + - + - + - + - @@ -14465,34 +16262,34 @@

Reward

- + - + + + + - + - - - - + - + - @@ -14500,37 +16297,35 @@

Reward

- -
-

Prevent Exercising of Rights

+
+

Risk Assessment

TermRewardRiskAnalysis Prefix risk
LabelRewardRisk Analysis
IRIhttps://w3id.org/dpv/risk#Rewardhttps://w3id.org/dpv/risk#RiskAnalysis
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
DefinitionSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or feeA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
SourceIEC 31010:2019
Date Created2024-04-142022-08-18
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- + - + - + - + - @@ -14543,37 +16338,31 @@

Prevent Exercising of Rights

- + - - - - + - + + + + - + - - - - - - - - + + - @@ -14581,49 +16370,44 @@

Prevent Exercising of Rights

- -
-

Impact to Rights

+
+

Risk Control

TermRightsExercisePreventionRiskAssessment Prefix risk
LabelPrevent Exercising of RightsRisk Assessment
IRIhttps://w3id.org/dpv/risk#RightsExercisePreventionhttps://w3id.org/dpv/risk#RiskAssessment
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskManagement
DefinitionSomething that acts as or causes Prevent Exercising of RightsAssessment of risk involving its identification, analysis, and evaluation
Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
Source
Date Created2022-08-182024-02-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- + - + - + - + - - - - @@ -14634,40 +16418,31 @@

Impact to Rights

- + - - - - + + + + - - - - + - + - - - - - - - - + + - @@ -14675,38 +16450,33 @@

Impact to Rights

- -
-

Limitation of Rights

+
+

Risk Management

TermRightsImpactRiskControl Prefix risk
LabelImpact to RightsRisk Control
IRIhttps://w3id.org/dpv/risk#RightsImpacthttps://w3id.org/dpv/risk#RiskControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types dpv:Impact - → dpv:Consequence - → dpv:RiskConcept -
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasConsequence, - dpv:hasImpact + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionSomething that acts as or causes Impact to RightsControl that modifies risk
Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in DEX
- + - + - + - + - - - + @@ -14718,37 +16488,31 @@

Limitation of Rights

- + - - - - + - + + + + - + - - - - - - - - + + - @@ -14757,36 +16521,36 @@

Limitation of Rights

-
-

Violation of Rights

+
+

Risk Matrix

TermRightsLimitationRiskManagement Prefix risk
LabelLimitation of RightsRisk Management
IRIhttps://w3id.org/dpv/risk#RightsLimitationhttps://w3id.org/dpv/risk#RiskManagement
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Limitation of RightsSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
Source
Date Created2022-08-182024-06-12
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- + - + - + - + - @@ -14799,77 +16563,72 @@

Violation of Rights

- + - - - - + - + + + + - + - - - - + - + -
TermRightsViolationRiskMatrix Prefix risk
LabelViolation of RightsRisk Matrix
IRIhttps://w3id.org/dpv/risk#RightsViolationhttps://w3id.org/dpv/risk#RiskMatrix
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAssessment
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
DefinitionSomething that acts as or causes Violation of RightsCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
SourceIEC 31010:2019
Date Created2022-08-182024-02-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- - - - -
-

Risk Analysis

+ +
+

Risk Matrix 3x3

- + - + - + - + - @@ -14883,23 +16642,20 @@

Risk Analysis

- + - - - - + - + @@ -14910,7 +16666,7 @@

Risk Analysis

- @@ -14918,35 +16674,38 @@

Risk Analysis

-
-

Risk Assessment

+ +
+

Risk Matrix 5x5

TermRiskAnalysisRiskMatrix3x3 Prefix risk
LabelRisk AnalysisRisk Matrix 3x3
IRIhttps://w3id.org/dpv/risk#RiskAnalysishttps://w3id.org/dpv/risk#RiskMatrix3x3
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types risk:RiskAssessment + risk:RiskMatrix + → risk:RiskAssessmentrisk:RiskManagement
DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
SourceIEC 31010:2019
Date Created2022-08-182022-08-17
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + - + - @@ -14959,31 +16718,31 @@

Risk Assessment

- + - - - - + - + - + + + + - @@ -14991,46 +16750,42 @@

Risk Assessment

-
-

Risk Control

+ +
+

Risk Matrix 7x7

TermRiskAssessmentRiskMatrix5x5 Prefix risk
LabelRisk AssessmentRisk Matrix 5x5
IRIhttps://w3id.org/dpv/risk#RiskAssessmenthttps://w3id.org/dpv/risk#RiskMatrix5x5
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types risk:RiskManagement + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
DefinitionAssessment of risk involving its identification, analysis, and evaluationA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
Source
Date Created2024-02-142022-08-17
ContributorsHarshvardhan J. Pandit
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + - + - - - - - + @@ -15039,13 +16794,10 @@

Risk Control

- + - - - @@ -15055,15 +16807,18 @@

Risk Control

- + - + + + + - @@ -15071,23 +16826,23 @@

Risk Control

-
-

Risk Management

+
+

Risk Source

TermRiskControlRiskMatrix7x7 Prefix risk
LabelRisk ControlRisk Matrix 7x7
IRIhttps://w3id.org/dpv/risk#RiskControlhttps://w3id.org/dpv/risk#RiskMatrix7x7
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that modifies riskA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
Date Created2024-05-192022-08-17
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in DEX + section RISK-MATRIX in RISK
- + - + - + @@ -15097,10 +16852,17 @@

Risk Management

- + + + - + + + + @@ -15109,25 +16871,25 @@

Risk Management

- + - - - - + - + - + + + + @@ -15142,35 +16904,37 @@

Risk Management

-
-

Risk Matrix

+
+

Low Risk (RM3x3 S:1 L:1)

TermRiskManagementRiskSource Prefix risk
LabelRisk ManagementRisk Source
IRIhttps://w3id.org/dpv/risk#RiskManagementhttps://w3id.org/dpv/risk#RiskSource
rdfs:Class, skos:Concept
Broader/Parent types dpv:RiskConcept +
Object of relation risk:hasRiskSource +
DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
Source
Date Created2024-06-122024-02-14
Date Modified2024-08-16
- + - + - + - + - @@ -15184,23 +16948,20 @@

Risk Matrix

- + - - - - + - + @@ -15211,7 +16972,7 @@

Risk Matrix

- @@ -15220,23 +16981,23 @@

Risk Matrix

-
-

Risk Matrix 3x3

+
+

Low Risk (RM3x3 S:1 L:2)

TermRiskMatrixRM3x3S1L1 Prefix risk
LabelRisk MatrixLow Risk (RM3x3 S:1 L:1)
IRIhttps://w3id.org/dpv/risk#RiskMatrixhttps://w3id.org/dpv/risk#RM3x3S1L1
Typerdfs:Class, skos:Concept, risk:RiskAssessmentrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types risk:RiskAssessment + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessmentrisk:RiskManagement
DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
SourceIEC 31010:2019
Date Created2024-02-142022-08-17
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + @@ -15248,7 +17009,8 @@

Risk Matrix 3x3

- @@ -15263,7 +17025,7 @@

Risk Matrix 3x3

- + @@ -15296,23 +17058,23 @@

Risk Matrix 3x3

-
-

Risk Matrix 5x5

+
+

Moderate Risk (RM3x3 S:1 L:3)

TermRiskMatrix3x3RM3x3S1L2 Prefix risk
LabelRisk Matrix 3x3Low Risk (RM3x3 S:1 L:2)
IRIhttps://w3id.org/dpv/risk#RiskMatrix3x3https://w3id.org/dpv/risk#RM3x3S1L2
Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
- + - + - + @@ -15324,7 +17086,8 @@

Risk Matrix 5x5

- @@ -15339,7 +17102,7 @@

Risk Matrix 5x5

- + @@ -15372,23 +17135,23 @@

Risk Matrix 5x5

-
-

Risk Matrix 7x7

+
+

Low Risk (RM3x3 S:2 L:1)

TermRiskMatrix5x5RM3x3S1L3 Prefix risk
LabelRisk Matrix 5x5Moderate Risk (RM3x3 S:1 L:3)
IRIhttps://w3id.org/dpv/risk#RiskMatrix5x5https://w3id.org/dpv/risk#RM3x3S1L3
Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
- + - + - + @@ -15400,7 +17163,8 @@

Risk Matrix 7x7

- @@ -15415,7 +17179,7 @@

Risk Matrix 7x7

- + @@ -15447,43 +17211,43 @@

Risk Matrix 7x7

-
-

Risk Source

+ +
+

Moderate Risk (RM3x3 S:2 L:2)

TermRiskMatrix7x7RM3x3S2L1 Prefix risk
LabelRisk Matrix 7x7Low Risk (RM3x3 S:2 L:1)
IRIhttps://w3id.org/dpv/risk#RiskMatrix7x7https://w3id.org/dpv/risk#RM3x3S2L1
Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
- + - + - + - + - - - - - + @@ -15492,7 +17256,7 @@

Risk Source

- + @@ -15505,18 +17269,18 @@

Risk Source

- + + - - - - + + + - @@ -15525,23 +17289,23 @@

Risk Source

-
-

Low Risk (RM3x3 S:1 L:1)

+
+

High Risk (RM3x3 S:2 L:3)

TermRiskSourceRM3x3S2L2 Prefix risk
LabelRisk SourceModerate Risk (RM3x3 S:2 L:2)
IRIhttps://w3id.org/dpv/risk#RiskSourcehttps://w3id.org/dpv/risk#RM3x3S2L2
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
Object of relation risk:hasRiskSource -
DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
Date Created2024-02-142022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + @@ -15569,7 +17333,7 @@

Low Risk (RM3x3 S:1 L:1)

- + @@ -15602,23 +17366,23 @@

Low Risk (RM3x3 S:1 L:1)

-
-

Low Risk (RM3x3 S:1 L:2)

+
+

Moderate Risk (RM3x3 S:3 L:1)

TermRM3x3S1L1RM3x3S2L3 Prefix risk
LabelLow Risk (RM3x3 S:1 L:1)High Risk (RM3x3 S:2 L:3)
IRIhttps://w3id.org/dpv/risk#RM3x3S1L1https://w3id.org/dpv/risk#RM3x3S2L3
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
- + - + - + @@ -15646,7 +17410,7 @@

Low Risk (RM3x3 S:1 L:2)

- + @@ -15679,23 +17443,23 @@

Low Risk (RM3x3 S:1 L:2)

-
-

Moderate Risk (RM3x3 S:1 L:3)

+
+

High Risk (RM3x3 S:3 L:2)

TermRM3x3S1L2RM3x3S3L1 Prefix risk
LabelLow Risk (RM3x3 S:1 L:2)Moderate Risk (RM3x3 S:3 L:1)
IRIhttps://w3id.org/dpv/risk#RM3x3S1L2https://w3id.org/dpv/risk#RM3x3S3L1
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -15723,7 +17487,7 @@

Moderate Risk (RM3x3 S:1 L:3)

- + @@ -15756,23 +17520,23 @@

Moderate Risk (RM3x3 S:1 L:3)

-
-

Low Risk (RM3x3 S:2 L:1)

+
+

High Risk (RM3x3 S:3 L:3)

TermRM3x3S1L3RM3x3S3L2 Prefix risk
LabelModerate Risk (RM3x3 S:1 L:3)High Risk (RM3x3 S:3 L:2)
IRIhttps://w3id.org/dpv/risk#RM3x3S1L3https://w3id.org/dpv/risk#RM3x3S3L2
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -15800,7 +17564,7 @@

Low Risk (RM3x3 S:2 L:1)

- + @@ -15833,23 +17597,23 @@

Low Risk (RM3x3 S:2 L:1)

-
-

Moderate Risk (RM3x3 S:2 L:2)

+
+

Very Low Risk (RM5x5 S:1 L:1)

TermRM3x3S2L1RM3x3S3L3 Prefix risk
LabelLow Risk (RM3x3 S:2 L:1)High Risk (RM3x3 S:3 L:3)
IRIhttps://w3id.org/dpv/risk#RM3x3S2L1https://w3id.org/dpv/risk#RM3x3S3L3
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
- + - + - + @@ -15861,7 +17625,7 @@

Moderate Risk (RM3x3 S:2 L:2)

- - + @@ -15910,23 +17674,23 @@

Moderate Risk (RM3x3 S:2 L:2)

-
-

High Risk (RM3x3 S:2 L:3)

+
+

Very Low Risk (RM5x5 S:1 L:2)

TermRM3x3S2L2RM5x5S1L1 Prefix risk
LabelModerate Risk (RM3x3 S:2 L:2)Very Low Risk (RM5x5 S:1 L:1)
IRIhttps://w3id.org/dpv/risk#RM3x3S2L2https://w3id.org/dpv/risk#RM5x5S1L1
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -15877,7 +17641,7 @@

Moderate Risk (RM3x3 S:2 L:2)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -15938,7 +17702,7 @@

High Risk (RM3x3 S:2 L:3)

- - + @@ -15987,23 +17751,23 @@

High Risk (RM3x3 S:2 L:3)

-
-

Moderate Risk (RM3x3 S:3 L:1)

+
+

Very Low Risk (RM5x5 S:1 L:3)

TermRM3x3S2L3RM5x5S1L2 Prefix risk
LabelHigh Risk (RM3x3 S:2 L:3)Very Low Risk (RM5x5 S:1 L:2)
IRIhttps://w3id.org/dpv/risk#RM3x3S2L3https://w3id.org/dpv/risk#RM5x5S1L2
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -15954,7 +17718,7 @@

High Risk (RM3x3 S:2 L:3)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
- + - + - + @@ -16015,7 +17779,7 @@

Moderate Risk (RM3x3 S:3 L:1)

- - + @@ -16064,23 +17828,23 @@

Moderate Risk (RM3x3 S:3 L:1)

-
-

High Risk (RM3x3 S:3 L:2)

+
+

Low Risk (RM5x5 S:1 L:4)

TermRM3x3S3L1RM5x5S1L3 Prefix risk
LabelModerate Risk (RM3x3 S:3 L:1)Very Low Risk (RM5x5 S:1 L:3)
IRIhttps://w3id.org/dpv/risk#RM3x3S3L1https://w3id.org/dpv/risk#RM5x5S1L3
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -16031,7 +17795,7 @@

Moderate Risk (RM3x3 S:3 L:1)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
- + - + - + @@ -16092,7 +17856,7 @@

High Risk (RM3x3 S:3 L:2)

- - + @@ -16141,23 +17905,23 @@

High Risk (RM3x3 S:3 L:2)

-
-

High Risk (RM3x3 S:3 L:3)

+
+

Low Risk (RM5x5 S:1 L:5)

TermRM3x3S3L2RM5x5S1L4 Prefix risk
LabelHigh Risk (RM3x3 S:3 L:2)Low Risk (RM5x5 S:1 L:4)
IRIhttps://w3id.org/dpv/risk#RM3x3S3L2https://w3id.org/dpv/risk#RM5x5S1L4
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -16108,7 +17872,7 @@

High Risk (RM3x3 S:3 L:2)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
- + - + - + @@ -16169,7 +17933,7 @@

High Risk (RM3x3 S:3 L:3)

- - + @@ -16218,23 +17982,23 @@

High Risk (RM3x3 S:3 L:3)

-
-

Very Low Risk (RM5x5 S:1 L:1)

+
+

Very Low Risk (RM5x5 S:2 L:1)

TermRM3x3S3L3RM5x5S1L5 Prefix risk
LabelHigh Risk (RM3x3 S:3 L:3)Low Risk (RM5x5 S:1 L:5)
IRIhttps://w3id.org/dpv/risk#RM3x3S3L3https://w3id.org/dpv/risk#RM5x5S1L5
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -16185,7 +17949,7 @@

High Risk (RM3x3 S:3 L:3)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
- + - + - + @@ -16262,7 +18026,7 @@

Very Low Risk (RM5x5 S:1 L:1)

- + @@ -16295,23 +18059,23 @@

Very Low Risk (RM5x5 S:1 L:1)

-
-

Very Low Risk (RM5x5 S:1 L:2)

+
+

Low Risk (RM5x5 S:2 L:2)

TermRM5x5S1L1RM5x5S2L1 Prefix risk
LabelVery Low Risk (RM5x5 S:1 L:1)Very Low Risk (RM5x5 S:2 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L1https://w3id.org/dpv/risk#RM5x5S2L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -16339,7 +18103,7 @@

Very Low Risk (RM5x5 S:1 L:2)

- + @@ -16372,23 +18136,23 @@

Very Low Risk (RM5x5 S:1 L:2)

-
-

Very Low Risk (RM5x5 S:1 L:3)

+
+

Moderate Risk (RM5x5 S:2 L:3)

TermRM5x5S1L2RM5x5S2L2 Prefix risk
LabelVery Low Risk (RM5x5 S:1 L:2)Low Risk (RM5x5 S:2 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L2https://w3id.org/dpv/risk#RM5x5S2L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
- + - + - + @@ -16416,7 +18180,7 @@

Very Low Risk (RM5x5 S:1 L:3)

- + @@ -16449,23 +18213,23 @@

Very Low Risk (RM5x5 S:1 L:3)

-
-

Low Risk (RM5x5 S:1 L:4)

+
+

Moderate Risk (RM5x5 S:2 L:4)

TermRM5x5S1L3RM5x5S2L3 Prefix risk
LabelVery Low Risk (RM5x5 S:1 L:3)Moderate Risk (RM5x5 S:2 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L3https://w3id.org/dpv/risk#RM5x5S2L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
- + - + - + @@ -16493,7 +18257,7 @@

Low Risk (RM5x5 S:1 L:4)

- + @@ -16526,23 +18290,23 @@

Low Risk (RM5x5 S:1 L:4)

-
-

Low Risk (RM5x5 S:1 L:5)

+
+

High Risk (RM5x5 S:2 L:5)

TermRM5x5S1L4RM5x5S2L4 Prefix risk
LabelLow Risk (RM5x5 S:1 L:4)Moderate Risk (RM5x5 S:2 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L4https://w3id.org/dpv/risk#RM5x5S2L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
- + - + - + @@ -16570,7 +18334,7 @@

Low Risk (RM5x5 S:1 L:5)

- + @@ -16603,23 +18367,23 @@

Low Risk (RM5x5 S:1 L:5)

-
-

Very Low Risk (RM5x5 S:2 L:1)

+
+

Very Low Risk (RM5x5 S:3 L:1)

TermRM5x5S1L5RM5x5S2L5 Prefix risk
LabelLow Risk (RM5x5 S:1 L:5)High Risk (RM5x5 S:2 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L5https://w3id.org/dpv/risk#RM5x5S2L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
- + - + - + @@ -16647,7 +18411,7 @@

Very Low Risk (RM5x5 S:2 L:1)

- + @@ -16680,23 +18444,23 @@

Very Low Risk (RM5x5 S:2 L:1)

-
-

Low Risk (RM5x5 S:2 L:2)

+
+

Moderate Risk (RM5x5 S:3 L:2)

TermRM5x5S2L1RM5x5S3L1 Prefix risk
LabelVery Low Risk (RM5x5 S:2 L:1)Very Low Risk (RM5x5 S:3 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L1https://w3id.org/dpv/risk#RM5x5S3L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -16724,7 +18488,7 @@

Low Risk (RM5x5 S:2 L:2)

- + @@ -16757,23 +18521,23 @@

Low Risk (RM5x5 S:2 L:2)

-
-

Moderate Risk (RM5x5 S:2 L:3)

+
+

Moderate Risk (RM5x5 S:3 L:3)

TermRM5x5S2L2RM5x5S3L2 Prefix risk
LabelLow Risk (RM5x5 S:2 L:2)Moderate Risk (RM5x5 S:3 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L2https://w3id.org/dpv/risk#RM5x5S3L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -16801,7 +18565,7 @@

Moderate Risk (RM5x5 S:2 L:3)

- + @@ -16834,23 +18598,23 @@

Moderate Risk (RM5x5 S:2 L:3)

-
-

Moderate Risk (RM5x5 S:2 L:4)

+
+

High Risk (RM5x5 S:3 L:4)

TermRM5x5S2L3RM5x5S3L3 Prefix risk
LabelModerate Risk (RM5x5 S:2 L:3)Moderate Risk (RM5x5 S:3 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L3https://w3id.org/dpv/risk#RM5x5S3L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
- + - + - + @@ -16878,7 +18642,7 @@

Moderate Risk (RM5x5 S:2 L:4)

- + @@ -16911,23 +18675,23 @@

Moderate Risk (RM5x5 S:2 L:4)

-
-

High Risk (RM5x5 S:2 L:5)

+
+

Very High Risk (RM5x5 S:3 L:5)

TermRM5x5S2L4RM5x5S3L4 Prefix risk
LabelModerate Risk (RM5x5 S:2 L:4)High Risk (RM5x5 S:3 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L4https://w3id.org/dpv/risk#RM5x5S3L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
- + - + - + @@ -16955,7 +18719,7 @@

High Risk (RM5x5 S:2 L:5)

- + @@ -16988,23 +18752,23 @@

High Risk (RM5x5 S:2 L:5)

-
-

Very Low Risk (RM5x5 S:3 L:1)

+
+

Low Risk (RM5x5 S:4 L:1)

TermRM5x5S2L5RM5x5S3L5 Prefix risk
LabelHigh Risk (RM5x5 S:2 L:5)Very High Risk (RM5x5 S:3 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L5https://w3id.org/dpv/risk#RM5x5S3L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -17032,7 +18796,7 @@

Very Low Risk (RM5x5 S:3 L:1)

- + @@ -17065,23 +18829,23 @@

Very Low Risk (RM5x5 S:3 L:1)

-
-

Moderate Risk (RM5x5 S:3 L:2)

+
+

Moderate Risk (RM5x5 S:4 L:2)

TermRM5x5S3L1RM5x5S4L1 Prefix risk
LabelVery Low Risk (RM5x5 S:3 L:1)Low Risk (RM5x5 S:4 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L1https://w3id.org/dpv/risk#RM5x5S4L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -17109,7 +18873,7 @@

Moderate Risk (RM5x5 S:3 L:2)

- + @@ -17142,23 +18906,23 @@

Moderate Risk (RM5x5 S:3 L:2)

-
-

Moderate Risk (RM5x5 S:3 L:3)

+
+

High Risk (RM5x5 S:4 L:3)

TermRM5x5S3L2RM5x5S4L2 Prefix risk
LabelModerate Risk (RM5x5 S:3 L:2)Moderate Risk (RM5x5 S:4 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L2https://w3id.org/dpv/risk#RM5x5S4L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -17186,7 +18950,7 @@

Moderate Risk (RM5x5 S:3 L:3)

- + @@ -17219,23 +18983,23 @@

Moderate Risk (RM5x5 S:3 L:3)

-
-

High Risk (RM5x5 S:3 L:4)

+
+

Very High Risk (RM5x5 S:4 L:4)

TermRM5x5S3L3RM5x5S4L3 Prefix risk
LabelModerate Risk (RM5x5 S:3 L:3)High Risk (RM5x5 S:4 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L3https://w3id.org/dpv/risk#RM5x5S4L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -17263,7 +19027,7 @@

High Risk (RM5x5 S:3 L:4)

- + @@ -17296,23 +19060,23 @@

High Risk (RM5x5 S:3 L:4)

-
-

Very High Risk (RM5x5 S:3 L:5)

+
+

Very High Risk (RM5x5 S:4 L:5)

TermRM5x5S3L4RM5x5S4L4 Prefix risk
LabelHigh Risk (RM5x5 S:3 L:4)Very High Risk (RM5x5 S:4 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L4https://w3id.org/dpv/risk#RM5x5S4L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -17340,7 +19104,7 @@

Very High Risk (RM5x5 S:3 L:5)

- + @@ -17373,23 +19137,23 @@

Very High Risk (RM5x5 S:3 L:5)

-
-

Low Risk (RM5x5 S:4 L:1)

+
+

Low Risk (RM5x5 S:5 L:1)

TermRM5x5S3L5RM5x5S4L5 Prefix risk
LabelVery High Risk (RM5x5 S:3 L:5)Very High Risk (RM5x5 S:4 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L5https://w3id.org/dpv/risk#RM5x5S4L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -17417,7 +19181,7 @@

Low Risk (RM5x5 S:4 L:1)

- + @@ -17450,23 +19214,23 @@

Low Risk (RM5x5 S:4 L:1)

-
-

Moderate Risk (RM5x5 S:4 L:2)

+
+

High Risk (RM5x5 S:5 L:2)

TermRM5x5S4L1RM5x5S5L1 Prefix risk
LabelLow Risk (RM5x5 S:4 L:1)Low Risk (RM5x5 S:5 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L1https://w3id.org/dpv/risk#RM5x5S5L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -17494,7 +19258,7 @@

Moderate Risk (RM5x5 S:4 L:2)

- + @@ -17527,23 +19291,23 @@

Moderate Risk (RM5x5 S:4 L:2)

-
-

High Risk (RM5x5 S:4 L:3)

+
+

High Risk (RM5x5 S:5 L:3)

TermRM5x5S4L2RM5x5S5L2 Prefix risk
LabelModerate Risk (RM5x5 S:4 L:2)High Risk (RM5x5 S:5 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L2https://w3id.org/dpv/risk#RM5x5S5L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
- + - + - + @@ -17571,7 +19335,7 @@

High Risk (RM5x5 S:4 L:3)

- + @@ -17604,23 +19368,23 @@

High Risk (RM5x5 S:4 L:3)

-
-

Very High Risk (RM5x5 S:4 L:4)

+
+

Very High Risk (RM5x5 S:5 L:4)

TermRM5x5S4L3RM5x5S5L3 Prefix risk
LabelHigh Risk (RM5x5 S:4 L:3)High Risk (RM5x5 S:5 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L3https://w3id.org/dpv/risk#RM5x5S5L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -17648,7 +19412,7 @@

Very High Risk (RM5x5 S:4 L:4)

- + @@ -17681,23 +19445,23 @@

Very High Risk (RM5x5 S:4 L:4)

-
-

Very High Risk (RM5x5 S:4 L:5)

+
+

Very High Risk (RM5x5 S:5 L:5)

TermRM5x5S4L4RM5x5S5L4 Prefix risk
LabelVery High Risk (RM5x5 S:4 L:4)Very High Risk (RM5x5 S:5 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L4https://w3id.org/dpv/risk#RM5x5S5L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -17725,7 +19489,7 @@

Very High Risk (RM5x5 S:4 L:5)

- + @@ -17758,23 +19522,23 @@

Very High Risk (RM5x5 S:4 L:5)

-
-

Low Risk (RM5x5 S:5 L:1)

+
+

Extremely Low Risk (RM7x7 S:1 L:1)

TermRM5x5S4L5RM5x5S5L5 Prefix risk
LabelVery High Risk (RM5x5 S:4 L:5)Very High Risk (RM5x5 S:5 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L5https://w3id.org/dpv/risk#RM5x5S5L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -17786,7 +19550,7 @@

Low Risk (RM5x5 S:5 L:1)

- - + @@ -17835,23 +19599,23 @@

Low Risk (RM5x5 S:5 L:1)

-
-

High Risk (RM5x5 S:5 L:2)

+
+

Extremely Low Risk (RM7x7 S:1 L:2)

TermRM5x5S5L1RM7x7S1L1 Prefix risk
LabelLow Risk (RM5x5 S:5 L:1)Extremely Low Risk (RM7x7 S:1 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L1https://w3id.org/dpv/risk#RM7x7S1L1
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17802,7 +19566,7 @@

Low Risk (RM5x5 S:5 L:1)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -17863,7 +19627,7 @@

High Risk (RM5x5 S:5 L:2)

- - + @@ -17912,23 +19676,23 @@

High Risk (RM5x5 S:5 L:2)

-
-

High Risk (RM5x5 S:5 L:3)

+
+

Extremely Low Risk (RM7x7 S:1 L:3)

TermRM5x5S5L2RM7x7S1L2 Prefix risk
LabelHigh Risk (RM5x5 S:5 L:2)Extremely Low Risk (RM7x7 S:1 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L2https://w3id.org/dpv/risk#RM7x7S1L2
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17879,7 +19643,7 @@

High Risk (RM5x5 S:5 L:2)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
- + - + - + @@ -17940,7 +19704,7 @@

High Risk (RM5x5 S:5 L:3)

- - + @@ -17989,23 +19753,23 @@

High Risk (RM5x5 S:5 L:3)

-
-

Very High Risk (RM5x5 S:5 L:4)

+
+

Very Low Risk (RM7x7 S:1 L:4)

TermRM5x5S5L3RM7x7S1L3 Prefix risk
LabelHigh Risk (RM5x5 S:5 L:3)Extremely Low Risk (RM7x7 S:1 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L3https://w3id.org/dpv/risk#RM7x7S1L3
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17956,7 +19720,7 @@

High Risk (RM5x5 S:5 L:3)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
- + - + - + @@ -18017,7 +19781,7 @@

Very High Risk (RM5x5 S:5 L:4)

- - + @@ -18066,23 +19830,23 @@

Very High Risk (RM5x5 S:5 L:4)

-
-

Very High Risk (RM5x5 S:5 L:5)

+
+

Very Low Risk (RM7x7 S:1 L:5)

TermRM5x5S5L4RM7x7S1L4 Prefix risk
LabelVery High Risk (RM5x5 S:5 L:4)Very Low Risk (RM7x7 S:1 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L4https://w3id.org/dpv/risk#RM7x7S1L4
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18033,7 +19797,7 @@

Very High Risk (RM5x5 S:5 L:4)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
- + - + - + @@ -18094,7 +19858,7 @@

Very High Risk (RM5x5 S:5 L:5)

- - + @@ -18143,23 +19907,23 @@

Very High Risk (RM5x5 S:5 L:5)

-
-

Extremely Low Risk (RM7x7 S:1 L:1)

+
+

Very Low Risk (RM7x7 S:1 L:6)

TermRM5x5S5L5RM7x7S1L5 Prefix risk
LabelVery High Risk (RM5x5 S:5 L:5)Very Low Risk (RM7x7 S:1 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L5https://w3id.org/dpv/risk#RM7x7S1L5
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18110,7 +19874,7 @@

Very High Risk (RM5x5 S:5 L:5)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
- + - + - + @@ -18187,7 +19951,7 @@

Extremely Low Risk (RM7x7 S:1 L:1)

- + @@ -18220,23 +19984,23 @@

Extremely Low Risk (RM7x7 S:1 L:1)

-
-

Extremely Low Risk (RM7x7 S:1 L:2)

+
+

Low Risk (RM7x7 S:1 L:7)

TermRM7x7S1L1RM7x7S1L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:1 L:1)Very Low Risk (RM7x7 S:1 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L1https://w3id.org/dpv/risk#RM7x7S1L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
- + - + - + @@ -18264,7 +20028,7 @@

Extremely Low Risk (RM7x7 S:1 L:2)

- + @@ -18297,23 +20061,23 @@

Extremely Low Risk (RM7x7 S:1 L:2)

-
-

Extremely Low Risk (RM7x7 S:1 L:3)

+
+

Extremely Low Risk (RM7x7 S:2 L:1)

TermRM7x7S1L2RM7x7S1L7 Prefix risk
LabelExtremely Low Risk (RM7x7 S:1 L:2)Low Risk (RM7x7 S:1 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L2https://w3id.org/dpv/risk#RM7x7S1L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
- + - + - + @@ -18341,7 +20105,7 @@

Extremely Low Risk (RM7x7 S:1 L:3)

- + @@ -18374,23 +20138,23 @@

Extremely Low Risk (RM7x7 S:1 L:3)

-
-

Very Low Risk (RM7x7 S:1 L:4)

+
+

Extremely Low Risk (RM7x7 S:2 L:2)

TermRM7x7S1L3RM7x7S2L1 Prefix risk
LabelExtremely Low Risk (RM7x7 S:1 L:3)Extremely Low Risk (RM7x7 S:2 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L3https://w3id.org/dpv/risk#RM7x7S2L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -18418,7 +20182,7 @@

Very Low Risk (RM7x7 S:1 L:4)

- + @@ -18451,23 +20215,23 @@

Very Low Risk (RM7x7 S:1 L:4)

-
-

Very Low Risk (RM7x7 S:1 L:5)

+
+

Very Low Risk (RM7x7 S:2 L:3)

TermRM7x7S1L4RM7x7S2L2 Prefix risk
LabelVery Low Risk (RM7x7 S:1 L:4)Extremely Low Risk (RM7x7 S:2 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L4https://w3id.org/dpv/risk#RM7x7S2L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
- + - + - + @@ -18495,7 +20259,7 @@

Very Low Risk (RM7x7 S:1 L:5)

- + @@ -18528,23 +20292,23 @@

Very Low Risk (RM7x7 S:1 L:5)

-
-

Very Low Risk (RM7x7 S:1 L:6)

+
+

Low Risk (RM7x7 S:2 L:4)

TermRM7x7S1L5RM7x7S2L3 Prefix risk
LabelVery Low Risk (RM7x7 S:1 L:5)Very Low Risk (RM7x7 S:2 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L5https://w3id.org/dpv/risk#RM7x7S2L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
- + - + - + @@ -18572,7 +20336,7 @@

Very Low Risk (RM7x7 S:1 L:6)

- + @@ -18605,23 +20369,23 @@

Very Low Risk (RM7x7 S:1 L:6)

-
-

Low Risk (RM7x7 S:1 L:7)

+
+

Low Risk (RM7x7 S:2 L:5)

TermRM7x7S1L6RM7x7S2L4 Prefix risk
LabelVery Low Risk (RM7x7 S:1 L:6)Low Risk (RM7x7 S:2 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L6https://w3id.org/dpv/risk#RM7x7S2L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
- + - + - + @@ -18649,7 +20413,7 @@

Low Risk (RM7x7 S:1 L:7)

- + @@ -18682,23 +20446,23 @@

Low Risk (RM7x7 S:1 L:7)

-
-

Extremely Low Risk (RM7x7 S:2 L:1)

+
+

Moderate Risk (RM7x7 S:2 L:6)

TermRM7x7S1L7RM7x7S2L5 Prefix risk
LabelLow Risk (RM7x7 S:1 L:7)Low Risk (RM7x7 S:2 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L7https://w3id.org/dpv/risk#RM7x7S2L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
- + - + - + @@ -18726,7 +20490,7 @@

Extremely Low Risk (RM7x7 S:2 L:1)

- + @@ -18759,23 +20523,23 @@

Extremely Low Risk (RM7x7 S:2 L:1)

-
-

Extremely Low Risk (RM7x7 S:2 L:2)

+
+

Moderate Risk (RM7x7 S:2 L:7)

TermRM7x7S2L1RM7x7S2L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:2 L:1)Moderate Risk (RM7x7 S:2 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L1https://w3id.org/dpv/risk#RM7x7S2L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
- + - + - + @@ -18803,7 +20567,7 @@

Extremely Low Risk (RM7x7 S:2 L:2)

- + @@ -18836,23 +20600,23 @@

Extremely Low Risk (RM7x7 S:2 L:2)

-
-

Very Low Risk (RM7x7 S:2 L:3)

+
+

Extremely Low Risk (RM7x7 S:3 L:1)

TermRM7x7S2L2RM7x7S2L7 Prefix risk
LabelExtremely Low Risk (RM7x7 S:2 L:2)Moderate Risk (RM7x7 S:2 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L2https://w3id.org/dpv/risk#RM7x7S2L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
- + - + - + @@ -18880,7 +20644,7 @@

Very Low Risk (RM7x7 S:2 L:3)

- + @@ -18913,23 +20677,23 @@

Very Low Risk (RM7x7 S:2 L:3)

-
-

Low Risk (RM7x7 S:2 L:4)

+
+

Very Low Risk (RM7x7 S:3 L:2)

TermRM7x7S2L3RM7x7S3L1 Prefix risk
LabelVery Low Risk (RM7x7 S:2 L:3)Extremely Low Risk (RM7x7 S:3 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L3https://w3id.org/dpv/risk#RM7x7S3L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -18957,7 +20721,7 @@

Low Risk (RM7x7 S:2 L:4)

- + @@ -18990,23 +20754,23 @@

Low Risk (RM7x7 S:2 L:4)

-
-

Low Risk (RM7x7 S:2 L:5)

+
+

Low Risk (RM7x7 S:3 L:3)

TermRM7x7S2L4RM7x7S3L2 Prefix risk
LabelLow Risk (RM7x7 S:2 L:4)Very Low Risk (RM7x7 S:3 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L4https://w3id.org/dpv/risk#RM7x7S3L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -19034,7 +20798,7 @@

Low Risk (RM7x7 S:2 L:5)

- + @@ -19067,23 +20831,23 @@

Low Risk (RM7x7 S:2 L:5)

-
-

Moderate Risk (RM7x7 S:2 L:6)

+
+

Moderate Risk (RM7x7 S:3 L:4)

TermRM7x7S2L5RM7x7S3L3 Prefix risk
LabelLow Risk (RM7x7 S:2 L:5)Low Risk (RM7x7 S:3 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L5https://w3id.org/dpv/risk#RM7x7S3L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
- + - + - + @@ -19111,7 +20875,7 @@

Moderate Risk (RM7x7 S:2 L:6)

- + @@ -19144,23 +20908,23 @@

Moderate Risk (RM7x7 S:2 L:6)

-
-

Moderate Risk (RM7x7 S:2 L:7)

+
+

High Risk (RM7x7 S:3 L:5)

TermRM7x7S2L6RM7x7S3L4 Prefix risk
LabelModerate Risk (RM7x7 S:2 L:6)Moderate Risk (RM7x7 S:3 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L6https://w3id.org/dpv/risk#RM7x7S3L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
- + - + - + @@ -19188,7 +20952,7 @@

Moderate Risk (RM7x7 S:2 L:7)

- + @@ -19221,23 +20985,23 @@

Moderate Risk (RM7x7 S:2 L:7)

-
-

Extremely Low Risk (RM7x7 S:3 L:1)

+
+

High Risk (RM7x7 S:3 L:6)

TermRM7x7S2L7RM7x7S3L5 Prefix risk
LabelModerate Risk (RM7x7 S:2 L:7)High Risk (RM7x7 S:3 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L7https://w3id.org/dpv/risk#RM7x7S3L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
- + - + - + @@ -19265,7 +21029,7 @@

Extremely Low Risk (RM7x7 S:3 L:1)

- + @@ -19298,23 +21062,23 @@

Extremely Low Risk (RM7x7 S:3 L:1)

-
-

Very Low Risk (RM7x7 S:3 L:2)

+
+

Very High Risk (RM7x7 S:3 L:7)

TermRM7x7S3L1RM7x7S3L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:3 L:1)High Risk (RM7x7 S:3 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L1https://w3id.org/dpv/risk#RM7x7S3L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
- + - + - + @@ -19342,7 +21106,7 @@

Very Low Risk (RM7x7 S:3 L:2)

- + @@ -19375,23 +21139,23 @@

Very Low Risk (RM7x7 S:3 L:2)

-
-

Low Risk (RM7x7 S:3 L:3)

+
+

Extremely Low Risk (RM7x7 S:4 L:1)

TermRM7x7S3L2RM7x7S3L7 Prefix risk
LabelVery Low Risk (RM7x7 S:3 L:2)Very High Risk (RM7x7 S:3 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L2https://w3id.org/dpv/risk#RM7x7S3L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
- + - + - + @@ -19419,7 +21183,7 @@

Low Risk (RM7x7 S:3 L:3)

- + @@ -19452,23 +21216,23 @@

Low Risk (RM7x7 S:3 L:3)

-
-

Moderate Risk (RM7x7 S:3 L:4)

+
+

Low Risk (RM7x7 S:4 L:2)

TermRM7x7S3L3RM7x7S4L1 Prefix risk
LabelLow Risk (RM7x7 S:3 L:3)Extremely Low Risk (RM7x7 S:4 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L3https://w3id.org/dpv/risk#RM7x7S4L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -19496,7 +21260,7 @@

Moderate Risk (RM7x7 S:3 L:4)

- + @@ -19529,23 +21293,23 @@

Moderate Risk (RM7x7 S:3 L:4)

-
-

High Risk (RM7x7 S:3 L:5)

+
+

Moderate Risk (RM7x7 S:4 L:3)

TermRM7x7S3L4RM7x7S4L2 Prefix risk
LabelModerate Risk (RM7x7 S:3 L:4)Low Risk (RM7x7 S:4 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L4https://w3id.org/dpv/risk#RM7x7S4L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -19573,7 +21337,7 @@

High Risk (RM7x7 S:3 L:5)

- + @@ -19606,23 +21370,23 @@

High Risk (RM7x7 S:3 L:5)

-
-

High Risk (RM7x7 S:3 L:6)

+
+

High Risk (RM7x7 S:4 L:4)

TermRM7x7S3L5RM7x7S4L3 Prefix risk
LabelHigh Risk (RM7x7 S:3 L:5)Moderate Risk (RM7x7 S:4 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L5https://w3id.org/dpv/risk#RM7x7S4L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -19650,7 +21414,7 @@

High Risk (RM7x7 S:3 L:6)

- + @@ -19683,23 +21447,23 @@

High Risk (RM7x7 S:3 L:6)

-
-

Very High Risk (RM7x7 S:3 L:7)

+
+

High Risk (RM7x7 S:4 L:5)

TermRM7x7S3L6RM7x7S4L4 Prefix risk
LabelHigh Risk (RM7x7 S:3 L:6)High Risk (RM7x7 S:4 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L6https://w3id.org/dpv/risk#RM7x7S4L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -19727,7 +21491,7 @@

Very High Risk (RM7x7 S:3 L:7)

- + @@ -19760,23 +21524,23 @@

Very High Risk (RM7x7 S:3 L:7)

-
-

Extremely Low Risk (RM7x7 S:4 L:1)

+
+

Very High Risk (RM7x7 S:4 L:6)

TermRM7x7S3L7RM7x7S4L5 Prefix risk
LabelVery High Risk (RM7x7 S:3 L:7)High Risk (RM7x7 S:4 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L7https://w3id.org/dpv/risk#RM7x7S4L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
- + - + - + @@ -19804,7 +21568,7 @@

Extremely Low Risk (RM7x7 S:4 L:1)

- + @@ -19837,23 +21601,23 @@

Extremely Low Risk (RM7x7 S:4 L:1)

-
-

Low Risk (RM7x7 S:4 L:2)

+
+

Very High Risk (RM7x7 S:4 L:7)

TermRM7x7S4L1RM7x7S4L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:4 L:1)Very High Risk (RM7x7 S:4 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L1https://w3id.org/dpv/risk#RM7x7S4L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -19881,7 +21645,7 @@

Low Risk (RM7x7 S:4 L:2)

- + @@ -19914,23 +21678,23 @@

Low Risk (RM7x7 S:4 L:2)

-
-

Moderate Risk (RM7x7 S:4 L:3)

+
+

Very Low Risk (RM7x7 S:5 L:1)

TermRM7x7S4L2RM7x7S4L7 Prefix risk
LabelLow Risk (RM7x7 S:4 L:2)Very High Risk (RM7x7 S:4 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L2https://w3id.org/dpv/risk#RM7x7S4L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
- + - + - + @@ -19958,7 +21722,7 @@

Moderate Risk (RM7x7 S:4 L:3)

- + @@ -19991,23 +21755,23 @@

Moderate Risk (RM7x7 S:4 L:3)

-
-

High Risk (RM7x7 S:4 L:4)

+
+

Low Risk (RM7x7 S:5 L:2)

TermRM7x7S4L3RM7x7S5L1 Prefix risk
LabelModerate Risk (RM7x7 S:4 L:3)Very Low Risk (RM7x7 S:5 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L3https://w3id.org/dpv/risk#RM7x7S5L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
- + - + - + @@ -20035,7 +21799,7 @@

High Risk (RM7x7 S:4 L:4)

- + @@ -20068,23 +21832,23 @@

High Risk (RM7x7 S:4 L:4)

-
-

High Risk (RM7x7 S:4 L:5)

+
+

Moderate Risk (RM7x7 S:5 L:3)

TermRM7x7S4L4RM7x7S5L2 Prefix risk
LabelHigh Risk (RM7x7 S:4 L:4)Low Risk (RM7x7 S:5 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L4https://w3id.org/dpv/risk#RM7x7S5L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -20112,7 +21876,7 @@

High Risk (RM7x7 S:4 L:5)

- + @@ -20145,23 +21909,23 @@

High Risk (RM7x7 S:4 L:5)

-
-

Very High Risk (RM7x7 S:4 L:6)

+
+

High Risk (RM7x7 S:5 L:4)

TermRM7x7S4L5RM7x7S5L3 Prefix risk
LabelHigh Risk (RM7x7 S:4 L:5)Moderate Risk (RM7x7 S:5 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L5https://w3id.org/dpv/risk#RM7x7S5L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -20189,7 +21953,7 @@

Very High Risk (RM7x7 S:4 L:6)

- + @@ -20222,23 +21986,23 @@

Very High Risk (RM7x7 S:4 L:6)

-
-

Very High Risk (RM7x7 S:4 L:7)

+
+

Very High Risk (RM7x7 S:5 L:5)

TermRM7x7S4L6RM7x7S5L4 Prefix risk
LabelVery High Risk (RM7x7 S:4 L:6)High Risk (RM7x7 S:5 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L6https://w3id.org/dpv/risk#RM7x7S5L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -20266,7 +22030,7 @@

Very High Risk (RM7x7 S:4 L:7)

- + @@ -20299,23 +22063,23 @@

Very High Risk (RM7x7 S:4 L:7)

-
-

Very Low Risk (RM7x7 S:5 L:1)

+
+

Extremely High Risk (RM7x7 S:5 L:6)

TermRM7x7S4L7RM7x7S5L5 Prefix risk
LabelVery High Risk (RM7x7 S:4 L:7)Very High Risk (RM7x7 S:5 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L7https://w3id.org/dpv/risk#RM7x7S5L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -20343,7 +22107,7 @@

Very Low Risk (RM7x7 S:5 L:1)

- + @@ -20376,23 +22140,23 @@

Very Low Risk (RM7x7 S:5 L:1)

-
-

Low Risk (RM7x7 S:5 L:2)

+
+

Extremely High Risk (RM7x7 S:5 L:7)

TermRM7x7S5L1RM7x7S5L6 Prefix risk
LabelVery Low Risk (RM7x7 S:5 L:1)Extremely High Risk (RM7x7 S:5 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L1https://w3id.org/dpv/risk#RM7x7S5L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
- + - + - + @@ -20420,7 +22184,7 @@

Low Risk (RM7x7 S:5 L:2)

- + @@ -20453,23 +22217,23 @@

Low Risk (RM7x7 S:5 L:2)

-
-

Moderate Risk (RM7x7 S:5 L:3)

+
+

Very Low Risk (RM7x7 S:6 L:1)

TermRM7x7S5L2RM7x7S5L7 Prefix risk
LabelLow Risk (RM7x7 S:5 L:2)Extremely High Risk (RM7x7 S:5 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L2https://w3id.org/dpv/risk#RM7x7S5L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
- + - + - + @@ -20497,7 +22261,7 @@

Moderate Risk (RM7x7 S:5 L:3)

- + @@ -20530,23 +22294,23 @@

Moderate Risk (RM7x7 S:5 L:3)

-
-

High Risk (RM7x7 S:5 L:4)

+
+

Moderate Risk (RM7x7 S:6 L:2)

TermRM7x7S5L3RM7x7S6L1 Prefix risk
LabelModerate Risk (RM7x7 S:5 L:3)Very Low Risk (RM7x7 S:6 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L3https://w3id.org/dpv/risk#RM7x7S6L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
- + - + - + @@ -20574,7 +22338,7 @@

High Risk (RM7x7 S:5 L:4)

- + @@ -20607,23 +22371,23 @@

High Risk (RM7x7 S:5 L:4)

-
-

Very High Risk (RM7x7 S:5 L:5)

+
+

High Risk (RM7x7 S:6 L:3)

TermRM7x7S5L4RM7x7S6L2 Prefix risk
LabelHigh Risk (RM7x7 S:5 L:4)Moderate Risk (RM7x7 S:6 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L4https://w3id.org/dpv/risk#RM7x7S6L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
- + - + - + @@ -20651,7 +22415,7 @@

Very High Risk (RM7x7 S:5 L:5)

- + @@ -20684,23 +22448,23 @@

Very High Risk (RM7x7 S:5 L:5)

-
-

Extremely High Risk (RM7x7 S:5 L:6)

+
+

Very High Risk (RM7x7 S:6 L:4)

TermRM7x7S5L5RM7x7S6L3 Prefix risk
LabelVery High Risk (RM7x7 S:5 L:5)High Risk (RM7x7 S:6 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L5https://w3id.org/dpv/risk#RM7x7S6L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
- + - + - + @@ -20728,7 +22492,7 @@

Extremely High Risk (RM7x7 S:5 L:6)

- + @@ -20761,23 +22525,23 @@

Extremely High Risk (RM7x7 S:5 L:6)

-
-

Extremely High Risk (RM7x7 S:5 L:7)

+
+

Very High Risk (RM7x7 S:6 L:5)

TermRM7x7S5L6RM7x7S6L4 Prefix risk
LabelExtremely High Risk (RM7x7 S:5 L:6)Very High Risk (RM7x7 S:6 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L6https://w3id.org/dpv/risk#RM7x7S6L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
- + - + - + @@ -20805,7 +22569,7 @@

Extremely High Risk (RM7x7 S:5 L:7)

- + @@ -20838,23 +22602,23 @@

Extremely High Risk (RM7x7 S:5 L:7)

-
-

Very Low Risk (RM7x7 S:6 L:1)

+
+

Extremely High Risk (RM7x7 S:6 L:6)

TermRM7x7S5L7RM7x7S6L5 Prefix risk
LabelExtremely High Risk (RM7x7 S:5 L:7)Very High Risk (RM7x7 S:6 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L7https://w3id.org/dpv/risk#RM7x7S6L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -20882,7 +22646,7 @@

Very Low Risk (RM7x7 S:6 L:1)

- + @@ -20915,23 +22679,23 @@

Very Low Risk (RM7x7 S:6 L:1)

-
-

Moderate Risk (RM7x7 S:6 L:2)

+
+

Extremely High Risk (RM7x7 S:6 L:7)

TermRM7x7S6L1RM7x7S6L6 Prefix risk
LabelVery Low Risk (RM7x7 S:6 L:1)Extremely High Risk (RM7x7 S:6 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L1https://w3id.org/dpv/risk#RM7x7S6L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
- + - + - + @@ -20959,7 +22723,7 @@

Moderate Risk (RM7x7 S:6 L:2)

- + @@ -20992,23 +22756,23 @@

Moderate Risk (RM7x7 S:6 L:2)

-
-

High Risk (RM7x7 S:6 L:3)

+
+

Low Risk (RM7x7 S:7 L:1)

TermRM7x7S6L2RM7x7S6L7 Prefix risk
LabelModerate Risk (RM7x7 S:6 L:2)Extremely High Risk (RM7x7 S:6 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L2https://w3id.org/dpv/risk#RM7x7S6L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
- + - + - + @@ -21036,7 +22800,7 @@

High Risk (RM7x7 S:6 L:3)

- + @@ -21069,23 +22833,23 @@

High Risk (RM7x7 S:6 L:3)

-
-

Very High Risk (RM7x7 S:6 L:4)

+
+

Moderate Risk (RM7x7 S:7 L:2)

TermRM7x7S6L3RM7x7S7L1 Prefix risk
LabelHigh Risk (RM7x7 S:6 L:3)Low Risk (RM7x7 S:7 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L3https://w3id.org/dpv/risk#RM7x7S7L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
- + - + - + @@ -21113,7 +22877,7 @@

Very High Risk (RM7x7 S:6 L:4)

- + @@ -21146,23 +22910,23 @@

Very High Risk (RM7x7 S:6 L:4)

-
-

Very High Risk (RM7x7 S:6 L:5)

+
+

High Risk (RM7x7 S:7 L:3)

TermRM7x7S6L4RM7x7S7L2 Prefix risk
LabelVery High Risk (RM7x7 S:6 L:4)Moderate Risk (RM7x7 S:7 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L4https://w3id.org/dpv/risk#RM7x7S7L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
- + - + - + @@ -21190,7 +22954,7 @@

Very High Risk (RM7x7 S:6 L:5)

- + @@ -21223,23 +22987,23 @@

Very High Risk (RM7x7 S:6 L:5)

-
-

Extremely High Risk (RM7x7 S:6 L:6)

+
+

Very High Risk (RM7x7 S:7 L:4)

TermRM7x7S6L5RM7x7S7L3 Prefix risk
LabelVery High Risk (RM7x7 S:6 L:5)High Risk (RM7x7 S:7 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L5https://w3id.org/dpv/risk#RM7x7S7L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
- + - + - + @@ -21267,7 +23031,7 @@

Extremely High Risk (RM7x7 S:6 L:6)

- + @@ -21300,23 +23064,23 @@

Extremely High Risk (RM7x7 S:6 L:6)

-
-

Extremely High Risk (RM7x7 S:6 L:7)

+
+

Extremely High Risk (RM7x7 S:7 L:5)

TermRM7x7S6L6RM7x7S7L4 Prefix risk
LabelExtremely High Risk (RM7x7 S:6 L:6)Very High Risk (RM7x7 S:7 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L6https://w3id.org/dpv/risk#RM7x7S7L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
- + - + - + @@ -21344,7 +23108,7 @@

Extremely High Risk (RM7x7 S:6 L:7)

- + @@ -21377,23 +23141,23 @@

Extremely High Risk (RM7x7 S:6 L:7)

-
-

Low Risk (RM7x7 S:7 L:1)

+
+

Extremely High Risk (RM7x7 S:7 L:6)

TermRM7x7S6L7RM7x7S7L5 Prefix risk
LabelExtremely High Risk (RM7x7 S:6 L:7)Extremely High Risk (RM7x7 S:7 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L7https://w3id.org/dpv/risk#RM7x7S7L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
- + - + - + @@ -21421,7 +23185,7 @@

Low Risk (RM7x7 S:7 L:1)

- + @@ -21454,23 +23218,23 @@

Low Risk (RM7x7 S:7 L:1)

-
-

Moderate Risk (RM7x7 S:7 L:2)

+
+

Extremely High Risk (RM7x7 S:7 L:7)

TermRM7x7S7L1RM7x7S7L6 Prefix risk
LabelLow Risk (RM7x7 S:7 L:1)Extremely High Risk (RM7x7 S:7 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S7L1https://w3id.org/dpv/risk#RM7x7S7L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
- + - + - + @@ -21498,7 +23262,7 @@

Moderate Risk (RM7x7 S:7 L:2)

- + @@ -21531,38 +23295,37 @@

Moderate Risk (RM7x7 S:7 L:2)

-
-

High Risk (RM7x7 S:7 L:3)

+
+

Rule-Based System Design

TermRM7x7S7L2RM7x7S7L7 Prefix risk
LabelModerate Risk (RM7x7 S:7 L:2)Extremely High Risk (RM7x7 S:7 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S7L2https://w3id.org/dpv/risk#RM7x7S7L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
- + - + - + - + - @@ -21575,31 +23338,37 @@

High Risk (RM7x7 S:7 L:3)

- + - + + + + - + + + + - + - + - @@ -21608,38 +23377,42 @@

High Risk (RM7x7 S:7 L:3)

-
-

Very High Risk (RM7x7 S:7 L:4)

+
+

Sabotage

TermRM7x7S7L3RuleBasedSystemDesign Prefix risk
LabelHigh Risk (RM7x7 S:7 L:3)Rule-Based System Design
IRIhttps://w3id.org/dpv/risk#RM7x7S7L3https://w3id.org/dpv/risk#RuleBasedSystemDesign
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighBias that occurs due to developer experience and expert advice having a significant influence on rule-based system design
Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
Source
Date Created2022-08-172024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-MATRIX in RISK + section BIAS in RISK
- + - + - + - + - + + + + @@ -21652,14 +23425,17 @@

Very High Risk (RM7x7 S:7 L:4)

- + - + + + + @@ -21667,7 +23443,10 @@

Very High Risk (RM7x7 S:7 L:4)

- + + + + @@ -21676,7 +23455,7 @@

Very High Risk (RM7x7 S:7 L:4)

- @@ -21685,38 +23464,39 @@

Very High Risk (RM7x7 S:7 L:4)

-
-

Extremely High Risk (RM7x7 S:7 L:5)

+
+

Sampling Bias

TermRM7x7S7L4Sabotage Prefix risk
LabelVery High Risk (RM7x7 S:7 L:4)Sabotage
IRIhttps://w3id.org/dpv/risk#RM7x7S7L4https://w3id.org/dpv/risk#Sabotage
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:AvailabilityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighSomething that acts as or causes Sabotage
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created 2022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-MATRIX in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - + + @@ -21729,31 +23509,34 @@

Extremely High Risk (RM7x7 S:7 L:5)

- + - + + + + - + - + - @@ -21762,38 +23545,39 @@

Extremely High Risk (RM7x7 S:7 L:5)

-
-

Extremely High Risk (RM7x7 S:7 L:6)

+
+

Scam

TermRM7x7S7L5SamplingBias Prefix risk
LabelExtremely High Risk (RM7x7 S:7 L:5)Sampling Bias
IRIhttps://w3id.org/dpv/risk#RM7x7S7L5https://w3id.org/dpv/risk#SamplingBias
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement +
Broader/Parent types risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighBias that occurs when data records are not collected randomly from the intended population
Source
Date Created2022-08-172024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-MATRIX in RISK + section BIAS in RISK
- + - + - + - + - + + @@ -21806,14 +23590,17 @@

Extremely High Risk (RM7x7 S:7 L:6)

- + - + + + + @@ -21821,7 +23608,10 @@

Extremely High Risk (RM7x7 S:7 L:6)

- + + + + @@ -21830,7 +23620,7 @@

Extremely High Risk (RM7x7 S:7 L:6)

- @@ -21839,38 +23629,45 @@

Extremely High Risk (RM7x7 S:7 L:6)

-
-

Extremely High Risk (RM7x7 S:7 L:7)

+
+

Security Attack

TermRM7x7S7L6Scam Prefix risk
LabelExtremely High Risk (RM7x7 S:7 L:6)Scam
IRIhttps://w3id.org/dpv/risk#RM7x7S7L6https://w3id.org/dpv/risk#Scam
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighSomething that acts as or causes Scam
SourceISO/IEC 27005:2018
Date Created 2022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-MATRIX in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + + + + + @@ -21883,7 +23680,7 @@

Extremely High Risk (RM7x7 S:7 L:7)

- + @@ -21894,20 +23691,14 @@

Extremely High Risk (RM7x7 S:7 L:7)

- - - - + - - - - + - @@ -21916,23 +23707,23 @@

Extremely High Risk (RM7x7 S:7 L:7)

-
-

Sabotage

+
+

Security Breach

TermRM7x7S7L7SecurityAttack Prefix risk
LabelExtremely High Risk (RM7x7 S:7 L:7)Security Attack
IRIhttps://w3id.org/dpv/risk#RM7x7S7L7https://w3id.org/dpv/risk#SecurityAttack
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:AvailabilityConcept +
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighSomething that acts as or causes an attack on security with the aim of undermining it
Date Created2022-08-17
ContributorsHarshvardhan J. Pandit
See More: section RISK-MATRIX in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -21947,11 +23738,14 @@

Sabotage

- + + @@ -21964,7 +23758,7 @@

Sabotage

- + @@ -21973,7 +23767,7 @@

Sabotage

- + @@ -22003,39 +23797,38 @@

Sabotage

-
-

Scam

+
+

Selection Bias

TermSabotageSecurityBreach Prefix risk
LabelSabotageSecurity Breach
IRIhttps://w3id.org/dpv/risk#Sabotagehttps://w3id.org/dpv/risk#SecurityBreach
risk:AvailabilityConcept
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:ConfidentialityConcept
Broader/Parent types risk:IntegrityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
DefinitionSomething that acts as or causes SabotageSomething that acts as or causes Security Breach
SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
- + - + - + - + - - - @@ -22048,7 +23841,7 @@

Scam

- + @@ -22057,28 +23850,25 @@

Scam

- + - + - - - - + - + - @@ -22087,23 +23877,28 @@

Scam

-
-

Security Attack

+ + + + + +
+

Sexual Violence

TermScamSelectionBias Prefix risk
LabelScamSelection Bias
IRIhttps://w3id.org/dpv/risk#Scamhttps://w3id.org/dpv/risk#SelectionBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes ScamBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + @@ -22115,17 +23910,7 @@

Security Attack

- - - - - - - @@ -22138,20 +23923,32 @@

Security Attack

- + - + + + + - - - + + + + + + + + + + + + @@ -22165,49 +23962,47 @@

Security Attack

-
-

Security Breach

+
+

Share Risk

TermSecurityAttackSexualViolence Prefix risk
LabelSecurity AttackSexual Violence
IRIhttps://w3id.org/dpv/risk#SecurityAttackhttps://w3id.org/dpv/risk#SexualViolence
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
Broader/Parent types risk:IntegrityConcept + risk:IndividualRisk
DefinitionSomething that acts as or causes an attack on security with the aim of undermining itSomething that acts as or causes Sexual Violence
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - - - - - + + + + @@ -22216,28 +24011,22 @@

Security Breach

- + - - - - + - + - - - - + @@ -22246,7 +24035,7 @@

Security Breach

- @@ -22255,40 +24044,37 @@

Security Breach

- - - - - -
-

Sexual Violence

+
+

Simpson'S Paradox Bias

TermSecurityBreachShareRisk Prefix risk
LabelSecurity BreachShare Risk
IRIhttps://w3id.org/dpv/risk#SecurityBreachhttps://w3id.org/dpv/risk#ShareRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:IntegrityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Security BreachRisk Mitigation Measure that shares Risk e.g. amongst stakeholders
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - @@ -22301,7 +24087,7 @@

Sexual Violence

- + @@ -22310,28 +24096,25 @@

Sexual Violence

- + - + - - - - + - + - @@ -22340,47 +24123,40 @@

Sexual Violence

-
-

Share Risk

+
+

Social Disadvantage

TermSexualViolenceSimpsonsParadoxBias Prefix risk
LabelSexual ViolenceSimpson'S Paradox Bias
IRIhttps://w3id.org/dpv/risk#SexualViolencehttps://w3id.org/dpv/risk#SimpsonsParadoxBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:IndividualRisk + risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Sexual ViolenceBias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -22389,7 +24165,7 @@

Share Risk

- + @@ -22402,18 +24178,21 @@

Share Risk

- + - + + + + - + - @@ -22422,36 +24201,37 @@

Share Risk

-
-

Social Disadvantage

+
+

Societal Bias

TermShareRiskSocialDisadvantage Prefix risk
LabelShare RiskSocial Disadvantage
IRIhttps://w3id.org/dpv/risk#ShareRiskhttps://w3id.org/dpv/risk#SocialDisadvantage
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionRisk Mitigation Measure that shares Risk e.g. amongst stakeholdersSomething that acts as or causes Social Disadvantage
Date Created2024-05-192022-08-19
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - @@ -22464,34 +24244,34 @@

Social Disadvantage

- + - + + + + - + - - - - + - + - @@ -22807,6 +24587,85 @@

Spoofing

+
+

Statistical Bias

+
TermSocialDisadvantageSocietalBias Prefix risk
LabelSocial DisadvantageSocietal Bias
IRIhttps://w3id.org/dpv/risk#SocialDisadvantagehttps://w3id.org/dpv/risk#SocietalBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Social DisadvantageBias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society
Source
Date Created2022-08-192024-09-13
Date Modified2024-08-16
ContributorsGeorg P. KrogDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermStatisticalBiasPrefixrisk
LabelStatistical Bias
IRIhttps://w3id.org/dpv/risk#StatisticalBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:DataBias + → risk:Bias + → risk:RiskConcept +
DefinitionBias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in RISK +
+
+ + +

System Failure

@@ -26016,6 +27875,10 @@

Properties

+ + + + @@ -26200,6 +28063,15 @@

caused by vulnerability

+ + + + + + + + + @@ -26236,6 +28108,18 @@

caused by vulnerability

+ + + + + + + + + + + + @@ -26364,6 +28248,9 @@

exploits vulnerability

+ + + @@ -26756,6 +28643,9 @@

has vulnerability

+ + + @@ -26824,6 +28714,12 @@

has vulnerability

+ + + + + + @@ -27088,6 +28984,15 @@

is vulnerability of

+ + + + + + + + + @@ -27209,6 +29114,9 @@

refers to risk

+ + + @@ -27611,6 +29519,24 @@

refers to risk

+ + + + + + + + + + + + + + + + + + @@ -27768,13 +29694,23 @@

External

+ + + + + + + + + + @@ -27801,9 +29737,12 @@

External

+ + + @@ -27817,6 +29756,18 @@

External

+ + + + + + + + + + + + @@ -27909,6 +29860,11 @@

External

+ + + + + @@ -27917,6 +29873,7 @@

External

+ @@ -28013,16 +29970,31 @@

External

+ + + + + + + + + + + + + + + @@ -28184,6 +30156,9 @@

External

+ + + @@ -28472,10 +30447,28 @@

External

+ + + + + + + + + + + + + + + + + + @@ -28615,6 +30608,7 @@

Contributors

  • Axel Polleres (Vienna University of Economics and Business)
  • Beatriz Esteves (IDLab, IMEC, Ghent University)
  • +
  • Daniel Doherty ()
  • Delaram Golpayegani (ADAPT Centre, Trinity College Dublin)
  • Fajar Ekaputra (Vienna University of Technology)
  • Georg P. Krog (Signatu AS)
  • diff --git a/2.1-dev/risk/modules/bias-owl.jsonld b/2.1-dev/risk/modules/bias-owl.jsonld new file mode 100644 index 000000000..1f52bd50e --- /dev/null +++ b/2.1-dev/risk/modules/bias-owl.jsonld @@ -0,0 +1,1624 @@ +[ + { + "@id": "https://w3id.org/dpv/risk/owl#InformativenessBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Informativeness Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TeamSubmission/n3/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#NonResponseBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Non-Response Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#NonNormalityBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Non-Normality Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SimpsonsParadoxBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Simpson'S Paradox Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SamplingBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when data records are not collected randomly from the intended population" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Sampling Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataAggregationBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Aggregation Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO 20501:2019" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Statistical Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CoverageBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Coverage Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Bias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#GroupAttributionBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Group Attribution Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataProcessingBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Processing Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#", + "@type": [ + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" + } + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/creator": [ + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Rob Brennan" + } + ], + "http://purl.org/dc/terms/description": [ + { + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + } + ], + "http://purl.org/dc/terms/hasVersion": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/risk" + } + ], + "http://purl.org/dc/terms/issued": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/license": [ + { + "@id": "https://www.w3.org/copyright/document-license-2023/" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@language": "en", + "@value": "2024-08-18" + } + ], + "http://purl.org/dc/terms/publisher": [ + { + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@language": "en", + "@value": "Risk Concepts" + } + ], + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/published" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "risk" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ + { + "@language": "en", + "@value": "RISK" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Bias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/json-ld11/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ImplicitBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Implicit Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OutGroupHomogeneityBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Out-Group Homogeneity Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#InGroupBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "In-Group Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfirmationBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Confirmation Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfoundingVariablesBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Confounding Variables Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/turtle/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Societal Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RuleBasedSystemDesign", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Rule-Based System Design" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Bias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when humans are processing and interpreting information" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Cognitive Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RequirementsBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs in or during requirements creation" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Requirements Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Selection Bias" + } + ] + } +] \ No newline at end of file diff --git a/2.1-dev/risk/modules/bias-owl.n3 b/2.1-dev/risk/modules/bias-owl.n3 new file mode 100644 index 000000000..6e4b014c8 --- /dev/null +++ b/2.1-dev/risk/modules/bias-owl.n3 @@ -0,0 +1,382 @@ +@prefix bibo: . +@prefix dct: . +@prefix foaf: . +@prefix owl: . +@prefix profile: . +@prefix rdf: . +@prefix rdfs: . +@prefix risk-owl: . +@prefix role: . +@prefix schema: . +@prefix skos: . +@prefix sw: . +@prefix vann: . +@prefix xsd: . + +risk-owl:Bias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; + skos:prefLabel "Bias"@en . + +risk-owl:CognitiveBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; + skos:prefLabel "Cognitive Bias"@en . + +risk-owl:ConfirmationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; + skos:prefLabel "Confirmation Bias"@en . + +risk-owl:ConfoundingVariablesBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; + skos:prefLabel "Confounding Variables Bias"@en . + +risk-owl:CoverageBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; + skos:prefLabel "Coverage Bias"@en . + +risk-owl:DataAggregationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; + skos:prefLabel "Data Aggregation Bias"@en . + +risk-owl:DataBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; + skos:prefLabel "Data Bias"@en . + +risk-owl:DataProcessingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; + skos:prefLabel "Data Processing Bias"@en . + +risk-owl:GroupAttributionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; + skos:prefLabel "Group Attribution Bias"@en . + +risk-owl:ImplicitBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; + skos:prefLabel "Implicit Bias"@en . + +risk-owl:InGroupBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; + skos:prefLabel "In-Group Bias"@en . + +risk-owl:InformativenessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; + skos:prefLabel "Informativeness Bias"@en . + +risk-owl:NonNormalityBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; + skos:prefLabel "Non-Normality Bias"@en . + +risk-owl:NonResponseBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; + skos:prefLabel "Non-Response Bias"@en . + +risk-owl:OutGroupHomogeneityBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; + skos:prefLabel "Out-Group Homogeneity Bias"@en . + +risk-owl:RequirementsBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs in or during requirements creation"@en ; + skos:prefLabel "Requirements Bias"@en ; + skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . + +risk-owl:RuleBasedSystemDesign a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; + skos:prefLabel "Rule-Based System Design"@en ; + skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . + +risk-owl:SamplingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; + skos:prefLabel "Sampling Bias"@en . + +risk-owl:SelectionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; + skos:prefLabel "Selection Bias"@en . + +risk-owl:SimpsonsParadoxBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; + skos:prefLabel "Simpson'S Paradox Bias"@en . + +risk-owl:SocietalBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; + skos:prefLabel "Societal Bias"@en . + +risk-owl:StatisticalBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO 20501:2019"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; + skos:prefLabel "Statistical Bias"@en . + +risk-owl:serialisation-html a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - HTML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:specification . + +risk-owl:serialisation-jsonld a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - JSON-LD serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +risk-owl:serialisation-n3 a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - N3 serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +risk-owl:serialisation-rdf a profile:ResourceDescriptor ; + dct:conformsTo rdf: ; + dct:format ; + dct:title "Risk Concepts - RDF/XML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +risk-owl:serialisation-ttl a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - Turtle serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Examples for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Guides for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Primer for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + +risk-owl: a owl:Ontology, + profile:Profile ; + dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; + dct:conformsTo , + "http://www.w3.org/2000/01/rdf-schema", + "http://www.w3.org/2004/02/skos/core" ; + dct:contributor "Daniel Doherty" ; + dct:created "2022-08-14"@en ; + dct:creator "Beatriz Esteves"@en, + "Delaram Golpayegani"@en, + "Georg P. Krog"@en, + "Harshvardhan J. Pandit"@en, + "Julian Flake"@en, + "Paul Ryan"@en, + "Rob Brennan"@en ; + dct:description "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management"@en ; + dct:hasVersion risk-owl: ; + dct:identifier "https://w3id.org/dpv/risk" ; + dct:issued "2022-08-14"@en ; + dct:license ; + dct:modified "2024-08-18"@en ; + dct:publisher ; + dct:source ; + dct:title "Risk Concepts"@en ; + bibo:doi "10.5281/zenodo.12505841" ; + bibo:status "http://purl.org/ontology/bibo/status/published" ; + vann:preferredNamespacePrefix "risk" ; + vann:preferredNamespaceUri "https://w3id.org/dpv/risk#" ; + rdfs:Label "RISK"@en ; + owl:versionIRI ; + owl:versionInfo "2.1-dev" ; + profile:hasResource , + , + , + risk-owl:serialisation-html, + risk-owl:serialisation-jsonld, + risk-owl:serialisation-n3, + risk-owl:serialisation-rdf, + risk-owl:serialisation-ttl ; + profile:isProfileOf , + , + risk-owl: ; + foaf:logo ; + schema:version "2.1-dev" . + diff --git a/2.1-dev/risk/modules/bias-owl.rdf b/2.1-dev/risk/modules/bias-owl.rdf new file mode 100644 index 000000000..c3db9e9c1 --- /dev/null +++ b/2.1-dev/risk/modules/bias-owl.rdf @@ -0,0 +1,413 @@ + + + + Confirmation Bias + ISO/IEC 24027:2021 + + + + 2024-09-13 + + Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + accepted + Daniel Doherty + + + + + Risk Concepts - Turtle serialiation + + + + + + + + + + ISO/IEC 24027:2021 + + Group Attribution Bias + 2024-09-13 + Daniel Doherty + accepted + Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + + + + accepted + Daniel Doherty + + Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + Confounding Variables Bias + 2024-09-13 + + + + ISO/IEC 24027:2021 + + + + + + + + accepted + Bias that occurs when a human makes an association or assumption based on their mental models and memories + Daniel Doherty + 2024-09-13 + ISO/IEC 24027:2021 + Implicit Bias + + + + Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + + + + accepted + Daniel Doherty + 2024-09-13 + ISO/IEC 24027:2021 + Societal Bias + + + + + ISO/IEC 24027:2021 + + + + Daniel Doherty + accepted + + 2024-09-13 + Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + Data Processing Bias + + + + accepted + 2024-09-13 + Daniel Doherty + ISO/IEC 24027:2021 + + + + Bias that occurs when humans are processing and interpreting information + Cognitive Bias + + + + + + + + + Risk Concepts - N3 serialiation + + + + Daniel Doherty + accepted + + + + ISO/IEC 24027:2021 + Coverage Bias + Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + + 2024-09-13 + + + + + + + + + + + + + http://www.w3.org/2000/01/rdf-schema + + http://www.w3.org/2004/02/skos/core + 10.5281/zenodo.12505841 + 2.1-dev + + + + https://w3id.org/dpv/risk + 2.1-dev + RISK + Daniel Doherty + + Beatriz Esteves + Julian Flake + Paul Ryan + Delaram Golpayegani + Harshvardhan J. Pandit + Georg P. Krog + Rob Brennan + + https://w3id.org/dpv/risk# + + + + 2022-08-14 + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + Risk Concepts + + 2024-08-18 + risk + + http://purl.org/ontology/bibo/status/published + 2022-08-14 + + + 2024-09-13 + accepted + Daniel Doherty + + + + ISO/IEC 24027:2021 + Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + Non-Normality Bias + + + + + ISO/IEC 24027:2021 + + + + Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + Non-Response Bias + 2024-09-13 + + accepted + Daniel Doherty + + + + Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + 2024-09-13 + accepted + + + + Daniel Doherty + ISO/IEC 24027:2021 + Selection Bias + + + + + Sampling Bias + + + + + 2024-09-13 + accepted + Daniel Doherty + Bias that occurs when data records are not collected randomly from the intended population + ISO/IEC 24027:2021 + + + + + + + ISO/IEC 24027:2021 + Data Aggregation Bias + + 2024-09-13 + accepted + Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + Daniel Doherty + + + + Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + + + + ISO/IEC 24027:2021 + Out-Group Homogeneity Bias + Daniel Doherty + + 2024-09-13 + accepted + + + + + + + Daniel Doherty + ISO/IEC 24027:2021 + Simpson'S Paradox Bias + Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + 2024-09-13 + + accepted + + + + + + + + Risk Concepts - JSON-LD serialiation + + + + + + + Daniel Doherty + Rule-Based System Design + + 2024-09-13 + accepted + Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + ISO/IEC 24027:2021 + Rule based system design also potentially introduces various forms of human cognitive bias + + + + ISO/IEC 24027:2021 + + + + Bias + + 2024-09-13 + accepted + Daniel Doherty + Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + + + + Daniel Doherty + Statistical Bias + + + + ISO 20501:2019 + 2024-09-13 + + accepted + Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + + + + + + Risk Concepts - HTML serialiation + + + + + + + + + + + Guides for Data Privacy Vocabulary + + + + + + + Primer for Data Privacy Vocabulary + + + + Bias that occurs in or during requirements creation + + + + + Requirements Bias + accepted + Requirements bias also represents occasions for the human cognitive biases to manifest + Daniel Doherty + 2024-09-13 + ISO/IEC 24027:2021 + + + + + + + Examples for Data Privacy Vocabulary + + + + + + 2024-09-13 + Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + + + + Daniel Doherty + accepted + ISO/IEC 24027:2021 + Data Bias + + + + + + + In-Group Bias + ISO/IEC 24027:2021 + + 2024-09-13 + Bias that occurs when showing partiality to one's own group or own characteristics + Daniel Doherty + accepted + + + + + Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + 2024-09-13 + Daniel Doherty + accepted + Informativeness Bias + + + + ISO/IEC 24027:2021 + + + + + + Risk Concepts - RDF/XML serialiation + + + + + diff --git a/2.1-dev/risk/modules/bias-owl.ttl b/2.1-dev/risk/modules/bias-owl.ttl new file mode 100644 index 000000000..6e4b014c8 --- /dev/null +++ b/2.1-dev/risk/modules/bias-owl.ttl @@ -0,0 +1,382 @@ +@prefix bibo: . +@prefix dct: . +@prefix foaf: . +@prefix owl: . +@prefix profile: . +@prefix rdf: . +@prefix rdfs: . +@prefix risk-owl: . +@prefix role: . +@prefix schema: . +@prefix skos: . +@prefix sw: . +@prefix vann: . +@prefix xsd: . + +risk-owl:Bias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; + skos:prefLabel "Bias"@en . + +risk-owl:CognitiveBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; + skos:prefLabel "Cognitive Bias"@en . + +risk-owl:ConfirmationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; + skos:prefLabel "Confirmation Bias"@en . + +risk-owl:ConfoundingVariablesBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; + skos:prefLabel "Confounding Variables Bias"@en . + +risk-owl:CoverageBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; + skos:prefLabel "Coverage Bias"@en . + +risk-owl:DataAggregationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; + skos:prefLabel "Data Aggregation Bias"@en . + +risk-owl:DataBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; + skos:prefLabel "Data Bias"@en . + +risk-owl:DataProcessingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; + skos:prefLabel "Data Processing Bias"@en . + +risk-owl:GroupAttributionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; + skos:prefLabel "Group Attribution Bias"@en . + +risk-owl:ImplicitBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; + skos:prefLabel "Implicit Bias"@en . + +risk-owl:InGroupBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; + skos:prefLabel "In-Group Bias"@en . + +risk-owl:InformativenessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; + skos:prefLabel "Informativeness Bias"@en . + +risk-owl:NonNormalityBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; + skos:prefLabel "Non-Normality Bias"@en . + +risk-owl:NonResponseBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; + skos:prefLabel "Non-Response Bias"@en . + +risk-owl:OutGroupHomogeneityBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; + skos:prefLabel "Out-Group Homogeneity Bias"@en . + +risk-owl:RequirementsBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs in or during requirements creation"@en ; + skos:prefLabel "Requirements Bias"@en ; + skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . + +risk-owl:RuleBasedSystemDesign a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; + skos:prefLabel "Rule-Based System Design"@en ; + skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . + +risk-owl:SamplingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; + skos:prefLabel "Sampling Bias"@en . + +risk-owl:SelectionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; + skos:prefLabel "Selection Bias"@en . + +risk-owl:SimpsonsParadoxBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; + skos:prefLabel "Simpson'S Paradox Bias"@en . + +risk-owl:SocietalBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; + skos:prefLabel "Societal Bias"@en . + +risk-owl:StatisticalBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO 20501:2019"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; + skos:prefLabel "Statistical Bias"@en . + +risk-owl:serialisation-html a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - HTML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:specification . + +risk-owl:serialisation-jsonld a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - JSON-LD serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +risk-owl:serialisation-n3 a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - N3 serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +risk-owl:serialisation-rdf a profile:ResourceDescriptor ; + dct:conformsTo rdf: ; + dct:format ; + dct:title "Risk Concepts - RDF/XML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +risk-owl:serialisation-ttl a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - Turtle serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Examples for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Guides for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Primer for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + +risk-owl: a owl:Ontology, + profile:Profile ; + dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; + dct:conformsTo , + "http://www.w3.org/2000/01/rdf-schema", + "http://www.w3.org/2004/02/skos/core" ; + dct:contributor "Daniel Doherty" ; + dct:created "2022-08-14"@en ; + dct:creator "Beatriz Esteves"@en, + "Delaram Golpayegani"@en, + "Georg P. Krog"@en, + "Harshvardhan J. Pandit"@en, + "Julian Flake"@en, + "Paul Ryan"@en, + "Rob Brennan"@en ; + dct:description "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management"@en ; + dct:hasVersion risk-owl: ; + dct:identifier "https://w3id.org/dpv/risk" ; + dct:issued "2022-08-14"@en ; + dct:license ; + dct:modified "2024-08-18"@en ; + dct:publisher ; + dct:source ; + dct:title "Risk Concepts"@en ; + bibo:doi "10.5281/zenodo.12505841" ; + bibo:status "http://purl.org/ontology/bibo/status/published" ; + vann:preferredNamespacePrefix "risk" ; + vann:preferredNamespaceUri "https://w3id.org/dpv/risk#" ; + rdfs:Label "RISK"@en ; + owl:versionIRI ; + owl:versionInfo "2.1-dev" ; + profile:hasResource , + , + , + risk-owl:serialisation-html, + risk-owl:serialisation-jsonld, + risk-owl:serialisation-n3, + risk-owl:serialisation-rdf, + risk-owl:serialisation-ttl ; + profile:isProfileOf , + , + risk-owl: ; + foaf:logo ; + schema:version "2.1-dev" . + diff --git a/2.1-dev/risk/modules/bias.csv b/2.1-dev/risk/modules/bias.csv new file mode 100644 index 000000000..bb50af9b3 --- /dev/null +++ b/2.1-dev/risk/modules/bias.csv @@ -0,0 +1,23 @@ +term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,modified,vocab,namespace +Bias,class,https://w3id.org/dpv/risk#Bias,Bias,"Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#RiskConcept,,2024-09-13,,risk,https://w3id.org/dpv/risk +CognitiveBias,class,https://w3id.org/dpv/risk#CognitiveBias,Cognitive Bias,Bias that occurs when humans are processing and interpreting information,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk +ConfirmationBias,class,https://w3id.org/dpv/risk#ConfirmationBias,Confirmation Bias,"Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +ConfoundingVariablesBias,class,https://w3id.org/dpv/risk#ConfoundingVariablesBias,Confounding Variables Bias,Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +CoverageBias,class,https://w3id.org/dpv/risk#CoverageBias,Coverage Bias,Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DataAggregationBias,class,https://w3id.org/dpv/risk#DataAggregationBias,Data Aggregation Bias,Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DataBias,class,https://w3id.org/dpv/risk#DataBias,Data Bias,Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DataProcessingBias,class,https://w3id.org/dpv/risk#DataProcessingBias,Data Processing Bias,"Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +GroupAttributionBias,class,https://w3id.org/dpv/risk#GroupAttributionBias,Group Attribution Bias,"Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +ImplicitBias,class,https://w3id.org/dpv/risk#ImplicitBias,Implicit Bias,Bias that occurs when a human makes an association or assumption based on their mental models and memories,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +InGroupBias,class,https://w3id.org/dpv/risk#InGroupBias,In-Group Bias,Bias that occurs when showing partiality to one's own group or own characteristics,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +InformativenessBias,class,https://w3id.org/dpv/risk#InformativenessBias,Informativeness Bias,Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#EngineeringDecisionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +NonNormalityBias,class,https://w3id.org/dpv/risk#NonNormalityBias,Non-Normality Bias,"Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +NonResponseBias,class,https://w3id.org/dpv/risk#NonResponseBias,Non-Response Bias,Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +OutGroupHomogeneityBias,class,https://w3id.org/dpv/risk#OutGroupHomogeneityBias,Out-Group Homogeneity Bias,"Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +RequirementsBias,class,https://w3id.org/dpv/risk#RequirementsBias,Requirements Bias,Bias that occurs in or during requirements creation,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,Requirements bias also represents occasions for the human cognitive biases to manifest,2024-09-13,,risk,https://w3id.org/dpv/risk +RuleBasedSystemDesign,class,https://w3id.org/dpv/risk#RuleBasedSystemDesign,Rule-Based System Design,Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,Rule based system design also potentially introduces various forms of human cognitive bias,2024-09-13,,risk,https://w3id.org/dpv/risk +SamplingBias,class,https://w3id.org/dpv/risk#SamplingBias,Sampling Bias,Bias that occurs when data records are not collected randomly from the intended population,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SelectionBias,class,https://w3id.org/dpv/risk#SelectionBias,Selection Bias,Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SimpsonsParadoxBias,class,https://w3id.org/dpv/risk#SimpsonsParadoxBias,Simpson'S Paradox Bias,Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SocietalBias,class,https://w3id.org/dpv/risk#SocietalBias,Societal Bias,Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +StatisticalBias,class,https://w3id.org/dpv/risk#StatisticalBias,Statistical Bias,"Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/modules/bias.jsonld b/2.1-dev/risk/modules/bias.jsonld new file mode 100644 index 000000000..8a60f38b6 --- /dev/null +++ b/2.1-dev/risk/modules/bias.jsonld @@ -0,0 +1,1732 @@ +[ + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Primer for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/primer" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#OutGroupHomogeneityBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Out-Group Homogeneity Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SamplingBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SelectionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when data records are not collected randomly from the intended population" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Sampling Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when humans are processing and interpreting information" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Cognitive Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SelectionBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#StatisticalBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Selection Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/examples", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#GroupAttributionBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Group Attribution Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#bias-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/turtle/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/turtle" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - Turtle serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RequirementsBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs in or during requirements creation" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Requirements Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DataProcessingBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Processing Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#NonNormalityBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#StatisticalBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Non-Normality Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TeamSubmission/n3/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#InformativenessBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#EngineeringDecisionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Informativeness Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#NonResponseBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SelectionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Non-Response Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DataAggregationBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Aggregation Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ImplicitBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Implicit Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/json-ld11/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DataBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Bias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk", + "@type": [ + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" + } + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/creator": [ + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" + } + ], + "http://purl.org/dc/terms/description": [ + { + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + } + ], + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/risk" + } + ], + "http://purl.org/dc/terms/issued": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/license": [ + { + "@id": "https://www.w3.org/copyright/document-license-2023/" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@language": "en", + "@value": "2024-08-18" + } + ], + "http://purl.org/dc/terms/publisher": [ + { + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@language": "en", + "@value": "Risk Concepts" + } + ], + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/published" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "risk" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ + { + "@language": "en", + "@value": "RISK" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/risk" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SocietalBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Societal Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#InGroupBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "In-Group Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ConfoundingVariablesBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#StatisticalBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Confounding Variables Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RuleBasedSystemDesign", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Rule-Based System Design" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#CoverageBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SelectionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Coverage Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ConfirmationBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Confirmation Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SimpsonsParadoxBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Simpson'S Paradox Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#StatisticalBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO 20501:2019" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Statistical Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Bias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#bias-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Bias" + } + ] + } +] \ No newline at end of file diff --git a/2.1-dev/risk/modules/bias.n3 b/2.1-dev/risk/modules/bias.n3 new file mode 100644 index 000000000..8e0bde8af --- /dev/null +++ b/2.1-dev/risk/modules/bias.n3 @@ -0,0 +1,404 @@ +@prefix bibo: . +@prefix dct: . +@prefix foaf: . +@prefix owl: . +@prefix profile: . +@prefix rdf: . +@prefix rdfs: . +@prefix risk: . +@prefix role: . +@prefix schema: . +@prefix skos: . +@prefix sw: . +@prefix vann: . +@prefix xsd: . + +risk:Bias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RiskConcept ; + skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Bias"@en . + +risk:CognitiveBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Cognitive Bias"@en . + +risk:ConfirmationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Confirmation Bias"@en . + +risk:ConfoundingVariablesBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Confounding Variables Bias"@en . + +risk:CoverageBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Coverage Bias"@en . + +risk:DataAggregationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Data Aggregation Bias"@en . + +risk:DataBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Data Bias"@en . + +risk:DataProcessingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Data Processing Bias"@en . + +risk:GroupAttributionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Group Attribution Bias"@en . + +risk:ImplicitBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Implicit Bias"@en . + +risk:InGroupBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "In-Group Bias"@en . + +risk:InformativenessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:EngineeringDecisionBias ; + skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Informativeness Bias"@en . + +risk:NonNormalityBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Non-Normality Bias"@en . + +risk:NonResponseBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Non-Response Bias"@en . + +risk:OutGroupHomogeneityBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Out-Group Homogeneity Bias"@en . + +risk:RequirementsBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs in or during requirements creation"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Requirements Bias"@en ; + skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . + +risk:RuleBasedSystemDesign a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Rule-Based System Design"@en ; + skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . + +risk:SamplingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Sampling Bias"@en . + +risk:SelectionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Selection Bias"@en . + +risk:SimpsonsParadoxBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Simpson'S Paradox Bias"@en . + +risk:SocietalBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Societal Bias"@en . + +risk:StatisticalBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO 20501:2019"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Statistical Bias"@en . + + a owl:Ontology, + profile:Profile ; + dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; + dct:conformsTo "http://www.w3.org/2000/01/rdf-schema", + "http://www.w3.org/2004/02/skos/core" ; + dct:contributor "Daniel Doherty" ; + dct:created "2022-08-14"@en ; + dct:creator "Beatriz Esteves"@en, + "Delaram Golpayegani"@en, + "Georg P. Krog"@en, + "Harshvardhan J. Pandit"@en, + "Julian Flake"@en, + "Paul Ryan"@en, + "Rob Brennan"@en ; + dct:description "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management"@en ; + dct:identifier "https://w3id.org/dpv/risk" ; + dct:issued "2022-08-14"@en ; + dct:license ; + dct:modified "2024-08-18"@en ; + dct:publisher ; + dct:source ; + dct:title "Risk Concepts"@en ; + bibo:doi "10.5281/zenodo.12505841" ; + bibo:status "http://purl.org/ontology/bibo/status/published" ; + vann:preferredNamespacePrefix "risk" ; + vann:preferredNamespaceUri "https://w3id.org/dpv/risk#" ; + rdfs:Label "RISK"@en ; + owl:versionIRI ; + owl:versionInfo "2.1-dev" ; + profile:hasResource , + , + , + risk:serialisation-html, + risk:serialisation-jsonld, + risk:serialisation-n3, + risk:serialisation-rdf, + risk:serialisation-ttl ; + profile:isProfileOf rdfs:, + skos:, + ; + foaf:logo ; + schema:version "2.1-dev" . + +risk:serialisation-html a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - HTML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:specification . + +risk:serialisation-jsonld a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - JSON-LD serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +risk:serialisation-n3 a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - N3 serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +risk:serialisation-rdf a profile:ResourceDescriptor ; + dct:conformsTo rdf: ; + dct:format ; + dct:title "Risk Concepts - RDF/XML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +risk:serialisation-ttl a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - Turtle serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Examples for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Guides for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Primer for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + +risk:bias-classes a skos:ConceptScheme . + diff --git a/2.1-dev/risk/modules/bias.rdf b/2.1-dev/risk/modules/bias.rdf new file mode 100644 index 000000000..9f9d38289 --- /dev/null +++ b/2.1-dev/risk/modules/bias.rdf @@ -0,0 +1,436 @@ + + + + + + + Simpson'S Paradox Bias + Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Confounding Variables Bias + Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + + Risk Concepts + http://purl.org/ontology/bibo/status/published + RISK + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + 2022-08-14 + 2022-08-14 + 2024-08-18 + Harshvardhan J. Pandit + Georg P. Krog + Paul Ryan + Rob Brennan + Delaram Golpayegani + Beatriz Esteves + Julian Flake + 2.1-dev + 2.1-dev + https://w3id.org/dpv/risk + http://www.w3.org/2000/01/rdf-schema + http://www.w3.org/2004/02/skos/core + 10.5281/zenodo.12505841 + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + + + Daniel Doherty + + risk + https://w3id.org/dpv/risk# + + + + + + + + + + + + + + + + + Non-Normality Bias + Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + + + Risk Concepts - N3 serialiation + + + + + + Implicit Bias + Bias that occurs when a human makes an association or assumption based on their mental models and memories + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Selection Bias + Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Statistical Bias + Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + + ISO 20501:2019 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Confirmation Bias + Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Bias + Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Out-Group Homogeneity Bias + Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Rule-Based System Design + Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + + Rule based system design also potentially introduces various forms of human cognitive bias + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Societal Bias + Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Coverage Bias + Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Informativeness Bias + Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Data Processing Bias + Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + In-Group Bias + Bias that occurs when showing partiality to one's own group or own characteristics + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Non-Response Bias + Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Data Bias + Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Cognitive Bias + Bias that occurs when humans are processing and interpreting information + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Data Aggregation Bias + Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + + + Risk Concepts - Turtle serialiation + + + + + + Sampling Bias + Bias that occurs when data records are not collected randomly from the intended population + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Requirements Bias + Bias that occurs in or during requirements creation + + Requirements bias also represents occasions for the human cognitive biases to manifest + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + + + Risk Concepts - HTML serialiation + + + + + + Guides for Data Privacy Vocabulary + + + + + + + + Primer for Data Privacy Vocabulary + + + + + + + + Group Attribution Bias + Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + + + Risk Concepts - JSON-LD serialiation + + + + + + Examples for Data Privacy Vocabulary + + + + + + + + + + Risk Concepts - RDF/XML serialiation + + + + + diff --git a/2.1-dev/risk/modules/bias.ttl b/2.1-dev/risk/modules/bias.ttl new file mode 100644 index 000000000..8e0bde8af --- /dev/null +++ b/2.1-dev/risk/modules/bias.ttl @@ -0,0 +1,404 @@ +@prefix bibo: . +@prefix dct: . +@prefix foaf: . +@prefix owl: . +@prefix profile: . +@prefix rdf: . +@prefix rdfs: . +@prefix risk: . +@prefix role: . +@prefix schema: . +@prefix skos: . +@prefix sw: . +@prefix vann: . +@prefix xsd: . + +risk:Bias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RiskConcept ; + skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Bias"@en . + +risk:CognitiveBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Cognitive Bias"@en . + +risk:ConfirmationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Confirmation Bias"@en . + +risk:ConfoundingVariablesBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Confounding Variables Bias"@en . + +risk:CoverageBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Coverage Bias"@en . + +risk:DataAggregationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Data Aggregation Bias"@en . + +risk:DataBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Data Bias"@en . + +risk:DataProcessingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Data Processing Bias"@en . + +risk:GroupAttributionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Group Attribution Bias"@en . + +risk:ImplicitBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Implicit Bias"@en . + +risk:InGroupBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "In-Group Bias"@en . + +risk:InformativenessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:EngineeringDecisionBias ; + skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Informativeness Bias"@en . + +risk:NonNormalityBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Non-Normality Bias"@en . + +risk:NonResponseBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Non-Response Bias"@en . + +risk:OutGroupHomogeneityBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Out-Group Homogeneity Bias"@en . + +risk:RequirementsBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs in or during requirements creation"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Requirements Bias"@en ; + skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . + +risk:RuleBasedSystemDesign a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Rule-Based System Design"@en ; + skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . + +risk:SamplingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Sampling Bias"@en . + +risk:SelectionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Selection Bias"@en . + +risk:SimpsonsParadoxBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Simpson'S Paradox Bias"@en . + +risk:SocietalBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Societal Bias"@en . + +risk:StatisticalBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO 20501:2019"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Statistical Bias"@en . + + a owl:Ontology, + profile:Profile ; + dct:bibliographicCitation "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" ; + dct:conformsTo "http://www.w3.org/2000/01/rdf-schema", + "http://www.w3.org/2004/02/skos/core" ; + dct:contributor "Daniel Doherty" ; + dct:created "2022-08-14"@en ; + dct:creator "Beatriz Esteves"@en, + "Delaram Golpayegani"@en, + "Georg P. Krog"@en, + "Harshvardhan J. Pandit"@en, + "Julian Flake"@en, + "Paul Ryan"@en, + "Rob Brennan"@en ; + dct:description "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management"@en ; + dct:identifier "https://w3id.org/dpv/risk" ; + dct:issued "2022-08-14"@en ; + dct:license ; + dct:modified "2024-08-18"@en ; + dct:publisher ; + dct:source ; + dct:title "Risk Concepts"@en ; + bibo:doi "10.5281/zenodo.12505841" ; + bibo:status "http://purl.org/ontology/bibo/status/published" ; + vann:preferredNamespacePrefix "risk" ; + vann:preferredNamespaceUri "https://w3id.org/dpv/risk#" ; + rdfs:Label "RISK"@en ; + owl:versionIRI ; + owl:versionInfo "2.1-dev" ; + profile:hasResource , + , + , + risk:serialisation-html, + risk:serialisation-jsonld, + risk:serialisation-n3, + risk:serialisation-rdf, + risk:serialisation-ttl ; + profile:isProfileOf rdfs:, + skos:, + ; + foaf:logo ; + schema:version "2.1-dev" . + +risk:serialisation-html a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - HTML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:specification . + +risk:serialisation-jsonld a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - JSON-LD serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +risk:serialisation-n3 a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - N3 serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +risk:serialisation-rdf a profile:ResourceDescriptor ; + dct:conformsTo rdf: ; + dct:format ; + dct:title "Risk Concepts - RDF/XML serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + +risk:serialisation-ttl a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Risk Concepts - Turtle serialiation" ; + profile:hasArtifact ; + profile:hasRole role:vocabulary . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Examples for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Guides for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + + a profile:ResourceDescriptor ; + dct:conformsTo ; + dct:format ; + dct:title "Primer for Data Privacy Vocabulary" ; + profile:hasArtifact ; + profile:hasRole role:guidance . + +risk:bias-classes a skos:ConceptScheme . + diff --git a/2.1-dev/risk/risk-en.html b/2.1-dev/risk/risk-en.html index 4bef40b04..239452705 100644 --- a/2.1-dev/risk/risk-en.html +++ b/2.1-dev/risk/risk-en.html @@ -2099,6 +2099,117 @@

    Financial

    risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee go to full definition + +
+ + +
+

Bias

+

Note: These are intended to represent bias concepts in general e.g. applicable for any technology. The AI extension contains an additional set of concepts that extend these concepts to represent biases that are specific to the development and use of AI.

+
    +
  • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
      +
    • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition + +
    • +
    • + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition + +
    • +
    • + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition + +
    • +
    • + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition + +
    • +
    • + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition + +
    • +
    • + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition + +
    • +
    • + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition + +
    • +
    • + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition + +
    • +
    +
  • +
  • + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
      +
    • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition + +
    • +
    • + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition + +
    • +
    • + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
    • +
    • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition +
        +
      • + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition + +
      • +
      • + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition + +
      • +
      • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
          +
        • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition + +
        • +
        • + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition + +
        • +
        • + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition + +
        • +
        +
      • +
      +
    • +
@@ -3631,6 +3742,84 @@

Benefit

+
+

Bias

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermBiasPrefixrisk
LabelBias
IRIhttps://w3id.org/dpv/risk#Bias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskConcept +
DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +

Blackmail

@@ -4056,6 +4245,84 @@

Coercion

+
+

Cognitive Bias

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermCognitiveBiasPrefixrisk
LabelCognitive Bias
IRIhttps://w3id.org/dpv/risk#CognitiveBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:Bias + → risk:RiskConcept +
DefinitionBias that occurs when humans are processing and interpreting information
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + +

Compensation

@@ -4643,47 +4910,41 @@

Confidentiality Incident

-
-

Consequence Control

+
+

Confirmation Bias

- + - + - + - + - - - - - + @@ -4692,31 +4953,34 @@

Consequence Control

- + - + + + + - + - + - @@ -4725,47 +4989,42 @@

Consequence Control

-
-

Containment Control

+
+

Confounding Variables Bias

TermConsequenceControlConfirmationBias Prefix risk
LabelConsequence ControlConfirmation Bias
IRIhttps://w3id.org/dpv/risk#ConsequenceControlhttps://w3id.org/dpv/risk#ConfirmationBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionRisk Mitigation Measure that controls the ConsequencesBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information
Source
Date Created2024-05-192024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -4774,28 +5033,34 @@

Containment Control

- + - + + + + - + - + + + + - @@ -4804,40 +5069,47 @@

Containment Control

-
-

Copyright Violation

+
+

Consequence Control

TermContainmentControlConfoundingVariablesBias Prefix risk
LabelContainment ControlConfounding Variables Bias
IRIhttps://w3id.org/dpv/risk#ContainmentControlhttps://w3id.org/dpv/risk#ConfoundingVariablesBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl to contain eventBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - + + + + @@ -4846,28 +5118,22 @@

Copyright Violation

- + - - - - + - + - - - - + @@ -4876,52 +5142,54 @@

Copyright Violation

-
TermCopyrightViolationConsequenceControl Prefix risk
LabelCopyright ViolationConsequence Control
IRIhttps://w3id.org/dpv/risk#CopyrightViolationhttps://w3id.org/dpv/risk#ConsequenceControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Copyright ViolationRisk Mitigation Measure that controls the Consequences
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- - -
-

Cross-Border Incident

+ +
+

Containment Control

- + - + - + - + - - @@ -4932,7 +5200,7 @@

Cross-Border Incident

- + @@ -4953,7 +5221,7 @@

Cross-Border Incident

- @@ -4962,23 +5230,23 @@

Cross-Border Incident

-
-

Cryptojacking

+
+

Copyright Violation

TermCrossBorderIncidentContainmentControl Prefix risk
LabelCross-Border IncidentContainment Control
IRIhttps://w3id.org/dpv/risk#CrossBorderIncidenthttps://w3id.org/dpv/risk#ContainmentControl
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation risk:hasIncident + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionIncident involving cross-border or multiple jurisdictionsControl to contain event
See More: section INCIDENT in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -4990,10 +5258,7 @@

Cryptojacking

- - - @@ -5007,7 +5272,7 @@

Cryptojacking

- + @@ -5016,7 +5281,7 @@

Cryptojacking

- + @@ -5043,39 +5308,44 @@

Cryptojacking

TermCryptojackingCopyrightViolation Prefix risk
LabelCryptojackingCopyright Violation
IRIhttps://w3id.org/dpv/risk#Cryptojackinghttps://w3id.org/dpv/risk#CopyrightViolation
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ExternalSecurityThreat + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes CryptojackingSomething that acts as or causes Copyright Violation
SourceENISA Threat Landscape 2021ENISA Reference Incident Classification Taxonomy 2018
+ + -
-

Damage

+
+

Coverage Bias

- + - + - + - + - @@ -5088,34 +5358,34 @@

Damage

- + - + + + + - + - - - - + - + - @@ -5123,54 +5393,44 @@

Damage

- -
-

Data Breach

+
+

Cross-Border Incident

TermDamageCoverageBias Prefix risk
LabelDamageCoverage Bias
IRIhttps://w3id.org/dpv/risk#Damagehttps://w3id.org/dpv/risk#CoverageBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes DamageBias that occurs when a population represented in a dataset does not match the actual or real population that are being used
Source
Date Created2022-03-302024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - - - - - - - + + + + @@ -5179,40 +5439,28 @@

Data Breach

- + - - - - - - - + - + - - - - - - - - + + - @@ -5221,23 +5469,23 @@

Data Breach

-
-

Data Corruption

+
+

Cryptojacking

TermDataBreachCrossBorderIncident Prefix risk
LabelData BreachCross-Border Incident
IRIhttps://w3id.org/dpv/risk#DataBreachhttps://w3id.org/dpv/risk#CrossBorderIncident
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:SecurityBreach - → risk:AvailabilityConcept -
Broader/Parent types risk:SecurityBreach - → risk:ConfidentialityConcept -
Broader/Parent types risk:SecurityBreach - → risk:IntegrityConcept -
Broader/Parent types risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:Incidentdpv:RiskConcept
Object of relation risk:hasIncident +
DefinitionSomething that acts as or causes Data BreachIncident involving cross-border or multiple jurisdictions
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0071 :: Using risk controls to express how tech/org measures address the risk
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in DEX + section INCIDENT in RISK
- + - + - + @@ -5249,10 +5497,10 @@

Data Corruption

- - @@ -5266,19 +5514,16 @@

Data Corruption

- + - - - - + - + @@ -5307,44 +5552,41 @@

Data Corruption

-
-

Deliberate Incident

+ +
+

Damage

TermDataCorruptionCryptojacking Prefix risk
LabelData CorruptionCryptojacking
IRIhttps://w3id.org/dpv/risk#DataCorruptionhttps://w3id.org/dpv/risk#Cryptojacking
Broader/Parent types risk:IntegrityConcept + risk:AvailabilityConcept
Broader/Parent types risk:OperationalSecurityRisk + risk:ExternalSecurityThreatdpv:RiskConcept
DefinitionSomething that acts as or causes Corruption of DataSomething that acts as or causes Cryptojacking
Usage NoteThis concept was called "Corruption Data" in DPV 2.0
SourceISO/IEC 27005:2018ENISA Threat Landscape 2021
- + - + - + - + - - - - - + @@ -5353,7 +5595,7 @@

Deliberate Incident

- + @@ -5366,15 +5608,21 @@

Deliberate Incident

- + - - + + + + + + + + - @@ -5383,39 +5631,37 @@

Deliberate Incident

-
-

Denial of Service Attack (DoS)

+
+

Data Aggregation Bias

TermDeliberateIncidentDamage Prefix risk
LabelDeliberate IncidentDamage
IRIhttps://w3id.org/dpv/risk#DeliberateIncidenthttps://w3id.org/dpv/risk#Damage
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:Incident + risk:LegalRiskdpv:RiskConcept
Object of relation risk:hasIncident -
DefinitionIncident caused due to deliberate actions of a humanSomething that acts as or causes Damage
Date Created2024-05-192022-03-30
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - @@ -5428,7 +5674,7 @@

Denial of Service Attack (DoS)

- + @@ -5437,28 +5683,25 @@

Denial of Service Attack (DoS)

- + - + - - - - + - + - @@ -5467,47 +5710,40 @@

Denial of Service Attack (DoS)

-
-

Detection Control

+
+

Data Bias

TermDenialServiceAttackDataAggregationBias Prefix risk
LabelDenial of Service Attack (DoS)Data Aggregation Bias
IRIhttps://w3id.org/dpv/risk#DenialServiceAttackhttps://w3id.org/dpv/risk#DataAggregationBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Denial of Service Attack (DoS)Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -5516,28 +5752,34 @@

Detection Control

- + - + + + + - + - + + + + - @@ -5546,23 +5788,23 @@

Detection Control

-
-

Detriment

+
+

Data Breach

TermDetectionControlDataBias Prefix risk
LabelDetection ControlData Bias
IRIhttps://w3id.org/dpv/risk#DetectionControlhttps://w3id.org/dpv/risk#DataBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl to detect eventBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + @@ -5574,7 +5816,20 @@

Detriment

- + + + + + + @@ -5588,20 +5843,26 @@

Detriment

- + + + + - + + + + - + @@ -5609,13 +5870,13 @@

Detriment

- + - @@ -5624,23 +5885,23 @@

Detriment

-
-

Discrimination

+
+

Data Corruption

TermDetrimentDataBreach Prefix risk
LabelDetrimentData Breach
IRIhttps://w3id.org/dpv/risk#Detrimenthttps://w3id.org/dpv/risk#DataBreach
Broader/Parent types risk:LegalRisk + risk:SecurityBreach + → risk:AvailabilityConcept +
Broader/Parent types risk:SecurityBreach + → risk:ConfidentialityConcept +
Broader/Parent types risk:SecurityBreach + → risk:IntegrityConcept +
Broader/Parent types risk:SecurityBreach + → risk:OperationalSecurityRiskdpv:RiskConcept
DefinitionSomething that acts as or causes DetrimentSomething that acts as or causes Data Breach
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0071 :: Using risk controls to express how tech/org measures address the risk
SourceISO/IEC 27005:2018
Date Created2022-03-232022-08-17
Date Modified
ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz EstevesHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONSEQUENCES in DEX
- + - + - + @@ -5652,7 +5913,10 @@

Discrimination

- + + @@ -5666,20 +5930,26 @@

Discrimination

- + - + + + + - + + + + - + @@ -5687,7 +5957,7 @@

Discrimination

- + @@ -5702,39 +5972,37 @@

Discrimination

-
-

Distributed Denial of Service Attack (DDoS)

+
+

Data Processing Bias

TermDiscriminationDataCorruption Prefix risk
LabelDiscriminationData Corruption
IRIhttps://w3id.org/dpv/risk#Discriminationhttps://w3id.org/dpv/risk#DataCorruption
Broader/Parent types risk:SocietalRisk + risk:IntegrityConcept +
Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept
DefinitionSomething that acts as or causes DiscriminationSomething that acts as or causes Corruption of Data
Usage NoteThis concept was called "Corruption Data" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2022-08-192022-08-17
Date Modified
ContributorsGeorg P. KrogHarshvardhan J. Pandit
- + - + - + - + - - - @@ -5747,7 +6015,7 @@

Distributed Denial of Service Attack (DDoS)

- + @@ -5756,28 +6024,25 @@

Distributed Denial of Service Attack (DDoS)

- + - + - - - - + - + - @@ -5785,23 +6050,23 @@

Distributed Denial of Service Attack (DDoS)

-
-

Environmental Incident

+
+

Deliberate Incident

TermDistributedDenialServiceAttackDataProcessingBias Prefix risk
LabelDistributed Denial of Service Attack (DDoS)Data Processing Bias
IRIhttps://w3id.org/dpv/risk#DistributedDenialServiceAttackhttps://w3id.org/dpv/risk#DataProcessingBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Distributed Denial of Service Attack (DDoS)Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + @@ -5831,7 +6096,7 @@

Environmental Incident

- + @@ -5861,23 +6126,23 @@

Environmental Incident

-
-

Environmental Risk

+
+

Denial of Service Attack (DoS)

TermEnvironmentalIncidentDeliberateIncident Prefix risk
LabelEnvironmental IncidentDeliberate Incident
IRIhttps://w3id.org/dpv/risk#EnvironmentalIncidenthttps://w3id.org/dpv/risk#DeliberateIncident
DefinitionIncident caused due to environmental factors outside human controlsIncident caused due to deliberate actions of a human
- + - + - + @@ -5889,7 +6154,11 @@

Environmental Risk

- + + @@ -5902,20 +6171,32 @@

Environmental Risk

- + - + + + + - - - + + + + + + + + + + + + @@ -5929,43 +6210,47 @@

Environmental Risk

-
-

Equipment Failure

+
+

Detection Control

TermEnvironmentalRiskDenialServiceAttack Prefix risk
LabelEnvironmental RiskDenial of Service Attack (DoS)
IRIhttps://w3id.org/dpv/risk#EnvironmentalRiskhttps://w3id.org/dpv/risk#DenialServiceAttack
Broader/Parent types dpv:RiskConcept + risk:AvailabilityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
DefinitionRisks and issues that have their origin in environment or can affect the environment at largeSomething that acts as or causes Denial of Service Attack (DoS)
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - + + + + @@ -5974,40 +6259,28 @@

Equipment Failure

- + - - - - + - - - - + - + - - - - - - - - + + - @@ -6016,23 +6289,23 @@

Equipment Failure

-
-

Equipment Malfunction

+
+

Detriment

TermEquipmentFailureDetectionControl Prefix risk
LabelEquipment FailureDetection Control
IRIhttps://w3id.org/dpv/risk#EquipmentFailurehttps://w3id.org/dpv/risk#DetectionControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Equipment FailureControl to detect event
Usage NoteHere equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -6044,10 +6317,7 @@

Equipment Malfunction

- - - @@ -6061,26 +6331,20 @@

Equipment Malfunction

- + - - - - + - - - - + - + @@ -6088,7 +6352,7 @@

Equipment Malfunction

- + @@ -6103,23 +6367,23 @@

Equipment Malfunction

-
-

Erroneous System Use

+
+

Discrimination

TermEquipmentMalfunctionDetriment Prefix risk
LabelEquipment MalfunctionDetriment
IRIhttps://w3id.org/dpv/risk#EquipmentMalfunctionhttps://w3id.org/dpv/risk#Detriment
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:OperationalSecurityRisk + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Equipment MalfunctionSomething that acts as or causes Detriment
Usage NoteHere equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-172022-03-23
Date Modified
ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
- + - + - + @@ -6131,7 +6395,7 @@

Erroneous System Use

- @@ -6145,23 +6409,20 @@

Erroneous System Use

- + - - - - + - + @@ -6169,7 +6430,7 @@

Erroneous System Use

- + @@ -6184,25 +6445,23 @@

Erroneous System Use

- - -
-

Exposure to Harmful Speech

+
+

Distributed Denial of Service Attack (DDoS)

TermErroneousSystemUseDiscrimination Prefix risk
LabelErroneous System UseDiscrimination
IRIhttps://w3id.org/dpv/risk#ErroneousSystemUsehttps://w3id.org/dpv/risk#Discrimination
Broader/Parent types risk:UserRisks + risk:SocietalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Erroneous System UseSomething that acts as or causes Discrimination
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-19
Date Modified
ContributorsHarshvardhan J. PanditGeorg P. Krog
- + - + - + @@ -6214,7 +6473,10 @@

Exposure to Harmful Speech

- + + @@ -6228,19 +6490,16 @@

Exposure to Harmful Speech

- + - - - - + - + @@ -6269,40 +6528,44 @@

Exposure to Harmful Speech

- -
-

External Security Threat

+
+

Environmental Incident

TermExposureToHarmfulSpeechDistributedDenialServiceAttack Prefix risk
LabelExposure to Harmful SpeechDistributed Denial of Service Attack (DDoS)
IRIhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeechhttps://w3id.org/dpv/risk#DistributedDenialServiceAttack
Broader/Parent types risk:SocietalRisk + risk:AvailabilityConcept +
Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept
DefinitionSomething that acts as or causes Harmful SpeechSomething that acts as or causes Distributed Denial of Service Attack (DDoS)
Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
- + - + - + - + - - + + + + @@ -6311,7 +6574,7 @@

External Security Threat

- + @@ -6322,14 +6585,17 @@

External Security Threat

- + + + + - @@ -6338,23 +6604,23 @@

External Security Threat

-
-

Extorsion

+
+

Environmental Risk

TermExternalSecurityThreatEnvironmentalIncident Prefix risk
LabelExternal Security ThreatEnvironmental Incident
IRIhttps://w3id.org/dpv/risk#ExternalSecurityThreathttps://w3id.org/dpv/risk#EnvironmentalIncident
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types dpv:RiskConcept + risk:Incident + → dpv:RiskConcept
Object of relation risk:hasIncident +
DefinitionConcepts associated with security threats that are likely to originate externallyIncident caused due to environmental factors outside human controls
Date Created2024-05-19
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + @@ -6366,11 +6632,7 @@

Extorsion

- - - @@ -6383,32 +6645,20 @@

Extorsion

- + - - - - + - - - - - - - - - - - - + + + @@ -6422,44 +6672,43 @@

Extorsion

-
-

Extremely High Likelihood

+
+

Equipment Failure

TermExtorsionEnvironmentalRisk Prefix risk
LabelExtorsionEnvironmental Risk
IRIhttps://w3id.org/dpv/risk#Extorsionhttps://w3id.org/dpv/risk#EnvironmentalRisk
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + dpv:RiskConcept
DefinitionSomething that acts as or causes ExtorsionRisks and issues that have their origin in environment or can affect the environment at large
SourceENISA Threat Taxonomy 2016
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - + + - - - - + @@ -6468,25 +6717,31 @@

Extremely High Likelihood

- + - + - + + + + - + - + + + + @@ -6495,7 +6750,7 @@

Extremely High Likelihood

- @@ -6504,44 +6759,43 @@

Extremely High Likelihood

-
-

Extremely High Risk

+
+

Equipment Malfunction

TermExtremelyHighLikelihoodEquipmentFailure Prefix risk
LabelExtremely High LikelihoodEquipment Failure
IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihoodhttps://w3id.org/dpv/risk#EquipmentFailure
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:AvailabilityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasLikelihood -
DefinitionLevel where Likelihood is Extremely HighSomething that acts as or causes Equipment Failure
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - - - - + @@ -6550,25 +6804,31 @@

Extremely High Risk

- + - + - + + + + - + - + + + + @@ -6577,7 +6837,7 @@

Extremely High Risk

- @@ -6586,44 +6846,40 @@

Extremely High Risk

-
-

Extremely High Severity

+
+

Erroneous System Use

TermExtremelyHighRiskEquipmentMalfunction Prefix risk
LabelExtremely High RiskEquipment Malfunction
IRIhttps://w3id.org/dpv/risk#ExtremelyHighRiskhttps://w3id.org/dpv/risk#EquipmentMalfunction
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:AvailabilityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasRiskLevel -
DefinitionLevel where Risk is Extremely HighSomething that acts as or causes Equipment Malfunction
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -6632,25 +6888,28 @@

Extremely High Severity

- + - - - - + - + + + + - + - + + + + @@ -6659,7 +6918,7 @@

Extremely High Severity

- @@ -6668,23 +6927,261 @@

Extremely High Severity

-
-

Extremely Low Likelihood

+ + +
+

Exposure to Harmful Speech

TermExtremelyHighSeverityErroneousSystemUse Prefix risk
LabelExtremely High SeverityErroneous System Use
IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverityhttps://w3id.org/dpv/risk#ErroneousSystemUse
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:UserRisks + → dpv:RiskConcept
Object of relation dpv:hasSeverity -
DefinitionLevel where Severity is Extremely HighSomething that acts as or causes Erroneous System Use
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowLikelihoodExposureToHarmfulSpeech Prefix risk
LabelExtremely Low LikelihoodExposure to Harmful Speech
IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihoodhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeech
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Harmful Speech
Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

External Security Threat

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExternalSecurityThreatPrefixrisk
LabelExternal Security Threat
IRIhttps://w3id.org/dpv/risk#ExternalSecurityThreat
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept +
DefinitionConcepts associated with security threats that are likely to originate externally
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Extorsion

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtorsionPrefixrisk
LabelExtorsion
IRIhttps://w3id.org/dpv/risk#Extorsion
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Extorsion
SourceENISA Threat Taxonomy 2016
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Extremely High Likelihood

+ + + + + + + + + + + + + + + @@ -6714,11 +7211,11 @@

Extremely Low Likelihood

- + - + @@ -6750,42 +7247,1372 @@

Extremely Low Likelihood

-
-

Extremely Low Risk

+
+

Extremely High Risk

TermExtremelyHighLikelihoodPrefixrisk
LabelExtremely High Likelihood
IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihood
DefinitionLevel where Likelihood is Extremely LowLevel where Likelihood is Extremely High
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
- + - + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowRiskExtremelyHighRisk Prefix risk
LabelExtremely Low RiskExtremely High Risk
IRIhttps://w3id.org/dpv/risk#ExtremelyLowRiskhttps://w3id.org/dpv/risk#ExtremelyHighRisk
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
Object of relation dpv:hasRiskLevel +
DefinitionLevel where Risk is Extremely High
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely High Severity

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyHighSeverityPrefixrisk
LabelExtremely High Severity
IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverity
Typerdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:7SeverityLevels + → dpv:Severity +
Object of relation dpv:hasSeverity +
DefinitionLevel where Severity is Extremely High
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely Low Likelihood

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowLikelihoodPrefixrisk
LabelExtremely Low Likelihood
IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihood
Typerdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood +
Object of relation dpv:hasLikelihood +
DefinitionLevel where Likelihood is Extremely Low
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely Low Risk

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowRiskPrefixrisk
LabelExtremely Low Risk
IRIhttps://w3id.org/dpv/risk#ExtremelyLowRisk
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
Object of relation dpv:hasRiskLevel +
DefinitionLevel where Risk is Extremely Low
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely Low Severity

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowSeverityPrefixrisk
LabelExtremely Low Severity
IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverity
Typerdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:7SeverityLevels + → dpv:Severity +
Object of relation dpv:hasSeverity +
DefinitionLevel where Severity is Extremely Low
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Fee

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFeePrefixrisk
LabelFee
IRIhttps://w3id.org/dpv/risk#Fee
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:FinancialImpact + → dpv:RiskConcept +
DefinitionSomething that acts as or provides fees e.g. for using a service
Source
Date Created2024-04-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Financial Impact

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFinancialImpactPrefixrisk
LabelFinancial Impact
IRIhttps://w3id.org/dpv/risk#FinancialImpact
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept +
DefinitionThings that cause or have the potential to impact financial resources
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Financial Loss

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFinancialLossPrefixrisk
LabelFinancial Loss
IRIhttps://w3id.org/dpv/risk#FinancialLoss
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:FinancialImpact + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Fraud

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFraudPrefixrisk
LabelFraud
IRIhttps://w3id.org/dpv/risk#Fraud
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Fraud
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Group Attribution Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermGroupAttributionBiasPrefixrisk
LabelGroup Attribution Bias
IRIhttps://w3id.org/dpv/risk#GroupAttributionBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:CognitiveBias + → risk:Bias + → risk:RiskConcept +
DefinitionBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in RISK +
+
+ + + +
+

Halt Source

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHaltSourcePrefixrisk
LabelHalt Source
IRIhttps://w3id.org/dpv/risk#HaltSource
Typerdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionControl that halts the risk source or prevents it from materialising
Date Created2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK +
+
+ + + +
+

Harm

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHarmPrefixrisk
LabelHarm
IRIhttps://w3id.org/dpv/risk#Harm
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IndividualRisk +
DefinitionSomething that acts as or causes Harm to humans
Usage NoteThis concept refers to the general abstract notion of harm
Date Created2022-08-13
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + + + + + + + + + + + +
+

High Likelihood

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHighLikelihoodPrefixrisk
LabelHigh Likelihood
IRIhttps://w3id.org/dpv/risk#HighLikelihood
Typerdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:3LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood +
Object of relation dpv:hasLikelihood +
DefinitionLevel where Likelihood is High
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

High Risk

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHighRiskPrefixrisk
LabelHigh Risk
IRIhttps://w3id.org/dpv/risk#HighRisk
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:3RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
Object of relation dpv:hasRiskLevel +
DefinitionLevel where Risk is High
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

High Severity

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHighSeverityPrefixrisk
LabelHigh Severity
IRIhttps://w3id.org/dpv/risk#HighSeverity
Typerdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:3SeverityLevels + → dpv:Severity +
Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
Broader/Parent types risk:7SeverityLevels + → dpv:Severity +
Object of relation dpv:hasSeverity +
DefinitionLevel where Severity is High
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Human Errors

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHumanErrorsPrefixrisk
LabelHuman Errors
IRIhttps://w3id.org/dpv/risk#HumanErrors
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:UserRisks + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Human Errors
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Identification Control

+ + + + + + + + + + + + + + + - + - - @@ -6796,12 +8623,9 @@

Extremely Low Risk

- + - - - - + @@ -6812,18 +8636,15 @@

Extremely Low Risk

- + - - - - + - @@ -6832,44 +8653,43 @@

Extremely Low Risk

-
-

Extremely Low Severity

+
+

Identity Fraud

TermIdentificationControlPrefixrisk
LabelIdentification Control
IRIhttps://w3id.org/dpv/risk#IdentificationControl
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasRiskLevel + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Risk is Extremely LowControl to identify characteristics of event
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-182024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - + + - - - - + @@ -6878,25 +8698,28 @@

Extremely Low Severity

- + - - - - + - + + + + - + - + + + + @@ -6905,7 +8728,7 @@

Extremely Low Severity

- @@ -6914,23 +8737,23 @@

Extremely Low Severity

-
-

Fee

+
+

Identity Theft

TermExtremelyLowSeverityIdentityFraud Prefix risk
LabelExtremely Low SeverityIdentity Fraud
IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverityhttps://w3id.org/dpv/risk#IdentityFraud
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:ConfidentialityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasSeverity -
DefinitionLevel where Severity is Extremely LowSomething that acts as or causes Identity Fraud
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
SourceENISA Threat Taxonomy 2016
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -6942,7 +8765,10 @@

Fee

- + + @@ -6956,7 +8782,7 @@

Fee

- + @@ -6965,14 +8791,14 @@

Fee

- + - + @@ -6980,7 +8806,7 @@

Fee

- + @@ -6995,23 +8821,23 @@

Fee

-
-

Financial Impact

+
+

Illegal Data Processing

TermFeeIdentityTheft Prefix risk
LabelFeeIdentity Theft
IRIhttps://w3id.org/dpv/risk#Feehttps://w3id.org/dpv/risk#IdentityTheft
Broader/Parent types risk:FinancialImpact + risk:ConfidentialityConcept +
Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept
DefinitionSomething that acts as or provides fees e.g. for using a serviceSomething that acts as or causes Identity Theft
SourceENISA Threat Taxonomy 2016
Date Created2024-04-142022-08-17
Date Modified
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
- + - + - + @@ -7023,7 +8849,8 @@

Financial Impact

- @@ -7036,20 +8863,35 @@

Financial Impact

- + - + + + + - + + + + - - - + + + + + + + + + + + + @@ -7063,40 +8905,47 @@

Financial Impact

-
-

Financial Loss

+
+

Impact Control

TermFinancialImpactIllegalDataProcessing Prefix risk
LabelFinancial ImpactIllegal Data Processing
IRIhttps://w3id.org/dpv/risk#FinancialImpacthttps://w3id.org/dpv/risk#IllegalDataProcessing
Broader/Parent types dpv:RiskConcept + risk:LegalRisk + → dpv:RiskConcept
DefinitionThings that cause or have the potential to impact financial resourcesSomething that acts as or causes Illegal Processing of Data
Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - + + + + @@ -7105,28 +8954,22 @@

Financial Loss

- + - - - - + - + - - - - + @@ -7135,7 +8978,7 @@

Financial Loss

- @@ -7144,39 +8987,37 @@

Financial Loss

-
-

Fraud

+
+

Implicit Bias

TermFinancialLossImpactControl Prefix risk
LabelFinancial LossImpact Control
IRIhttps://w3id.org/dpv/risk#FinancialLosshttps://w3id.org/dpv/risk#ImpactControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunityRisk Mitigation Measure that controls Impacts
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - @@ -7189,7 +9030,7 @@

Fraud

- + @@ -7198,28 +9039,25 @@

Fraud

- + - + - - - - + - + - @@ -7227,47 +9065,41 @@

Fraud

- -
-

Halt Source

+
+

Incident

TermFraudImplicitBias Prefix risk
LabelFraudImplicit Bias
IRIhttps://w3id.org/dpv/risk#Fraudhttps://w3id.org/dpv/risk#ImplicitBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes FraudBias that occurs when a human makes an association or assumption based on their mental models and memories
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - @@ -7278,10 +9110,16 @@

Halt Source

- + + + + + - + + + @@ -7291,59 +9129,73 @@

Halt Source

- + - + + + + - + -
TermHaltSourceIncident Prefix risk
LabelHalt SourceIncident
IRIhttps://w3id.org/dpv/risk#HaltSourcehttps://w3id.org/dpv/risk#Incident
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasIncident
DefinitionControl that halts the risk source or prevents it from materialisingAn actual or occured event
Usage NoteIncident is realised or materialised risk
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0070 :: Indicating personal data involved in an incident
Date Created2024-05-192024-02-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
See More: section RISK-CONTROLS in RISK + section CORE in DEX + , section INCIDENT in DEX
+ + - -
-

Harm

+
+

Incident Assessment Report

- + - + - + - + - - + + + + @@ -7352,12 +9204,9 @@

Harm

- + - - - - + @@ -7368,21 +9217,15 @@

Harm

- + - - - - - - - - + + - @@ -7391,60 +9234,44 @@

Harm

- - - - - - - - - - -
-

High Likelihood

+
+

Incident Concluded

TermHarmIncidentAssessmentReport Prefix risk
LabelHarmIncident Assessment Report
IRIhttps://w3id.org/dpv/risk#Harmhttps://w3id.org/dpv/risk#IncidentAssessmentReport
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:IndividualRisk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
DefinitionSomething that acts as or causes Harm to humansA report describing the assessment of an incident in terms of its effects or impacts
Usage NoteThis concept refers to the general abstract notion of harm
Date Created2022-08-132024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + - + - - - - - - @@ -7455,12 +9282,9 @@

High Likelihood

- + - - - - + @@ -7471,7 +9295,7 @@

High Likelihood

- + @@ -7482,7 +9306,7 @@

High Likelihood

- @@ -7490,51 +9314,46 @@

High Likelihood

- -
-

High Risk

+
+

Incident Concluding Report

TermHighLikelihoodIncidentConcluded Prefix risk
LabelHigh LikelihoodIncident Concluded
IRIhttps://w3id.org/dpv/risk#HighLikelihoodhttps://w3id.org/dpv/risk#IncidentConcluded
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasLikelihood + dpv:hasContext, + dpv:hasStatus
DefinitionLevel where Likelihood is HighThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-182024-02-14
See More: section RISK-LEVELS in RISK + section INCIDENT-STATUS in RISK
- + - + - + - + - - - - - - @@ -7545,12 +9364,9 @@

High Risk

- + - - - - + @@ -7561,18 +9377,15 @@

High Risk

- + - - - - + - @@ -7580,51 +9393,46 @@

High Risk

- -
-

High Severity

+
+

Incident Detection Report

TermHighRiskIncidentConcludingReport Prefix risk
LabelHigh RiskIncident Concluding Report
IRIhttps://w3id.org/dpv/risk#HighRiskhttps://w3id.org/dpv/risk#IncidentConcludingReport
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasRiskLevel + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionLevel where Risk is HighA report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-182024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
- + - + - + - + - - - - - - @@ -7635,12 +9443,9 @@

High Severity

- + - - - - + @@ -7651,18 +9456,15 @@

High Severity

- + - - - - + - @@ -7671,40 +9473,46 @@

High Severity

-
-

Human Errors

+
+

Incident Halted

TermHighSeverityIncidentDetectionReport Prefix risk
LabelHigh SeverityIncident Detection Report
IRIhttps://w3id.org/dpv/risk#HighSeverityhttps://w3id.org/dpv/risk#IncidentDetectionReport
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasSeverity + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionLevel where Severity is HighA report describing the detection of a Incident
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-182024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
- + - + - + - + - - + + + + @@ -7713,28 +9521,22 @@

Human Errors

- + - - - - + - + - - - - + @@ -7743,7 +9545,7 @@

Human Errors

- @@ -7751,46 +9553,46 @@

Human Errors

- -
-

Identification Control

+
+

Incident Handling Report

TermHumanErrorsIncidentHalted Prefix risk
LabelHuman ErrorsIncident Halted
IRIhttps://w3id.org/dpv/risk#HumanErrorshttps://w3id.org/dpv/risk#IncidentHalted
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types risk:UserRisks - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasContext, + dpv:hasStatus +
DefinitionSomething that acts as or causes Human ErrorsThe incident has halted or paused with a high likelihood of resuming or recurring
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-02-14
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
- + - + - + - + - - @@ -7801,7 +9603,7 @@

Identification Control

- + @@ -7822,7 +9624,7 @@

Identification Control

- @@ -7830,41 +9632,33 @@

Identification Control

- -
-

Identity Fraud

+
+

Incident Identifier

TermIdentificationControlIncidentHandlingReport Prefix risk
LabelIdentification ControlIncident Handling Report
IRIhttps://w3id.org/dpv/risk#IdentificationControlhttps://w3id.org/dpv/risk#IncidentHandlingReport
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionControl to identify characteristics of eventA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
- + - + - + - + - - - - - + @@ -7876,37 +9670,28 @@

Identity Fraud

- + - - - - + - + - - - - - - - - + + - @@ -7914,44 +9699,51 @@

Identity Fraud

- -
-

Identity Theft

+
+

Incident Impact Assessment

TermIdentityFraudIncidentIdentifier Prefix risk
LabelIdentity FraudIncident Identifier
IRIhttps://w3id.org/dpv/risk#IdentityFraudhttps://w3id.org/dpv/risk#IncidentIdentifier
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Identity FraudIdentifier associated with an incident
SourceENISA Threat Taxonomy 2016
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + - + - - - - + + + + @@ -7960,28 +9752,22 @@

Identity Theft

- + - - - - + - + - - - - + @@ -7990,7 +9776,7 @@

Identity Theft

- @@ -7999,40 +9785,46 @@

Identity Theft

-
-

Illegal Data Processing

+
+

Incident Mitigated

TermIdentityTheftIncidentImpactAssessment Prefix risk
LabelIdentity TheftIncident Impact Assessment
IRIhttps://w3id.org/dpv/risk#IdentityThefthttps://w3id.org/dpv/risk#IncidentImpactAssessment
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:ImpactAssessment + → dpv:RiskAssessment + → dpv:Assessment + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasAssessment, + dpv:hasImpactAssessment, + dpv:hasOrganisationalMeasure, + dpv:hasRiskAssessment, + dpv:hasTechnicalOrganisationalMeasure +
DefinitionSomething that acts as or causes Identity TheftAn impact assessment associated with a incident
SourceENISA Threat Taxonomy 2016
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + - + - - + + + + @@ -8041,31 +9833,22 @@

Illegal Data Processing

- + - - - - + - - - - + - + - - - - + @@ -8074,7 +9857,7 @@

Illegal Data Processing

- @@ -8082,37 +9865,35 @@

Illegal Data Processing

- -
-

Impact Control

+
+

Incident Mitigation Measure

TermIllegalDataProcessingIncidentMitigated Prefix risk
LabelIllegal Data ProcessingIncident Mitigated
IRIhttps://w3id.org/dpv/risk#IllegalDataProcessinghttps://w3id.org/dpv/risk#IncidentMitigated
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasContext, + dpv:hasStatus +
DefinitionSomething that acts as or causes Illegal Processing of DataThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2022-08-172024-02-14
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
- + - + - + - + - @@ -8120,8 +9901,7 @@

Impact Control

@@ -8132,7 +9912,7 @@

Impact Control

- + @@ -8148,15 +9928,12 @@

Impact Control

- - - - + - @@ -8164,41 +9941,45 @@

Impact Control

-
-

Incident

+ +
+

Incident Near Miss

TermImpactControlIncidentMitigationMeasure Prefix risk
LabelImpact ControlIncident Mitigation Measure
IRIhttps://w3id.org/dpv/risk#ImpactControlhttps://w3id.org/dpv/risk#IncidentMitigationMeasure
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure + dpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:isMitigatedByMeasure
DefinitionRisk Mitigation Measure that controls ImpactsA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
- + - + - + - + - - @@ -8209,16 +9990,10 @@

Incident

- + - - - - - - - + @@ -8228,48 +10003,42 @@

Incident

- + - - - - + - + -
TermIncidentIncidentNearMiss Prefix risk
LabelIncidentIncident Near Miss
IRIhttps://w3id.org/dpv/risk#Incidenthttps://w3id.org/dpv/risk#IncidentNearMiss
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation risk:hasIncident + dpv:hasContext, + dpv:hasStatus
DefinitionAn actual or occured eventThe state where an incident was almost successful in taking place i.e. "it came very close"
Usage NoteIncident is realised or materialised risk
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0070 :: Indicating personal data involved in an incident
Date Created2024-05-192024-02-14
Date Modified2024-08-16
ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio FernandezHarshvardhan J. Pandit
See More: section CORE in DEX - , section INCIDENT in DEX + section INCIDENT-STATUS in RISK
- - -
-

Incident Assessment Report

+
+

Incident Notice

- + - + - + @@ -8281,8 +10050,7 @@

Incident Assessment Report

- @@ -8290,8 +10058,8 @@

Incident Assessment Report

- @@ -8303,7 +10071,7 @@

Incident Assessment Report

- + @@ -8333,23 +10101,23 @@

Incident Assessment Report

-
-

Incident Concluded

+
+

Incident Ongoing

TermIncidentAssessmentReportIncidentNotice Prefix risk
LabelIncident Assessment ReportIncident Notice
IRIhttps://w3id.org/dpv/risk#IncidentAssessmentReporthttps://w3id.org/dpv/risk#IncidentNotice
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities + dpv:Noticedpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, + dpv:hasNotice, + dpv:hasOrganisationalMeasure, dpv:hasTechnicalOrganisationalMeasure
DefinitionA report describing the assessment of an incident in terms of its effects or impactsNotice associated with an Incident
- + - + - + @@ -8381,7 +10149,7 @@

Incident Concluded

- + @@ -8413,23 +10181,23 @@

Incident Concluded

-
-

Incident Concluding Report

+
+

Incident Ongoing Report

TermIncidentConcludedIncidentOngoing Prefix risk
LabelIncident ConcludedIncident Ongoing
IRIhttps://w3id.org/dpv/risk#IncidentConcludedhttps://w3id.org/dpv/risk#IncidentOngoing
DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringThe incident is ongoing i.e. still active
- + - + - + @@ -8463,7 +10231,7 @@

Incident Concluding Report

- + @@ -8492,23 +10260,23 @@

Incident Concluding Report

-
-

Incident Detection Report

+
+

Incident Preliminary Report

TermIncidentConcludingReportIncidentOngoingReport Prefix risk
LabelIncident Concluding ReportIncident Ongoing Report
IRIhttps://w3id.org/dpv/risk#IncidentConcludingReporthttps://w3id.org/dpv/risk#IncidentOngoingReport
DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
- + - + - + @@ -8542,7 +10310,7 @@

Incident Detection Report

- + @@ -8571,45 +10339,45 @@

Incident Detection Report

- -
-

Incident Halted

+
+

Incident Register

TermIncidentDetectionReportIncidentPreliminaryReport Prefix risk
LabelIncident Detection ReportIncident Preliminary Report
IRIhttps://w3id.org/dpv/risk#IncidentDetectionReporthttps://w3id.org/dpv/risk#IncidentPreliminaryReport
DefinitionA report describing the detection of a IncidentA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
- + - + - + - + - - @@ -8620,7 +10388,7 @@

Incident Halted

- + @@ -8633,7 +10401,7 @@

Incident Halted

- + @@ -8644,7 +10412,7 @@

Incident Halted

- @@ -8652,23 +10420,23 @@

Incident Halted

-
-

Incident Handling Report

+
+

Incident Report

TermIncidentHaltedIncidentRegister Prefix risk
LabelIncident HaltedIncident Register
IRIhttps://w3id.org/dpv/risk#IncidentHaltedhttps://w3id.org/dpv/risk#IncidentRegister
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringA register recording incidentes, their reports, notifications, and other related activities
Date Created2024-02-142024-05-19
See More: section INCIDENT-STATUS in RISK + section INCIDENT in RISK
- + - + - + @@ -8680,8 +10448,7 @@

Incident Handling Report

- @@ -8702,7 +10469,7 @@

Incident Handling Report

- + @@ -8731,23 +10498,23 @@

Incident Handling Report

-
-

Incident Identifier

+
+

Incident Status

TermIncidentHandlingReportIncidentReport Prefix risk
LabelIncident Handling ReportIncident Report
IRIhttps://w3id.org/dpv/risk#IncidentHandlingReporthttps://w3id.org/dpv/risk#IncidentReport
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities + dpv:RecordsOfActivitiesdpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceDocumented information about an incident, its handling, assessments,and notifications
- + - + - + @@ -8757,10 +10524,19 @@

Incident Identifier

- + + + - + + + + @@ -8769,10 +10545,13 @@

Incident Identifier

- + + + + @@ -8782,15 +10561,18 @@

Incident Identifier

- + - + + + + - @@ -8798,49 +10580,45 @@

Incident Identifier

-
-

Incident Impact Assessment

+ +
+

Incident Status Unknown

TermIncidentIdentifierIncidentStatus Prefix risk
LabelIncident IdentifierIncident Status
IRIhttps://w3id.org/dpv/risk#IncidentIdentifierhttps://w3id.org/dpv/risk#IncidentStatus
rdfs:Class, skos:Concept
Broader/Parent types dpv:Status + → dpv:Context +
Object of relation dpv:hasContext, + dpv:hasStatus +
DefinitionIdentifier associated with an incidentStatus associated with an incident
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
Date Created2024-05-192024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT in RISK + section INCIDENT-STATUS in DEX
- + - + - + - + - - @@ -8851,7 +10629,7 @@

Incident Impact Assessment

- + @@ -8864,7 +10642,7 @@

Incident Impact Assessment

- + @@ -8875,7 +10653,7 @@

Incident Impact Assessment

- @@ -8884,23 +10662,23 @@

Incident Impact Assessment

-
-

Incident Mitigated

+
+

Incident Suspected

TermIncidentImpactAssessmentIncidentStatusUnknown Prefix risk
LabelIncident Impact AssessmentIncident Status Unknown
IRIhttps://w3id.org/dpv/risk#IncidentImpactAssessmenthttps://w3id.org/dpv/risk#IncidentStatusUnknown
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types dpv:ImpactAssessment - → dpv:RiskAssessment - → dpv:Assessment - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasAssessment, - dpv:hasImpactAssessment, - dpv:hasOrganisationalMeasure, - dpv:hasRiskAssessment, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasContext, + dpv:hasStatus
DefinitionAn impact assessment associated with a incidentThe status of a incident is unknown
Date Created2024-05-192024-02-14
See More: section INCIDENT in RISK + section INCIDENT-STATUS in RISK
- + - + - + @@ -8932,7 +10710,7 @@

Incident Mitigated

- + @@ -8964,23 +10742,23 @@

Incident Mitigated

-
-

Incident Mitigation Measure

+
+

Incident Suspected Report

TermIncidentMitigatedIncidentSuspected Prefix risk
LabelIncident MitigatedIncident Suspected
IRIhttps://w3id.org/dpv/risk#IncidentMitigatedhttps://w3id.org/dpv/risk#IncidentSuspected
DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
- + - + - + @@ -8992,15 +10770,18 @@

Incident Mitigation Measure

- - @@ -9011,7 +10792,7 @@

Incident Mitigation Measure

- + @@ -9041,23 +10822,23 @@

Incident Mitigation Measure

-
-

Incident Near Miss

+
+

Incident Terminated

TermIncidentMitigationMeasureIncidentSuspectedReport Prefix risk
LabelIncident Mitigation MeasureIncident Suspected Report
IRIhttps://w3id.org/dpv/risk#IncidentMitigationMeasurehttps://w3id.org/dpv/risk#IncidentSuspectedReport
Broader/Parent types dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againA report describing the suspicion of an incident in the past or occuring
- + - + - + @@ -9089,7 +10870,7 @@

Incident Near Miss

- + @@ -9121,57 +10902,47 @@

Incident Near Miss

-
-

Incident Notice

+ +
+

Individual Health & Safety

TermIncidentNearMissIncidentTerminated Prefix risk
LabelIncident Near MissIncident Terminated
IRIhttps://w3id.org/dpv/risk#IncidentNearMisshttps://w3id.org/dpv/risk#IncidentTerminated
DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
- + - + - + - + - - - - - + - - - - + @@ -9181,17 +10952,14 @@

Incident Notice

- - - - + - @@ -9199,47 +10967,36 @@

Incident Notice

- -
-

Incident Ongoing

+
+

Individual Risk

TermIncidentNoticeIndividualHealthSafety Prefix risk
LabelIncident NoticeIndividual Health & Safety
IRIhttps://w3id.org/dpv/risk#IncidentNoticehttps://w3id.org/dpv/risk#IndividualHealthSafety
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:Notice - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
Object of relation dpv:hasNotice, - dpv:hasOrganisationalMeasure, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionNotice associated with an Incident
Date Created2024-05-19
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - + - - - - + @@ -9248,7 +11005,7 @@

Incident Ongoing

- + @@ -9259,20 +11016,14 @@

Incident Ongoing

- - - - + - - - - + - @@ -9280,48 +11031,40 @@

Incident Ongoing

-
-

Incident Ongoing Report

+ +
+

Informativeness Bias

TermIncidentOngoingIndividualRisk Prefix risk
LabelIncident OngoingIndividual Risk
IRIhttps://w3id.org/dpv/risk#IncidentOngoinghttps://w3id.org/dpv/risk#IndividualRisk
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context -
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe incident is ongoing i.e. still activeRisks and issues that affect or have the potential to affect specific individuals
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -9330,28 +11073,34 @@

Incident Ongoing Report

- + - + + + + - + - + + + + - @@ -9359,48 +11108,42 @@

Incident Ongoing Report

-
-

Incident Preliminary Report

+ +
+

In-Group Bias

TermIncidentOngoingReportInformativenessBias Prefix risk
LabelIncident Ongoing ReportInformativeness Bias
IRIhttps://w3id.org/dpv/risk#IncidentOngoingReporthttps://w3id.org/dpv/risk#InformativenessBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:EngineeringDecisionBias
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section INCIDENT in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -9409,28 +11152,34 @@

Incident Preliminary Report

- + - + + + + - + - + + + + - @@ -9438,47 +11187,40 @@

Incident Preliminary Report

-
-

Incident Register

+ +
+

Injury

TermIncidentPreliminaryReportInGroupBias Prefix risk
LabelIncident Preliminary ReportIn-Group Bias
IRIhttps://w3id.org/dpv/risk#IncidentPreliminaryReporthttps://w3id.org/dpv/risk#InGroupBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownBias that occurs when showing partiality to one's own group or own characteristics
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section INCIDENT in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -9487,22 +11229,28 @@

Incident Register

- + - + + + + - + - + + + + @@ -9511,7 +11259,7 @@

Incident Register

- @@ -9519,57 +11267,77 @@

Incident Register

-
-

Incident Report

+ +
+

None

TermIncidentRegisterInjury Prefix risk
LabelIncident RegisterInjury
IRIhttps://w3id.org/dpv/risk#IncidentRegisterhttps://w3id.org/dpv/risk#Injury
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA register recording incidentes, their reports, notifications, and other related activitiesSomething that acts as or causes Injury
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + + + + + + + + + + + - - - - + - - - - + @@ -9579,17 +11347,14 @@

Incident Report

- - - - + - @@ -9597,23 +11362,23 @@

Incident Report

-
-

Incident Status

+
+

Integrity Incident

TermIncidentReportIntegrityBreach Prefix risk
LabelIncident ReportNone
IRIhttps://w3id.org/dpv/risk#IncidentReporthttps://w3id.org/dpv/risk#IntegrityBreach
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:DataBreach + → risk:AvailabilityConcept +
Broader/Parent types risk:DataBreach + → risk:ConfidentialityConcept +
Broader/Parent types risk:DataBreach + → risk:IntegrityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionDocumented information about an incident, its handling, assessments,and notifications
Date Created2024-05-19
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -9625,15 +11390,14 @@

Incident Status

- - @@ -9644,13 +11408,10 @@

Incident Status

- + - - - @@ -9660,18 +11421,15 @@

Incident Status

- + - - - - + - @@ -9680,46 +11438,40 @@

Incident Status

-
-

Incident Status Unknown

+
+

Intentional Misuse

TermIncidentStatusIntegrityIncident Prefix risk
LabelIncident StatusIntegrity Incident
IRIhttps://w3id.org/dpv/risk#IncidentStatushttps://w3id.org/dpv/risk#IntegrityIncident
Broader/Parent types dpv:Status - → dpv:Context + risk:Incident + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus + risk:hasIncident
DefinitionStatus associated with an incidentIncident where the integrity of information or system has been affected
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
Date Created2024-02-142024-05-19
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in DEX + section INCIDENT in RISK
- + - + - + - + - - - - - + @@ -9728,7 +11480,7 @@

Incident Status Unknown

- + @@ -9739,20 +11491,14 @@

Incident Status Unknown

- - - - + - - - - + - @@ -9761,46 +11507,43 @@

Incident Status Unknown

-
-

Incident Suspected

+
+

Intercept Communications

TermIncidentStatusUnknownIntentionalMisuse Prefix risk
LabelIncident Status UnknownIntentional Misuse
IRIhttps://w3id.org/dpv/risk#IncidentStatusUnknownhttps://w3id.org/dpv/risk#IntentionalMisuse
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:UserRisks + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe status of a incident is unknownIntentional Misuse
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - - - - + @@ -9809,22 +11552,31 @@

Incident Suspected

- + - + + + + - + + + + - + - + + + + @@ -9833,7 +11585,7 @@

Incident Suspected

- @@ -9841,48 +11593,45 @@

Incident Suspected

-
-

Incident Suspected Report

+ + + + + +
+

Judicial Costs

TermIncidentSuspectedInterceptCommunications Prefix risk
LabelIncident SuspectedIntercept Communications
IRIhttps://w3id.org/dpv/risk#IncidentSuspectedhttps://w3id.org/dpv/risk#InterceptCommunications
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingSomething that acts as or causes Interception of Communications
Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2024-02-142022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -9891,7 +11640,7 @@

Incident Suspected Report

- + @@ -9902,17 +11651,14 @@

Incident Suspected Report

- - - - + - @@ -9921,46 +11667,40 @@

Incident Suspected Report

-
-

Incident Terminated

+
+

Judicial Penalty

TermIncidentSuspectedReportJudicialCosts Prefix risk
LabelIncident Suspected ReportJudicial Costs
IRIhttps://w3id.org/dpv/risk#IncidentSuspectedReporthttps://w3id.org/dpv/risk#JudicialCosts
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA report describing the suspicion of an incident in the past or occuringSomething that involves or causes judicial costs to be paid
Date Created2024-05-19
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -9969,7 +11709,7 @@

Incident Terminated

- + @@ -9980,20 +11720,14 @@

Incident Terminated

- - - - + - - - - + - @@ -10002,23 +11736,23 @@

Incident Terminated

-
-

Individual Health & Safety

+
+

Legal Risk

TermIncidentTerminatedJudicialPenalty Prefix risk
LabelIncident TerminatedJudicial Penalty
IRIhttps://w3id.org/dpv/risk#IncidentTerminatedhttps://w3id.org/dpv/risk#JudicialPenalty
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringSomething that involves or causes judicial penalties to be paid
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -10030,7 +11764,7 @@

Individual Health & Safety

- @@ -10041,7 +11775,10 @@

Individual Health & Safety

- + + + + @@ -10066,33 +11803,38 @@

Individual Health & Safety

-
-

Individual Risk

+ +
+

Lose of Credibility

TermIndividualHealthSafetyLegalRisk Prefix risk
LabelIndividual Health & SafetyLegal Risk
IRIhttps://w3id.org/dpv/risk#IndividualHealthSafetyhttps://w3id.org/dpv/risk#LegalRisk
Broader/Parent types risk:IndividualRisk + dpv:RiskConcept
DefinitionRisks and issues that have their basis in legal requirements and enforcement
- + - + - + - + - + + + @@ -10104,20 +11846,32 @@

Individual Risk

- + - + + + + - - - + + + + + + + + + + + + @@ -10131,23 +11885,23 @@

Individual Risk

-
-

Injury

+
+

Lose of Customer Confidence

TermIndividualRiskLoseCredibility Prefix risk
LabelIndividual RiskLose of Credibility
IRIhttps://w3id.org/dpv/risk#IndividualRiskhttps://w3id.org/dpv/risk#LoseCredibility
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ReputationalRisk + → dpv:RiskConcept +
DefinitionRisks and issues that affect or have the potential to affect specific individualsSomething that acts as or causes Loss of Credibility
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -10159,7 +11913,8 @@

Injury

- @@ -10172,7 +11927,7 @@

Injury

- + @@ -10211,23 +11966,23 @@

Injury

-
-

None

+
+

Lose of Goodwill

TermInjuryLoseCustomerConfidence Prefix risk
LabelInjuryLose of Customer Confidence
IRIhttps://w3id.org/dpv/risk#Injuryhttps://w3id.org/dpv/risk#LoseCustomerConfidence
Broader/Parent types risk:IndividualRisk + risk:ReputationalRisk + → dpv:RiskConcept
DefinitionSomething that acts as or causes InjurySomething that acts as or causes Loss of Customer Confidence
- + - + - + @@ -10239,36 +11994,7 @@

None

- - - - - - - - - - - - - @@ -10280,19 +12006,34 @@

None

- + + + + - + + + + - - - + + + + + + + + + + + + @@ -10305,44 +12046,41 @@

None

-
-

Integrity Incident

+ +
+

Lose of Negotiating Capacity

TermIntegrityBreachLoseGoodwill Prefix risk
LabelNoneLose of Goodwill
IRIhttps://w3id.org/dpv/risk#IntegrityBreachhttps://w3id.org/dpv/risk#LoseGoodwill
Broader/Parent types risk:DataBreach - → risk:AvailabilityConcept -
Broader/Parent types risk:DataBreach - → risk:ConfidentialityConcept -
Broader/Parent types risk:DataBreach - → risk:IntegrityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:AvailabilityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:ConfidentialityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:IntegrityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:ReputationalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Loss of Goodwill
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - - + @@ -10351,28 +12089,37 @@

Integrity Incident

- + - + + + + - + - - + + + + + + + + - @@ -10381,23 +12128,23 @@

Integrity Incident

-
-

Intentional Misuse

+
+

Lose of Opportunity

TermIntegrityIncidentLoseNegotiatingCapacity Prefix risk
LabelIntegrity IncidentLose of Negotiating Capacity
IRIhttps://w3id.org/dpv/risk#IntegrityIncidenthttps://w3id.org/dpv/risk#LoseNegotiatingCapacity
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:Incident + risk:ReputationalRiskdpv:RiskConcept
Object of relation risk:hasIncident -
DefinitionIncident where the integrity of information or system has been affectedSomething that acts as or causes Loss of Negotiating Capacity
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -10409,7 +12156,7 @@

Intentional Misuse

- @@ -10423,20 +12170,32 @@

Intentional Misuse

- + - + + + + - - - + + + + + + + + + + + + @@ -10450,23 +12209,23 @@

Intentional Misuse

-
-

Intercept Communications

+
+

Lose of Reputation

TermIntentionalMisuseLoseOpportunity Prefix risk
LabelIntentional MisuseLose of Opportunity
IRIhttps://w3id.org/dpv/risk#IntentionalMisusehttps://w3id.org/dpv/risk#LoseOpportunity
Broader/Parent types risk:UserRisks + risk:ReputationalRiskdpv:RiskConcept
DefinitionIntentional MisuseSomething that acts as or causes Loss of Opportunity
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -10478,10 +12237,7 @@

Intercept Communications

- - - @@ -10495,12 +12251,9 @@

Intercept Communications

- + - - - - + @@ -10537,27 +12290,23 @@

Intercept Communications

- - - - -
-

Judicial Costs

+
+

Lose of Trust

TermInterceptCommunicationsLoseReputation Prefix risk
LabelIntercept CommunicationsLose of Reputation
IRIhttps://w3id.org/dpv/risk#InterceptCommunicationshttps://w3id.org/dpv/risk#LoseReputation
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat + risk:ReputationalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Interception of CommunicationsSomething that acts as or causes Loss of Reputation
Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
- + - + - + @@ -10569,7 +12318,7 @@

Judicial Costs

- @@ -10583,20 +12332,32 @@

Judicial Costs

- + - + + + + - - - + + + + + + + + + + + + @@ -10610,40 +12371,52 @@

Judicial Costs

-
-

Judicial Penalty

+
+

Low Likelihood

TermJudicialCostsLoseTrust Prefix risk
LabelJudicial CostsLose of Trust
IRIhttps://w3id.org/dpv/risk#JudicialCostshttps://w3id.org/dpv/risk#LoseTrust
Broader/Parent types risk:FinancialImpact + risk:ReputationalRiskdpv:RiskConcept
DefinitionSomething that involves or causes judicial costs to be paidSomething that acts as or causes Loss of Trust
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - + + + + - + + + + @@ -10652,9 +12425,12 @@

Judicial Penalty

- + - + + + + @@ -10663,14 +12439,20 @@

Judicial Penalty

- + + + + - + + + + - @@ -10679,39 +12461,52 @@

Judicial Penalty

-
-

Legal Risk

+
+

Low Risk

TermJudicialPenaltyLowLikelihood Prefix risk
LabelJudicial PenaltyLow Likelihood
IRIhttps://w3id.org/dpv/risk#JudicialPenaltyhttps://w3id.org/dpv/risk#LowLikelihood
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
Object of relation dpv:hasLikelihood +
DefinitionSomething that involves or causes judicial penalties to be paidLevel where Likelihood is Low
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - + + + + - + + + + @@ -10720,9 +12515,12 @@

Legal Risk

- + - + + + + @@ -10731,14 +12529,20 @@

Legal Risk

- + + + + - + + + + - @@ -10747,40 +12551,52 @@

Legal Risk

-
-

Lose of Credibility

+
+

Low Severity

TermLegalRiskLowRisk Prefix risk
LabelLegal RiskLow Risk
IRIhttps://w3id.org/dpv/risk#LegalRiskhttps://w3id.org/dpv/risk#LowRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
Object of relation dpv:hasRiskLevel +
DefinitionRisks and issues that have their basis in legal requirements and enforcementLevel where Risk is Low
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - + + + + - + + + + @@ -10789,28 +12605,25 @@

Lose of Credibility

- + - + + + + - - - - + - + - - - - + @@ -10819,7 +12632,7 @@

Lose of Credibility

- @@ -10828,23 +12641,23 @@

Lose of Credibility

-
-

Lose of Customer Confidence

+
+

Malicious Code Attack

TermLoseCredibilityLowSeverity Prefix risk
LabelLose of CredibilityLow Severity
IRIhttps://w3id.org/dpv/risk#LoseCredibilityhttps://w3id.org/dpv/risk#LowSeverity
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
Broader/Parent types risk:7SeverityLevels + → dpv:Severity
Object of relation dpv:hasSeverity +
DefinitionSomething that acts as or causes Loss of CredibilityLevel where Severity is Low
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + @@ -10856,8 +12669,17 @@

Lose of Customer Confidence

- + + + + + + @@ -10870,7 +12692,7 @@

Lose of Customer Confidence

- + @@ -10879,7 +12701,7 @@

Lose of Customer Confidence

- + @@ -10909,23 +12731,23 @@

Lose of Customer Confidence

-
-

Lose of Goodwill

+
+

Malware Attack

TermLoseCustomerConfidenceMaliciousCodeAttack Prefix risk
LabelLose of Customer ConfidenceMalicious Code Attack
IRIhttps://w3id.org/dpv/risk#LoseCustomerConfidencehttps://w3id.org/dpv/risk#MaliciousCodeAttack
Broader/Parent types risk:ReputationalRisk + risk:AvailabilityConcept +
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionSomething that acts as or causes Loss of Customer ConfidenceSomething that acts as or causes Malicious Code Attack
SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
- + - + - + @@ -10937,8 +12759,17 @@

Lose of Goodwill

- + + + + + + @@ -10951,7 +12782,7 @@

Lose of Goodwill

- + @@ -10960,7 +12791,7 @@

Lose of Goodwill

- + @@ -10990,23 +12821,23 @@

Lose of Goodwill

-
-

Lose of Negotiating Capacity

+
+

Material Damage

TermLoseGoodwillMalwareAttack Prefix risk
LabelLose of GoodwillMalware Attack
IRIhttps://w3id.org/dpv/risk#LoseGoodwillhttps://w3id.org/dpv/risk#MalwareAttack
Broader/Parent types risk:ReputationalRisk + risk:AvailabilityConcept +
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionSomething that acts as or causes Loss of GoodwillSomething that acts as or causes Malware Attack
SourceISO/IEC 27005:2018ENISA Methodology for Sectoral Cybersecurity Assessments
- + - + - + @@ -11018,7 +12849,7 @@

Lose of Negotiating Capacity

- @@ -11032,23 +12863,23 @@

Lose of Negotiating Capacity

- + - + + + + - - - - + - + @@ -11071,23 +12902,23 @@

Lose of Negotiating Capacity

-
-

Lose of Opportunity

+
+

Misuse

TermLoseNegotiatingCapacityMaterialDamage Prefix risk
LabelLose of Negotiating CapacityMaterial Damage
IRIhttps://w3id.org/dpv/risk#LoseNegotiatingCapacityhttps://w3id.org/dpv/risk#MaterialDamage
Broader/Parent types risk:ReputationalRisk + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Loss of Negotiating CapacitySomething that acts as or causes Material Damage
Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
SourceISO/IEC 27005:2018
Date Created2022-08-172022-03-30
Date Modified
- + - + - + @@ -11099,7 +12930,7 @@

Lose of Opportunity

- @@ -11113,23 +12944,20 @@

Lose of Opportunity

- + - - - - + - + @@ -11137,7 +12965,7 @@

Lose of Opportunity

- + @@ -11152,40 +12980,52 @@

Lose of Opportunity

-
-

Lose of Reputation

+
+

Moderate Likelihood

TermLoseOpportunityMisuse Prefix risk
LabelLose of OpportunityMisuse
IRIhttps://w3id.org/dpv/risk#LoseOpportunityhttps://w3id.org/dpv/risk#Misuse
Broader/Parent types risk:ReputationalRisk + risk:UserRisksdpv:RiskConcept
DefinitionSomething that acts as or causes Loss of OpportunitySomething that acts as or causes Misuse
SourceISO/IEC 27005:2018
Date Created2022-08-172024-06-11
Date Modified
ContributorsHarshvardhan J. PanditDelaram Golpayegani
- + - + - + - + - + + + + - + + + + @@ -11194,28 +13034,25 @@

Lose of Reputation

- + - + + + + - - - - + - + - - - - + @@ -11224,7 +13061,7 @@

Lose of Reputation

- @@ -11233,40 +13070,52 @@

Lose of Reputation

-
-

Lose of Trust

+
+

Moderate Risk

TermLoseReputationModerateLikelihood Prefix risk
LabelLose of ReputationModerate Likelihood
IRIhttps://w3id.org/dpv/risk#LoseReputationhttps://w3id.org/dpv/risk#ModerateLikelihood
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
Object of relation dpv:hasLikelihood +
DefinitionSomething that acts as or causes Loss of ReputationLevel where Likelihood is Moderate
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - + + + + - + + + + @@ -11275,28 +13124,25 @@

Lose of Trust

- + - + + + + - - - - + - + - - - - + @@ -11305,7 +13151,7 @@

Lose of Trust

- @@ -11314,50 +13160,50 @@

Lose of Trust

-
-

Low Likelihood

+
+

Moderate Severity

TermLoseTrustModerateRisk Prefix risk
LabelLose of TrustModerate Risk
IRIhttps://w3id.org/dpv/risk#LoseTrusthttps://w3id.org/dpv/risk#ModerateRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
Object of relation dpv:hasRiskLevel +
DefinitionSomething that acts as or causes Loss of TrustLevel where Risk is Moderate
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - - - - @@ -11368,11 +13214,11 @@

Low Likelihood

- + - + @@ -11404,50 +13250,46 @@

Low Likelihood

-
-

Low Risk

+
+

Monitor Consequence

TermLowLikelihoodModerateSeverity Prefix risk
LabelLow LikelihoodModerate Severity
IRIhttps://w3id.org/dpv/risk#LowLikelihoodhttps://w3id.org/dpv/risk#ModerateSeverity
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood + risk:3SeverityLevels + → dpv:Severity
Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood + risk:5SeverityLevels + → dpv:Severity
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:7SeverityLevels + → dpv:Severity
Object of relation dpv:hasLikelihood + dpv:hasSeverity
DefinitionLevel where Likelihood is LowLevel where Severity is Moderate
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
- + - + - + - - - - - - - - + + + + - - @@ -11458,12 +13300,9 @@

Low Risk

- + - - - - + @@ -11474,7 +13313,7 @@

Low Risk

- + @@ -11485,7 +13324,7 @@

Low Risk

- @@ -11494,50 +13333,45 @@

Low Risk

-
-

Low Severity

+
+

Monitor Control

TermLowRiskMonitorConsequence Prefix risk
LabelLow RiskMonitor Consequence
IRIhttps://w3id.org/dpv/risk#LowRiskhttps://w3id.org/dpv/risk#MonitorConsequence
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
rdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasRiskLevel + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Risk is LowControl that monitors a Risk Consequence
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Date Created2022-08-182024-05-19
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - @@ -11548,11 +13382,11 @@

Low Severity

- + - + @@ -11564,7 +13398,7 @@

Low Severity

- + @@ -11575,7 +13409,7 @@

Low Severity

- @@ -11584,49 +13418,48 @@

Low Severity

-
-

Malicious Code Attack

+
+

Monitor Impact

TermLowSeverityMonitorControl Prefix risk
LabelLow SeverityMonitor Control
IRIhttps://w3id.org/dpv/risk#LowSeverityhttps://w3id.org/dpv/risk#MonitorControl
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasSeverity + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Severity is LowRisk Mitigation Measure that uses controls to monitor events
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
Date Created2022-08-182024-05-19
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - - - + + + + @@ -11635,28 +13468,22 @@

Malicious Code Attack

- + - - - - + - + - - - - + @@ -11665,7 +13492,7 @@

Malicious Code Attack

- @@ -11674,49 +13501,48 @@

Malicious Code Attack

-
-

Malware Attack

+
+

Monitor Risk

TermMaliciousCodeAttackMonitorImpact Prefix risk
LabelMalicious Code AttackMonitor Impact
IRIhttps://w3id.org/dpv/risk#MaliciousCodeAttackhttps://w3id.org/dpv/risk#MonitorImpact
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
Broader/Parent types risk:IntegrityConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Malicious Code AttackControl that monitors a Risk Impact
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - - - + + + + @@ -11725,28 +13551,22 @@

Malware Attack

- + - - - - + - + - - - - + @@ -11755,7 +13575,7 @@

Malware Attack

- @@ -11764,40 +13584,48 @@

Malware Attack

-
-

Material Damage

+
+

Monitor Control

TermMalwareAttackMonitorRisk Prefix risk
LabelMalware AttackMonitor Risk
IRIhttps://w3id.org/dpv/risk#MalwareAttackhttps://w3id.org/dpv/risk#MonitorRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
Broader/Parent types risk:IntegrityConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Malware AttackControl that monitors a Risk
SourceENISA Methodology for Sectoral Cybersecurity Assessments
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + @@ -11806,12 +13634,9 @@

Material Damage

- + - - - - + @@ -11822,12 +13647,9 @@

Material Damage

- + - - - - + @@ -11836,7 +13658,7 @@

Material Damage

- @@ -11845,40 +13667,48 @@

Material Damage

-
-

Misuse

+
+

Monitor Risk Source

TermMaterialDamageMonitorRiskControl Prefix risk
LabelMaterial DamageMonitor Control
IRIhttps://w3id.org/dpv/risk#MaterialDamagehttps://w3id.org/dpv/risk#MonitorRiskControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Material DamageControl that monitors another Control
Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
Date Created2022-03-302024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + @@ -11887,7 +13717,7 @@

Misuse

- + @@ -11900,21 +13730,18 @@

Misuse

- + - - - - + - + - @@ -11923,50 +13750,46 @@

Misuse

-
-

Moderate Likelihood

+
+

Monitor Vulnerabilities

TermMisuseMonitorRiskSource Prefix risk
LabelMisuseMonitor Risk Source
IRIhttps://w3id.org/dpv/risk#Misusehttps://w3id.org/dpv/risk#MonitorRiskSource
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:UserRisks - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes MisuseControl that monitors a Risk Source
Date Created2024-06-112024-05-19
Date Modified2024-08-16
ContributorsDelaram GolpayeganiHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - @@ -11977,12 +13800,9 @@

Moderate Likelihood

- + - - - - + @@ -11993,7 +13813,7 @@

Moderate Likelihood

- + @@ -12004,7 +13824,7 @@

Moderate Likelihood

- @@ -12013,52 +13833,40 @@

Moderate Likelihood

-
-

Moderate Risk

+
+

Non-Material Damage

TermModerateLikelihoodMonitorVulnerabilities Prefix risk
LabelModerate LikelihoodMonitor Vulnerabilities
IRIhttps://w3id.org/dpv/risk#ModerateLikelihoodhttps://w3id.org/dpv/risk#MonitorVulnerabilities
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Likelihood is ModerateControl that monitors a Risk Vulnerability
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Date Created2022-08-182024-05-19
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - - - - + @@ -12067,11 +13875,11 @@

Moderate Risk

- + - + @@ -12083,9 +13891,12 @@

Moderate Risk

- + - + + + + @@ -12094,7 +13905,7 @@

Moderate Risk

- @@ -12103,52 +13914,42 @@

Moderate Risk

-
-

Moderate Severity

+
+

Non-Normality Bias

TermModerateRiskNonMaterialDamage Prefix risk
LabelModerate RiskNon-Material Damage
IRIhttps://w3id.org/dpv/risk#ModerateRiskhttps://w3id.org/dpv/risk#NonMaterialDamage
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:LegalRisk + → dpv:RiskConcept
Object of relation dpv:hasRiskLevel -
DefinitionLevel where Risk is ModerateSomething that acts as or causes Non-Material Damage
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1The criteria for what is considered material damage is based in jurisdictional laws and norms
Date Created2022-08-182022-03-30
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - - - - - + @@ -12157,34 +13958,34 @@

Moderate Severity

- + - - - - + - + + + + - + - + - @@ -12193,48 +13994,43 @@

Moderate Severity

-
-

Monitor Consequence

+
+

Non-Response Bias

TermModerateSeverityNonNormalityBias Prefix risk
LabelModerate SeverityNon-Normality Bias
IRIhttps://w3id.org/dpv/risk#ModerateSeverityhttps://w3id.org/dpv/risk#NonNormalityBias
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasSeverity -
DefinitionLevel where Severity is ModerateBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Source
Date Created2022-08-182024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-LEVELS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -12243,31 +14039,34 @@

Monitor Consequence

- + - + + + + - + - + - @@ -12276,47 +14075,39 @@

Monitor Consequence

-
-

Monitor Control

+
+

Operational Security Risk

TermMonitorConsequenceNonResponseBias Prefix risk
LabelMonitor ConsequenceNon-Response Bias
IRIhttps://w3id.org/dpv/risk#MonitorConsequencehttps://w3id.org/dpv/risk#NonResponseBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk ConsequenceBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias
Source
Date Created2024-05-192024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -12325,12 +14116,9 @@

Monitor Control

- + - - - - + @@ -12339,20 +14127,14 @@

Monitor Control

- - - - + - - - - + - @@ -12361,48 +14143,41 @@

Monitor Control

-
-

Monitor Impact

+
+

Out-Group Homogeneity Bias

TermMonitorControlOperationalSecurityRisk Prefix risk
LabelMonitor ControlOperational Security Risk
IRIhttps://w3id.org/dpv/risk#MonitorControlhttps://w3id.org/dpv/risk#OperationalSecurityRisk
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionRisk Mitigation Measure that uses controls to monitor eventsRisks and issues that arise during operational processes
Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
Date Created2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -12411,31 +14186,34 @@

Monitor Impact

- + - + + + + - + - + - @@ -12444,48 +14222,40 @@

Monitor Impact

-
-

Monitor Risk

+
+

Payment

TermMonitorImpactOutGroupHomogeneityBias Prefix risk
LabelMonitor ImpactOut-Group Homogeneity Bias
IRIhttps://w3id.org/dpv/risk#MonitorImpacthttps://w3id.org/dpv/risk#OutGroupHomogeneityBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk ImpactBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics
Source
Date Created2024-05-192024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -12494,7 +14264,7 @@

Monitor Risk

- + @@ -12507,18 +14277,21 @@

Monitor Risk

- + - + + + + - + - @@ -12527,48 +14300,40 @@

Monitor Risk

-
-

Monitor Control

+
+

Personal Safety Endangerment

TermMonitorRiskPayment Prefix risk
LabelMonitor RiskPayment
IRIhttps://w3id.org/dpv/risk#MonitorRiskhttps://w3id.org/dpv/risk#Payment
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a RiskSomething that acts as or provides payment e.g. to access a service or purchase resources
Date Created2024-05-192024-04-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -12577,22 +14342,28 @@

Monitor Control

- + - + + + + - + - + + + + @@ -12601,7 +14372,7 @@

Monitor Control

- @@ -12610,48 +14381,43 @@

Monitor Control

-
-

Monitor Risk Source

+
+

Phishing Scam

TermMonitorRiskControlPersonalSafetyEndangerment Prefix risk
LabelMonitor ControlPersonal Safety Endangerment
IRIhttps://w3id.org/dpv/risk#MonitorRiskControlhttps://w3id.org/dpv/risk#PersonalSafetyEndangerment
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors another ControlSomething that acts as or causes Personal Safety Endangerment
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - - - - + @@ -12660,22 +14426,28 @@

Monitor Risk Source

- + - + + + + - + - + + + + @@ -12684,7 +14456,7 @@

Monitor Risk Source

- @@ -12693,48 +14465,39 @@

Monitor Risk Source

-
-

Monitor Vulnerabilities

+
+

Physical Assault

TermMonitorRiskSourcePhishingScam Prefix risk
LabelMonitor Risk SourcePhishing Scam
IRIhttps://w3id.org/dpv/risk#MonitorRiskSourcehttps://w3id.org/dpv/risk#PhishingScam
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk SourceSomething that acts as or causes Phishing Scam
SourceENISA Threat Landscape for Ransomware Attacks 2022
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -12743,22 +14506,28 @@

Monitor Vulnerabilities

- + - + + + + - + - + + + + @@ -12767,7 +14536,7 @@

Monitor Vulnerabilities

- @@ -12776,23 +14545,23 @@

Monitor Vulnerabilities

-
-

Non-Material Damage

+
+

Physical Harm

TermMonitorVulnerabilitiesPhysicalAssault Prefix risk
LabelMonitor VulnerabilitiesPhysical Assault
IRIhttps://w3id.org/dpv/risk#MonitorVulnerabilitieshttps://w3id.org/dpv/risk#PhysicalAssault
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk VulnerabilitySomething that acts as or causes Physical Assault
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -12804,8 +14573,7 @@

Non-Material Damage

- @@ -12816,14 +14584,8 @@

Non-Material Damage

- - - - - - - - + + @@ -12832,18 +14594,9 @@

Non-Material Damage

- - - - - - - - - - - - + + + @@ -12857,23 +14610,23 @@

Non-Material Damage

-
-

Operational Security Risk

+
+

Privacy

TermNonMaterialDamagePhysicalHarm Prefix risk
LabelNon-Material DamagePhysical Harm
IRIhttps://w3id.org/dpv/risk#NonMaterialDamagehttps://w3id.org/dpv/risk#PhysicalHarm
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:IndividualRisk
DefinitionSomething that acts as or causes Non-Material Damage
Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
Date Created2022-03-30
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -12885,7 +14638,7 @@

Operational Security Risk

- @@ -12896,10 +14649,7 @@

Operational Security Risk

- - - - + @@ -12925,23 +14675,23 @@

Operational Security Risk

-
-

Payment

+
+

Psychological Harm

TermOperationalSecurityRiskPrivacy Prefix risk
LabelOperational Security RiskPrivacy
IRIhttps://w3id.org/dpv/risk#OperationalSecurityRiskhttps://w3id.org/dpv/risk#Privacy
Broader/Parent types dpv:RiskConcept + risk:IndividualRisk
DefinitionRisks and issues that arise during operational processes
- + - + - + @@ -12953,8 +14703,7 @@

Payment

- @@ -12967,20 +14716,23 @@

Payment

- + - + + + + - + @@ -12988,7 +14740,7 @@

Payment

- + @@ -13003,23 +14755,23 @@

Payment

-
-

Personal Safety Endangerment

+
+

Public Order Breach

TermPaymentPsychologicalHarm Prefix risk
LabelPaymentPsychological Harm
IRIhttps://w3id.org/dpv/risk#Paymenthttps://w3id.org/dpv/risk#PsychologicalHarm
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:IndividualRisk
DefinitionSomething that acts as or provides payment e.g. to access a service or purchase resourcesSomething that acts as or causes Psychological Harm
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2024-04-142022-08-17
Date Modified
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
- + - + - + @@ -13031,7 +14783,7 @@

Personal Safety Endangerment

- @@ -13045,7 +14797,7 @@

Personal Safety Endangerment

- + @@ -13084,43 +14836,47 @@

Personal Safety Endangerment

-
-

Phishing Scam

+
+

Recovery Control

TermPersonalSafetyEndangermentPublicOrderBreach Prefix risk
LabelPersonal Safety EndangermentPublic Order Breach
IRIhttps://w3id.org/dpv/risk#PersonalSafetyEndangermenthttps://w3id.org/dpv/risk#PublicOrderBreach
Broader/Parent types risk:SocietalRisk + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Personal Safety EndangermentSomething that acts as or causes Public Order Breach
- + - + - + - + - - - - + + + + @@ -13129,37 +14885,28 @@

Phishing Scam

- + - - - - + - + - - - - - - - - + + - @@ -13168,39 +14915,48 @@

Phishing Scam

-
-

Physical Assault

+
+

Reduce Likelihood

TermPhishingScamRecoveryControl Prefix risk
LabelPhishing ScamRecovery Control
IRIhttps://w3id.org/dpv/risk#PhishingScamhttps://w3id.org/dpv/risk#RecoveryControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Phishing ScamControl to recover from event
SourceENISA Threat Landscape for Ransomware Attacks 2022
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + @@ -13209,28 +14965,22 @@

Physical Assault

- + - - - - + - + - - - - + @@ -13239,7 +14989,7 @@

Physical Assault

- @@ -13248,46 +14998,58 @@

Physical Assault

-
-

Physical Harm

+
+

Reduce Severity

TermPhysicalAssaultReduceLikelihood Prefix risk
LabelPhysical AssaultReduce Likelihood
IRIhttps://w3id.org/dpv/risk#PhysicalAssaulthttps://w3id.org/dpv/risk#ReduceLikelihood
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:IndividualRisk + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Physical AssaultControl that reduces the likelihood of an event
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + - + + + + @@ -13297,14 +15059,20 @@

Physical Harm

- + + + + - + + + + - @@ -13313,46 +15081,57 @@

Physical Harm

-
-

Privacy

+
+

Reduction Control

TermPhysicalHarmReduceSeverity Prefix risk
LabelPhysical HarmReduce Severity
IRIhttps://w3id.org/dpv/risk#PhysicalHarmhttps://w3id.org/dpv/risk#ReduceSeverity
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:IndividualRisk + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionControl that reduces the severity of an event
Date Created2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + - + + + + @@ -13362,14 +15141,17 @@

Privacy

- + + + + - @@ -13378,23 +15160,25 @@

Privacy

-
-

Psychological Harm

+ + +
+

Re-identification

TermPrivacyReductionControl Prefix risk
LabelPrivacyReduction Control
IRIhttps://w3id.org/dpv/risk#Privacyhttps://w3id.org/dpv/risk#ReductionControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:IndividualRisk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionControl that reduces the likelihood or severity of an event
Date Created2024-05-19
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -13406,7 +15190,11 @@

Psychological Harm

- + + @@ -13419,23 +15207,23 @@

Psychological Harm

- + - + + + + - - - - + - + @@ -13458,40 +15246,47 @@

Psychological Harm

-
-

Public Order Breach

+
+

Remedy Control

TermPsychologicalHarmReidentification Prefix risk
LabelPsychological HarmRe-identification
IRIhttps://w3id.org/dpv/risk#PsychologicalHarmhttps://w3id.org/dpv/risk#Reidentification
Broader/Parent types risk:IndividualRisk + risk:ConfidentialityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
DefinitionSomething that acts as or causes Psychological HarmSomething that acts as or causes Re-identification
Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172022-08-19
Date Modified
- + - + - + - + - - + + + + @@ -13500,37 +15295,28 @@

Public Order Breach

- + - - - - + - + - - - - - - - - + + - @@ -13539,23 +15325,23 @@

Public Order Breach

-
-

Recovery Control

+
+

Remove Consequence

TermPublicOrderBreachRemedyControl Prefix risk
LabelPublic Order BreachRemedy Control
IRIhttps://w3id.org/dpv/risk#PublicOrderBreachhttps://w3id.org/dpv/risk#RemedyControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Public Order BreachControl to remedy consequences of event
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -13567,7 +15353,8 @@

Recovery Control

- @@ -13588,7 +15375,7 @@

Recovery Control

- + @@ -13604,7 +15391,10 @@

Recovery Control

- + + + + @@ -13618,23 +15408,23 @@

Recovery Control

-
-

Reduce Likelihood

+
+

Remove Impact

TermRecoveryControlRemoveConsequence Prefix risk
LabelRecovery ControlRemove Consequence
IRIhttps://w3id.org/dpv/risk#RecoveryControlhttps://w3id.org/dpv/risk#RemoveConsequence
Broader/Parent types risk:RiskControl + risk:ConsequenceControl + → risk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
DefinitionControl to recover from eventControl that removes Consequence i.e. prevents it from materialising
2024-05-19
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -13646,7 +15436,7 @@

Reduce Likelihood

- - + @@ -13701,23 +15491,23 @@

Reduce Likelihood

-
-

Reduce Severity

+
+

Remove Source

TermReduceLikelihoodRemoveImpact Prefix risk
LabelReduce LikelihoodRemove Impact
IRIhttps://w3id.org/dpv/risk#ReduceLikelihoodhttps://w3id.org/dpv/risk#RemoveImpact
Broader/Parent types risk:ReductionControl + risk:ImpactControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -13668,7 +15458,7 @@

Reduce Likelihood

DefinitionControl that reduces the likelihood of an eventControl that removes Impact i.e. prevents it from materialising
- + - + - + @@ -13729,7 +15519,7 @@

Reduce Severity

- - + @@ -13784,47 +15574,40 @@

Reduce Severity

-
-

Reduction Control

+
+

Remuneration

TermReduceSeverityRemoveSource Prefix risk
LabelReduce SeverityRemove Source
IRIhttps://w3id.org/dpv/risk#ReduceSeverityhttps://w3id.org/dpv/risk#RemoveSource
Broader/Parent types risk:ReductionControl + risk:SourceControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -13751,7 +15541,7 @@

Reduce Severity

DefinitionControl that reduces the severity of an eventControl that removes the risk source
- + - + - + - + - - - - - + @@ -13833,7 +15616,7 @@

Reduction Control

- + @@ -13846,15 +15629,21 @@

Reduction Control

- + - - + + + + + + + + - @@ -13863,25 +15652,23 @@

Reduction Control

- - -
-

Re-identification

+
+

Reputational Risk

TermReductionControlRenumeration Prefix risk
LabelReduction ControlRemuneration
IRIhttps://w3id.org/dpv/risk#ReductionControlhttps://w3id.org/dpv/risk#Renumeration
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that reduces the likelihood or severity of an eventSomething that acts as or provides renumeration which is in monetary or financial form
Date Created2024-05-192024-04-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -13893,11 +15680,7 @@

Re-identification

- - - @@ -13910,12 +15693,9 @@

Re-identification

- + - - - - + @@ -13924,18 +15704,9 @@

Re-identification

- - - - - - - - - - - - + + + @@ -13949,47 +15720,41 @@

Re-identification

-
-

Remedy Control

+
+

Requirements Bias

TermReidentificationReputationalRisk Prefix risk
LabelRe-identificationReputational Risk
IRIhttps://w3id.org/dpv/risk#Reidentificationhttps://w3id.org/dpv/risk#ReputationalRisk
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskConcept
DefinitionSomething that acts as or causes Re-identificationRisks and issues that affect the reputation of the organisation
Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
Date Created2022-08-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - - + @@ -13998,28 +15763,37 @@

Remedy Control

- + - + + + + - + + + + - + - + + + + - @@ -14028,48 +15802,40 @@

Remedy Control

-
-

Remove Consequence

+
+

Reward

TermRemedyControlRequirementsBias Prefix risk
LabelRemedy ControlRequirements Bias
IRIhttps://w3id.org/dpv/risk#RemedyControlhttps://w3id.org/dpv/risk#RequirementsBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl to remedy consequences of eventBias that occurs in or during requirements creation
Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifest
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -14078,7 +15844,7 @@

Remove Consequence

- + @@ -14091,18 +15857,21 @@

Remove Consequence

- + - + + + + - + - @@ -14111,48 +15880,40 @@

Remove Consequence

-
-

Remove Impact

+
+

Prevent Exercising of Rights

TermRemoveConsequenceReward Prefix risk
LabelRemove ConsequenceReward
IRIhttps://w3id.org/dpv/risk#RemoveConsequencehttps://w3id.org/dpv/risk#Reward
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that removes Consequence i.e. prevents it from materialisingSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
Date Created2024-05-192024-04-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -14161,9 +15922,12 @@

Remove Impact

- + - + + + + @@ -14174,18 +15938,21 @@

Remove Impact

- + - + + + + - + - @@ -14194,46 +15961,48 @@

Remove Impact

-
-

Remove Source

+
+

Impact to Rights

TermRemoveImpactRightsExercisePrevention Prefix risk
LabelRemove ImpactPrevent Exercising of Rights
IRIhttps://w3id.org/dpv/risk#RemoveImpacthttps://w3id.org/dpv/risk#RightsExercisePrevention
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that removes Impact i.e. prevents it from materialisingSomething that acts as or causes Prevent Exercising of Rights
Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
Date Created2024-05-192022-08-18
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - @@ -14244,22 +16013,31 @@

Remove Source

- + - + + + + - + + + + - + - + + + + @@ -14268,7 +16046,7 @@

Remove Source

- @@ -14277,23 +16055,23 @@

Remove Source

-
-

Remuneration

+
+

Limitation of Rights

TermRemoveSourceRightsImpact Prefix risk
LabelRemove SourceImpact to Rights
IRIhttps://w3id.org/dpv/risk#RemoveSourcehttps://w3id.org/dpv/risk#RightsImpact
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Impact + → dpv:Consequence + → dpv:RiskConcept +
Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasConsequence, + dpv:hasImpact
DefinitionControl that removes the risk sourceSomething that acts as or causes Impact to Rights
Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -14305,7 +16083,7 @@

Remuneration

- @@ -14319,9 +16097,12 @@

Remuneration

- + - + + + + @@ -14332,7 +16113,7 @@

Remuneration

- + @@ -14355,23 +16136,23 @@

Remuneration

-
-

Reputational Risk

+
+

Violation of Rights

TermRenumerationRightsLimitation Prefix risk
LabelRemunerationLimitation of Rights
IRIhttps://w3id.org/dpv/risk#Renumerationhttps://w3id.org/dpv/risk#RightsLimitation
Broader/Parent types risk:FinancialImpact + risk:SocietalRiskdpv:RiskConcept
DefinitionSomething that acts as or provides renumeration which is in monetary or financial formSomething that acts as or causes Limitation of Rights
Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
Date Created2024-04-142022-08-18
Date Modified
- + - + - + @@ -14383,7 +16164,8 @@

Reputational Risk

- @@ -14396,9 +16178,12 @@

Reputational Risk

- + - + + + + @@ -14407,9 +16192,18 @@

Reputational Risk

- - - + + + + + + + + + + + + @@ -14420,39 +16214,42 @@

Reputational Risk

TermReputationalRiskRightsViolation Prefix risk
LabelReputational RiskViolation of Rights
IRIhttps://w3id.org/dpv/risk#ReputationalRiskhttps://w3id.org/dpv/risk#RightsViolation
Broader/Parent types dpv:RiskConcept + risk:SocietalRisk + → dpv:RiskConcept
DefinitionRisks and issues that affect the reputation of the organisationSomething that acts as or causes Violation of Rights
Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
Date Created2022-08-18
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
+ + + + - -
-

Reward

+
+

Risk Analysis

- + - + - + - + - @@ -14465,34 +16262,34 @@

Reward

- + - + + + + - + - - - - + - + - @@ -14500,37 +16297,35 @@

Reward

- -
-

Prevent Exercising of Rights

+
+

Risk Assessment

TermRewardRiskAnalysis Prefix risk
LabelRewardRisk Analysis
IRIhttps://w3id.org/dpv/risk#Rewardhttps://w3id.org/dpv/risk#RiskAnalysis
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
DefinitionSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or feeA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
SourceIEC 31010:2019
Date Created2024-04-142022-08-18
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- + - + - + - + - @@ -14543,37 +16338,31 @@

Prevent Exercising of Rights

- + - - - - + - + + + + - + - - - - - - - - + + - @@ -14581,49 +16370,44 @@

Prevent Exercising of Rights

- -
-

Impact to Rights

+
+

Risk Control

TermRightsExercisePreventionRiskAssessment Prefix risk
LabelPrevent Exercising of RightsRisk Assessment
IRIhttps://w3id.org/dpv/risk#RightsExercisePreventionhttps://w3id.org/dpv/risk#RiskAssessment
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskManagement
DefinitionSomething that acts as or causes Prevent Exercising of RightsAssessment of risk involving its identification, analysis, and evaluation
Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
Source
Date Created2022-08-182024-02-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- + - + - + - + - - - - @@ -14634,40 +16418,31 @@

Impact to Rights

- + - - - - + + + + - - - - + - + - - - - - - - - + + - @@ -14675,38 +16450,33 @@

Impact to Rights

- -
-

Limitation of Rights

+
+

Risk Management

TermRightsImpactRiskControl Prefix risk
LabelImpact to RightsRisk Control
IRIhttps://w3id.org/dpv/risk#RightsImpacthttps://w3id.org/dpv/risk#RiskControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types dpv:Impact - → dpv:Consequence - → dpv:RiskConcept -
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasConsequence, - dpv:hasImpact + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionSomething that acts as or causes Impact to RightsControl that modifies risk
Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in DEX
- + - + - + - + - - - + @@ -14718,37 +16488,31 @@

Limitation of Rights

- + - - - - + - + + + + - + - - - - - - - - + + - @@ -14757,36 +16521,36 @@

Limitation of Rights

-
-

Violation of Rights

+
+

Risk Matrix

TermRightsLimitationRiskManagement Prefix risk
LabelLimitation of RightsRisk Management
IRIhttps://w3id.org/dpv/risk#RightsLimitationhttps://w3id.org/dpv/risk#RiskManagement
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Limitation of RightsSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
Source
Date Created2022-08-182024-06-12
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- + - + - + - + - @@ -14799,77 +16563,72 @@

Violation of Rights

- + - - - - + - + + + + - + - - - - + - + -
TermRightsViolationRiskMatrix Prefix risk
LabelViolation of RightsRisk Matrix
IRIhttps://w3id.org/dpv/risk#RightsViolationhttps://w3id.org/dpv/risk#RiskMatrix
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAssessment
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
DefinitionSomething that acts as or causes Violation of RightsCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
SourceIEC 31010:2019
Date Created2022-08-182024-02-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- - - - -
-

Risk Analysis

+ +
+

Risk Matrix 3x3

- + - + - + - + - @@ -14883,23 +16642,20 @@

Risk Analysis

- + - - - - + - + @@ -14910,7 +16666,7 @@

Risk Analysis

- @@ -14918,35 +16674,38 @@

Risk Analysis

-
-

Risk Assessment

+ +
+

Risk Matrix 5x5

TermRiskAnalysisRiskMatrix3x3 Prefix risk
LabelRisk AnalysisRisk Matrix 3x3
IRIhttps://w3id.org/dpv/risk#RiskAnalysishttps://w3id.org/dpv/risk#RiskMatrix3x3
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types risk:RiskAssessment + risk:RiskMatrix + → risk:RiskAssessmentrisk:RiskManagement
DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
SourceIEC 31010:2019
Date Created2022-08-182022-08-17
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + - + - @@ -14959,31 +16718,31 @@

Risk Assessment

- + - - - - + - + - + + + + - @@ -14991,46 +16750,42 @@

Risk Assessment

-
-

Risk Control

+ +
+

Risk Matrix 7x7

TermRiskAssessmentRiskMatrix5x5 Prefix risk
LabelRisk AssessmentRisk Matrix 5x5
IRIhttps://w3id.org/dpv/risk#RiskAssessmenthttps://w3id.org/dpv/risk#RiskMatrix5x5
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types risk:RiskManagement + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
DefinitionAssessment of risk involving its identification, analysis, and evaluationA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
Source
Date Created2024-02-142022-08-17
ContributorsHarshvardhan J. Pandit
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + - + - - - - - + @@ -15039,13 +16794,10 @@

Risk Control

- + - - - @@ -15055,15 +16807,18 @@

Risk Control

- + - + + + + - @@ -15071,23 +16826,23 @@

Risk Control

-
-

Risk Management

+
+

Risk Source

TermRiskControlRiskMatrix7x7 Prefix risk
LabelRisk ControlRisk Matrix 7x7
IRIhttps://w3id.org/dpv/risk#RiskControlhttps://w3id.org/dpv/risk#RiskMatrix7x7
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that modifies riskA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
Date Created2024-05-192022-08-17
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in DEX + section RISK-MATRIX in RISK
- + - + - + @@ -15097,10 +16852,17 @@

Risk Management

- + + + - + + + + @@ -15109,25 +16871,25 @@

Risk Management

- + - - - - + - + - + + + + @@ -15142,35 +16904,37 @@

Risk Management

-
-

Risk Matrix

+
+

Low Risk (RM3x3 S:1 L:1)

TermRiskManagementRiskSource Prefix risk
LabelRisk ManagementRisk Source
IRIhttps://w3id.org/dpv/risk#RiskManagementhttps://w3id.org/dpv/risk#RiskSource
rdfs:Class, skos:Concept
Broader/Parent types dpv:RiskConcept +
Object of relation risk:hasRiskSource +
DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
Source
Date Created2024-06-122024-02-14
Date Modified2024-08-16
- + - + - + - + - @@ -15184,23 +16948,20 @@

Risk Matrix

- + - - - - + - + @@ -15211,7 +16972,7 @@

Risk Matrix

- @@ -15220,23 +16981,23 @@

Risk Matrix

-
-

Risk Matrix 3x3

+
+

Low Risk (RM3x3 S:1 L:2)

TermRiskMatrixRM3x3S1L1 Prefix risk
LabelRisk MatrixLow Risk (RM3x3 S:1 L:1)
IRIhttps://w3id.org/dpv/risk#RiskMatrixhttps://w3id.org/dpv/risk#RM3x3S1L1
Typerdfs:Class, skos:Concept, risk:RiskAssessmentrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types risk:RiskAssessment + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessmentrisk:RiskManagement
DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
SourceIEC 31010:2019
Date Created2024-02-142022-08-17
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + @@ -15248,7 +17009,8 @@

Risk Matrix 3x3

- @@ -15263,7 +17025,7 @@

Risk Matrix 3x3

- + @@ -15296,23 +17058,23 @@

Risk Matrix 3x3

-
-

Risk Matrix 5x5

+
+

Moderate Risk (RM3x3 S:1 L:3)

TermRiskMatrix3x3RM3x3S1L2 Prefix risk
LabelRisk Matrix 3x3Low Risk (RM3x3 S:1 L:2)
IRIhttps://w3id.org/dpv/risk#RiskMatrix3x3https://w3id.org/dpv/risk#RM3x3S1L2
Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
- + - + - + @@ -15324,7 +17086,8 @@

Risk Matrix 5x5

- @@ -15339,7 +17102,7 @@

Risk Matrix 5x5

- + @@ -15372,23 +17135,23 @@

Risk Matrix 5x5

-
-

Risk Matrix 7x7

+
+

Low Risk (RM3x3 S:2 L:1)

TermRiskMatrix5x5RM3x3S1L3 Prefix risk
LabelRisk Matrix 5x5Moderate Risk (RM3x3 S:1 L:3)
IRIhttps://w3id.org/dpv/risk#RiskMatrix5x5https://w3id.org/dpv/risk#RM3x3S1L3
Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
- + - + - + @@ -15400,7 +17163,8 @@

Risk Matrix 7x7

- @@ -15415,7 +17179,7 @@

Risk Matrix 7x7

- + @@ -15447,43 +17211,43 @@

Risk Matrix 7x7

-
-

Risk Source

+ +
+

Moderate Risk (RM3x3 S:2 L:2)

TermRiskMatrix7x7RM3x3S2L1 Prefix risk
LabelRisk Matrix 7x7Low Risk (RM3x3 S:2 L:1)
IRIhttps://w3id.org/dpv/risk#RiskMatrix7x7https://w3id.org/dpv/risk#RM3x3S2L1
Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
- + - + - + - + - - - - - + @@ -15492,7 +17256,7 @@

Risk Source

- + @@ -15505,18 +17269,18 @@

Risk Source

- + + - - - - + + + - @@ -15525,23 +17289,23 @@

Risk Source

-
-

Low Risk (RM3x3 S:1 L:1)

+
+

High Risk (RM3x3 S:2 L:3)

TermRiskSourceRM3x3S2L2 Prefix risk
LabelRisk SourceModerate Risk (RM3x3 S:2 L:2)
IRIhttps://w3id.org/dpv/risk#RiskSourcehttps://w3id.org/dpv/risk#RM3x3S2L2
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
Object of relation risk:hasRiskSource -
DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
Date Created2024-02-142022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + @@ -15569,7 +17333,7 @@

Low Risk (RM3x3 S:1 L:1)

- + @@ -15602,23 +17366,23 @@

Low Risk (RM3x3 S:1 L:1)

-
-

Low Risk (RM3x3 S:1 L:2)

+
+

Moderate Risk (RM3x3 S:3 L:1)

TermRM3x3S1L1RM3x3S2L3 Prefix risk
LabelLow Risk (RM3x3 S:1 L:1)High Risk (RM3x3 S:2 L:3)
IRIhttps://w3id.org/dpv/risk#RM3x3S1L1https://w3id.org/dpv/risk#RM3x3S2L3
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
- + - + - + @@ -15646,7 +17410,7 @@

Low Risk (RM3x3 S:1 L:2)

- + @@ -15679,23 +17443,23 @@

Low Risk (RM3x3 S:1 L:2)

-
-

Moderate Risk (RM3x3 S:1 L:3)

+
+

High Risk (RM3x3 S:3 L:2)

TermRM3x3S1L2RM3x3S3L1 Prefix risk
LabelLow Risk (RM3x3 S:1 L:2)Moderate Risk (RM3x3 S:3 L:1)
IRIhttps://w3id.org/dpv/risk#RM3x3S1L2https://w3id.org/dpv/risk#RM3x3S3L1
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -15723,7 +17487,7 @@

Moderate Risk (RM3x3 S:1 L:3)

- + @@ -15756,23 +17520,23 @@

Moderate Risk (RM3x3 S:1 L:3)

-
-

Low Risk (RM3x3 S:2 L:1)

+
+

High Risk (RM3x3 S:3 L:3)

TermRM3x3S1L3RM3x3S3L2 Prefix risk
LabelModerate Risk (RM3x3 S:1 L:3)High Risk (RM3x3 S:3 L:2)
IRIhttps://w3id.org/dpv/risk#RM3x3S1L3https://w3id.org/dpv/risk#RM3x3S3L2
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -15800,7 +17564,7 @@

Low Risk (RM3x3 S:2 L:1)

- + @@ -15833,23 +17597,23 @@

Low Risk (RM3x3 S:2 L:1)

-
-

Moderate Risk (RM3x3 S:2 L:2)

+
+

Very Low Risk (RM5x5 S:1 L:1)

TermRM3x3S2L1RM3x3S3L3 Prefix risk
LabelLow Risk (RM3x3 S:2 L:1)High Risk (RM3x3 S:3 L:3)
IRIhttps://w3id.org/dpv/risk#RM3x3S2L1https://w3id.org/dpv/risk#RM3x3S3L3
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
- + - + - + @@ -15861,7 +17625,7 @@

Moderate Risk (RM3x3 S:2 L:2)

- - + @@ -15910,23 +17674,23 @@

Moderate Risk (RM3x3 S:2 L:2)

-
-

High Risk (RM3x3 S:2 L:3)

+
+

Very Low Risk (RM5x5 S:1 L:2)

TermRM3x3S2L2RM5x5S1L1 Prefix risk
LabelModerate Risk (RM3x3 S:2 L:2)Very Low Risk (RM5x5 S:1 L:1)
IRIhttps://w3id.org/dpv/risk#RM3x3S2L2https://w3id.org/dpv/risk#RM5x5S1L1
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -15877,7 +17641,7 @@

Moderate Risk (RM3x3 S:2 L:2)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -15938,7 +17702,7 @@

High Risk (RM3x3 S:2 L:3)

- - + @@ -15987,23 +17751,23 @@

High Risk (RM3x3 S:2 L:3)

-
-

Moderate Risk (RM3x3 S:3 L:1)

+
+

Very Low Risk (RM5x5 S:1 L:3)

TermRM3x3S2L3RM5x5S1L2 Prefix risk
LabelHigh Risk (RM3x3 S:2 L:3)Very Low Risk (RM5x5 S:1 L:2)
IRIhttps://w3id.org/dpv/risk#RM3x3S2L3https://w3id.org/dpv/risk#RM5x5S1L2
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -15954,7 +17718,7 @@

High Risk (RM3x3 S:2 L:3)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
- + - + - + @@ -16015,7 +17779,7 @@

Moderate Risk (RM3x3 S:3 L:1)

- - + @@ -16064,23 +17828,23 @@

Moderate Risk (RM3x3 S:3 L:1)

-
-

High Risk (RM3x3 S:3 L:2)

+
+

Low Risk (RM5x5 S:1 L:4)

TermRM3x3S3L1RM5x5S1L3 Prefix risk
LabelModerate Risk (RM3x3 S:3 L:1)Very Low Risk (RM5x5 S:1 L:3)
IRIhttps://w3id.org/dpv/risk#RM3x3S3L1https://w3id.org/dpv/risk#RM5x5S1L3
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -16031,7 +17795,7 @@

Moderate Risk (RM3x3 S:3 L:1)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
- + - + - + @@ -16092,7 +17856,7 @@

High Risk (RM3x3 S:3 L:2)

- - + @@ -16141,23 +17905,23 @@

High Risk (RM3x3 S:3 L:2)

-
-

High Risk (RM3x3 S:3 L:3)

+
+

Low Risk (RM5x5 S:1 L:5)

TermRM3x3S3L2RM5x5S1L4 Prefix risk
LabelHigh Risk (RM3x3 S:3 L:2)Low Risk (RM5x5 S:1 L:4)
IRIhttps://w3id.org/dpv/risk#RM3x3S3L2https://w3id.org/dpv/risk#RM5x5S1L4
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -16108,7 +17872,7 @@

High Risk (RM3x3 S:3 L:2)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
- + - + - + @@ -16169,7 +17933,7 @@

High Risk (RM3x3 S:3 L:3)

- - + @@ -16218,23 +17982,23 @@

High Risk (RM3x3 S:3 L:3)

-
-

Very Low Risk (RM5x5 S:1 L:1)

+
+

Very Low Risk (RM5x5 S:2 L:1)

TermRM3x3S3L3RM5x5S1L5 Prefix risk
LabelHigh Risk (RM3x3 S:3 L:3)Low Risk (RM5x5 S:1 L:5)
IRIhttps://w3id.org/dpv/risk#RM3x3S3L3https://w3id.org/dpv/risk#RM5x5S1L5
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -16185,7 +17949,7 @@

High Risk (RM3x3 S:3 L:3)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
- + - + - + @@ -16262,7 +18026,7 @@

Very Low Risk (RM5x5 S:1 L:1)

- + @@ -16295,23 +18059,23 @@

Very Low Risk (RM5x5 S:1 L:1)

-
-

Very Low Risk (RM5x5 S:1 L:2)

+
+

Low Risk (RM5x5 S:2 L:2)

TermRM5x5S1L1RM5x5S2L1 Prefix risk
LabelVery Low Risk (RM5x5 S:1 L:1)Very Low Risk (RM5x5 S:2 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L1https://w3id.org/dpv/risk#RM5x5S2L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -16339,7 +18103,7 @@

Very Low Risk (RM5x5 S:1 L:2)

- + @@ -16372,23 +18136,23 @@

Very Low Risk (RM5x5 S:1 L:2)

-
-

Very Low Risk (RM5x5 S:1 L:3)

+
+

Moderate Risk (RM5x5 S:2 L:3)

TermRM5x5S1L2RM5x5S2L2 Prefix risk
LabelVery Low Risk (RM5x5 S:1 L:2)Low Risk (RM5x5 S:2 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L2https://w3id.org/dpv/risk#RM5x5S2L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
- + - + - + @@ -16416,7 +18180,7 @@

Very Low Risk (RM5x5 S:1 L:3)

- + @@ -16449,23 +18213,23 @@

Very Low Risk (RM5x5 S:1 L:3)

-
-

Low Risk (RM5x5 S:1 L:4)

+
+

Moderate Risk (RM5x5 S:2 L:4)

TermRM5x5S1L3RM5x5S2L3 Prefix risk
LabelVery Low Risk (RM5x5 S:1 L:3)Moderate Risk (RM5x5 S:2 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L3https://w3id.org/dpv/risk#RM5x5S2L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
- + - + - + @@ -16493,7 +18257,7 @@

Low Risk (RM5x5 S:1 L:4)

- + @@ -16526,23 +18290,23 @@

Low Risk (RM5x5 S:1 L:4)

-
-

Low Risk (RM5x5 S:1 L:5)

+
+

High Risk (RM5x5 S:2 L:5)

TermRM5x5S1L4RM5x5S2L4 Prefix risk
LabelLow Risk (RM5x5 S:1 L:4)Moderate Risk (RM5x5 S:2 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L4https://w3id.org/dpv/risk#RM5x5S2L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
- + - + - + @@ -16570,7 +18334,7 @@

Low Risk (RM5x5 S:1 L:5)

- + @@ -16603,23 +18367,23 @@

Low Risk (RM5x5 S:1 L:5)

-
-

Very Low Risk (RM5x5 S:2 L:1)

+
+

Very Low Risk (RM5x5 S:3 L:1)

TermRM5x5S1L5RM5x5S2L5 Prefix risk
LabelLow Risk (RM5x5 S:1 L:5)High Risk (RM5x5 S:2 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L5https://w3id.org/dpv/risk#RM5x5S2L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
- + - + - + @@ -16647,7 +18411,7 @@

Very Low Risk (RM5x5 S:2 L:1)

- + @@ -16680,23 +18444,23 @@

Very Low Risk (RM5x5 S:2 L:1)

-
-

Low Risk (RM5x5 S:2 L:2)

+
+

Moderate Risk (RM5x5 S:3 L:2)

TermRM5x5S2L1RM5x5S3L1 Prefix risk
LabelVery Low Risk (RM5x5 S:2 L:1)Very Low Risk (RM5x5 S:3 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L1https://w3id.org/dpv/risk#RM5x5S3L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -16724,7 +18488,7 @@

Low Risk (RM5x5 S:2 L:2)

- + @@ -16757,23 +18521,23 @@

Low Risk (RM5x5 S:2 L:2)

-
-

Moderate Risk (RM5x5 S:2 L:3)

+
+

Moderate Risk (RM5x5 S:3 L:3)

TermRM5x5S2L2RM5x5S3L2 Prefix risk
LabelLow Risk (RM5x5 S:2 L:2)Moderate Risk (RM5x5 S:3 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L2https://w3id.org/dpv/risk#RM5x5S3L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -16801,7 +18565,7 @@

Moderate Risk (RM5x5 S:2 L:3)

- + @@ -16834,23 +18598,23 @@

Moderate Risk (RM5x5 S:2 L:3)

-
-

Moderate Risk (RM5x5 S:2 L:4)

+
+

High Risk (RM5x5 S:3 L:4)

TermRM5x5S2L3RM5x5S3L3 Prefix risk
LabelModerate Risk (RM5x5 S:2 L:3)Moderate Risk (RM5x5 S:3 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L3https://w3id.org/dpv/risk#RM5x5S3L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
- + - + - + @@ -16878,7 +18642,7 @@

Moderate Risk (RM5x5 S:2 L:4)

- + @@ -16911,23 +18675,23 @@

Moderate Risk (RM5x5 S:2 L:4)

-
-

High Risk (RM5x5 S:2 L:5)

+
+

Very High Risk (RM5x5 S:3 L:5)

TermRM5x5S2L4RM5x5S3L4 Prefix risk
LabelModerate Risk (RM5x5 S:2 L:4)High Risk (RM5x5 S:3 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L4https://w3id.org/dpv/risk#RM5x5S3L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
- + - + - + @@ -16955,7 +18719,7 @@

High Risk (RM5x5 S:2 L:5)

- + @@ -16988,23 +18752,23 @@

High Risk (RM5x5 S:2 L:5)

-
-

Very Low Risk (RM5x5 S:3 L:1)

+
+

Low Risk (RM5x5 S:4 L:1)

TermRM5x5S2L5RM5x5S3L5 Prefix risk
LabelHigh Risk (RM5x5 S:2 L:5)Very High Risk (RM5x5 S:3 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L5https://w3id.org/dpv/risk#RM5x5S3L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -17032,7 +18796,7 @@

Very Low Risk (RM5x5 S:3 L:1)

- + @@ -17065,23 +18829,23 @@

Very Low Risk (RM5x5 S:3 L:1)

-
-

Moderate Risk (RM5x5 S:3 L:2)

+
+

Moderate Risk (RM5x5 S:4 L:2)

TermRM5x5S3L1RM5x5S4L1 Prefix risk
LabelVery Low Risk (RM5x5 S:3 L:1)Low Risk (RM5x5 S:4 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L1https://w3id.org/dpv/risk#RM5x5S4L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -17109,7 +18873,7 @@

Moderate Risk (RM5x5 S:3 L:2)

- + @@ -17142,23 +18906,23 @@

Moderate Risk (RM5x5 S:3 L:2)

-
-

Moderate Risk (RM5x5 S:3 L:3)

+
+

High Risk (RM5x5 S:4 L:3)

TermRM5x5S3L2RM5x5S4L2 Prefix risk
LabelModerate Risk (RM5x5 S:3 L:2)Moderate Risk (RM5x5 S:4 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L2https://w3id.org/dpv/risk#RM5x5S4L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -17186,7 +18950,7 @@

Moderate Risk (RM5x5 S:3 L:3)

- + @@ -17219,23 +18983,23 @@

Moderate Risk (RM5x5 S:3 L:3)

-
-

High Risk (RM5x5 S:3 L:4)

+
+

Very High Risk (RM5x5 S:4 L:4)

TermRM5x5S3L3RM5x5S4L3 Prefix risk
LabelModerate Risk (RM5x5 S:3 L:3)High Risk (RM5x5 S:4 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L3https://w3id.org/dpv/risk#RM5x5S4L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -17263,7 +19027,7 @@

High Risk (RM5x5 S:3 L:4)

- + @@ -17296,23 +19060,23 @@

High Risk (RM5x5 S:3 L:4)

-
-

Very High Risk (RM5x5 S:3 L:5)

+
+

Very High Risk (RM5x5 S:4 L:5)

TermRM5x5S3L4RM5x5S4L4 Prefix risk
LabelHigh Risk (RM5x5 S:3 L:4)Very High Risk (RM5x5 S:4 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L4https://w3id.org/dpv/risk#RM5x5S4L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -17340,7 +19104,7 @@

Very High Risk (RM5x5 S:3 L:5)

- + @@ -17373,23 +19137,23 @@

Very High Risk (RM5x5 S:3 L:5)

-
-

Low Risk (RM5x5 S:4 L:1)

+
+

Low Risk (RM5x5 S:5 L:1)

TermRM5x5S3L5RM5x5S4L5 Prefix risk
LabelVery High Risk (RM5x5 S:3 L:5)Very High Risk (RM5x5 S:4 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L5https://w3id.org/dpv/risk#RM5x5S4L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -17417,7 +19181,7 @@

Low Risk (RM5x5 S:4 L:1)

- + @@ -17450,23 +19214,23 @@

Low Risk (RM5x5 S:4 L:1)

-
-

Moderate Risk (RM5x5 S:4 L:2)

+
+

High Risk (RM5x5 S:5 L:2)

TermRM5x5S4L1RM5x5S5L1 Prefix risk
LabelLow Risk (RM5x5 S:4 L:1)Low Risk (RM5x5 S:5 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L1https://w3id.org/dpv/risk#RM5x5S5L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -17494,7 +19258,7 @@

Moderate Risk (RM5x5 S:4 L:2)

- + @@ -17527,23 +19291,23 @@

Moderate Risk (RM5x5 S:4 L:2)

-
-

High Risk (RM5x5 S:4 L:3)

+
+

High Risk (RM5x5 S:5 L:3)

TermRM5x5S4L2RM5x5S5L2 Prefix risk
LabelModerate Risk (RM5x5 S:4 L:2)High Risk (RM5x5 S:5 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L2https://w3id.org/dpv/risk#RM5x5S5L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
- + - + - + @@ -17571,7 +19335,7 @@

High Risk (RM5x5 S:4 L:3)

- + @@ -17604,23 +19368,23 @@

High Risk (RM5x5 S:4 L:3)

-
-

Very High Risk (RM5x5 S:4 L:4)

+
+

Very High Risk (RM5x5 S:5 L:4)

TermRM5x5S4L3RM5x5S5L3 Prefix risk
LabelHigh Risk (RM5x5 S:4 L:3)High Risk (RM5x5 S:5 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L3https://w3id.org/dpv/risk#RM5x5S5L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -17648,7 +19412,7 @@

Very High Risk (RM5x5 S:4 L:4)

- + @@ -17681,23 +19445,23 @@

Very High Risk (RM5x5 S:4 L:4)

-
-

Very High Risk (RM5x5 S:4 L:5)

+
+

Very High Risk (RM5x5 S:5 L:5)

TermRM5x5S4L4RM5x5S5L4 Prefix risk
LabelVery High Risk (RM5x5 S:4 L:4)Very High Risk (RM5x5 S:5 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L4https://w3id.org/dpv/risk#RM5x5S5L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -17725,7 +19489,7 @@

Very High Risk (RM5x5 S:4 L:5)

- + @@ -17758,23 +19522,23 @@

Very High Risk (RM5x5 S:4 L:5)

-
-

Low Risk (RM5x5 S:5 L:1)

+
+

Extremely Low Risk (RM7x7 S:1 L:1)

TermRM5x5S4L5RM5x5S5L5 Prefix risk
LabelVery High Risk (RM5x5 S:4 L:5)Very High Risk (RM5x5 S:5 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L5https://w3id.org/dpv/risk#RM5x5S5L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -17786,7 +19550,7 @@

Low Risk (RM5x5 S:5 L:1)

- - + @@ -17835,23 +19599,23 @@

Low Risk (RM5x5 S:5 L:1)

-
-

High Risk (RM5x5 S:5 L:2)

+
+

Extremely Low Risk (RM7x7 S:1 L:2)

TermRM5x5S5L1RM7x7S1L1 Prefix risk
LabelLow Risk (RM5x5 S:5 L:1)Extremely Low Risk (RM7x7 S:1 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L1https://w3id.org/dpv/risk#RM7x7S1L1
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17802,7 +19566,7 @@

Low Risk (RM5x5 S:5 L:1)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -17863,7 +19627,7 @@

High Risk (RM5x5 S:5 L:2)

- - + @@ -17912,23 +19676,23 @@

High Risk (RM5x5 S:5 L:2)

-
-

High Risk (RM5x5 S:5 L:3)

+
+

Extremely Low Risk (RM7x7 S:1 L:3)

TermRM5x5S5L2RM7x7S1L2 Prefix risk
LabelHigh Risk (RM5x5 S:5 L:2)Extremely Low Risk (RM7x7 S:1 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L2https://w3id.org/dpv/risk#RM7x7S1L2
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17879,7 +19643,7 @@

High Risk (RM5x5 S:5 L:2)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
- + - + - + @@ -17940,7 +19704,7 @@

High Risk (RM5x5 S:5 L:3)

- - + @@ -17989,23 +19753,23 @@

High Risk (RM5x5 S:5 L:3)

-
-

Very High Risk (RM5x5 S:5 L:4)

+
+

Very Low Risk (RM7x7 S:1 L:4)

TermRM5x5S5L3RM7x7S1L3 Prefix risk
LabelHigh Risk (RM5x5 S:5 L:3)Extremely Low Risk (RM7x7 S:1 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L3https://w3id.org/dpv/risk#RM7x7S1L3
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17956,7 +19720,7 @@

High Risk (RM5x5 S:5 L:3)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
- + - + - + @@ -18017,7 +19781,7 @@

Very High Risk (RM5x5 S:5 L:4)

- - + @@ -18066,23 +19830,23 @@

Very High Risk (RM5x5 S:5 L:4)

-
-

Very High Risk (RM5x5 S:5 L:5)

+
+

Very Low Risk (RM7x7 S:1 L:5)

TermRM5x5S5L4RM7x7S1L4 Prefix risk
LabelVery High Risk (RM5x5 S:5 L:4)Very Low Risk (RM7x7 S:1 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L4https://w3id.org/dpv/risk#RM7x7S1L4
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18033,7 +19797,7 @@

Very High Risk (RM5x5 S:5 L:4)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
- + - + - + @@ -18094,7 +19858,7 @@

Very High Risk (RM5x5 S:5 L:5)

- - + @@ -18143,23 +19907,23 @@

Very High Risk (RM5x5 S:5 L:5)

-
-

Extremely Low Risk (RM7x7 S:1 L:1)

+
+

Very Low Risk (RM7x7 S:1 L:6)

TermRM5x5S5L5RM7x7S1L5 Prefix risk
LabelVery High Risk (RM5x5 S:5 L:5)Very Low Risk (RM7x7 S:1 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L5https://w3id.org/dpv/risk#RM7x7S1L5
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18110,7 +19874,7 @@

Very High Risk (RM5x5 S:5 L:5)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
- + - + - + @@ -18187,7 +19951,7 @@

Extremely Low Risk (RM7x7 S:1 L:1)

- + @@ -18220,23 +19984,23 @@

Extremely Low Risk (RM7x7 S:1 L:1)

-
-

Extremely Low Risk (RM7x7 S:1 L:2)

+
+

Low Risk (RM7x7 S:1 L:7)

TermRM7x7S1L1RM7x7S1L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:1 L:1)Very Low Risk (RM7x7 S:1 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L1https://w3id.org/dpv/risk#RM7x7S1L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
- + - + - + @@ -18264,7 +20028,7 @@

Extremely Low Risk (RM7x7 S:1 L:2)

- + @@ -18297,23 +20061,23 @@

Extremely Low Risk (RM7x7 S:1 L:2)

-
-

Extremely Low Risk (RM7x7 S:1 L:3)

+
+

Extremely Low Risk (RM7x7 S:2 L:1)

TermRM7x7S1L2RM7x7S1L7 Prefix risk
LabelExtremely Low Risk (RM7x7 S:1 L:2)Low Risk (RM7x7 S:1 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L2https://w3id.org/dpv/risk#RM7x7S1L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
- + - + - + @@ -18341,7 +20105,7 @@

Extremely Low Risk (RM7x7 S:1 L:3)

- + @@ -18374,23 +20138,23 @@

Extremely Low Risk (RM7x7 S:1 L:3)

-
-

Very Low Risk (RM7x7 S:1 L:4)

+
+

Extremely Low Risk (RM7x7 S:2 L:2)

TermRM7x7S1L3RM7x7S2L1 Prefix risk
LabelExtremely Low Risk (RM7x7 S:1 L:3)Extremely Low Risk (RM7x7 S:2 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L3https://w3id.org/dpv/risk#RM7x7S2L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -18418,7 +20182,7 @@

Very Low Risk (RM7x7 S:1 L:4)

- + @@ -18451,23 +20215,23 @@

Very Low Risk (RM7x7 S:1 L:4)

-
-

Very Low Risk (RM7x7 S:1 L:5)

+
+

Very Low Risk (RM7x7 S:2 L:3)

TermRM7x7S1L4RM7x7S2L2 Prefix risk
LabelVery Low Risk (RM7x7 S:1 L:4)Extremely Low Risk (RM7x7 S:2 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L4https://w3id.org/dpv/risk#RM7x7S2L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
- + - + - + @@ -18495,7 +20259,7 @@

Very Low Risk (RM7x7 S:1 L:5)

- + @@ -18528,23 +20292,23 @@

Very Low Risk (RM7x7 S:1 L:5)

-
-

Very Low Risk (RM7x7 S:1 L:6)

+
+

Low Risk (RM7x7 S:2 L:4)

TermRM7x7S1L5RM7x7S2L3 Prefix risk
LabelVery Low Risk (RM7x7 S:1 L:5)Very Low Risk (RM7x7 S:2 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L5https://w3id.org/dpv/risk#RM7x7S2L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
- + - + - + @@ -18572,7 +20336,7 @@

Very Low Risk (RM7x7 S:1 L:6)

- + @@ -18605,23 +20369,23 @@

Very Low Risk (RM7x7 S:1 L:6)

-
-

Low Risk (RM7x7 S:1 L:7)

+
+

Low Risk (RM7x7 S:2 L:5)

TermRM7x7S1L6RM7x7S2L4 Prefix risk
LabelVery Low Risk (RM7x7 S:1 L:6)Low Risk (RM7x7 S:2 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L6https://w3id.org/dpv/risk#RM7x7S2L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
- + - + - + @@ -18649,7 +20413,7 @@

Low Risk (RM7x7 S:1 L:7)

- + @@ -18682,23 +20446,23 @@

Low Risk (RM7x7 S:1 L:7)

-
-

Extremely Low Risk (RM7x7 S:2 L:1)

+
+

Moderate Risk (RM7x7 S:2 L:6)

TermRM7x7S1L7RM7x7S2L5 Prefix risk
LabelLow Risk (RM7x7 S:1 L:7)Low Risk (RM7x7 S:2 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L7https://w3id.org/dpv/risk#RM7x7S2L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
- + - + - + @@ -18726,7 +20490,7 @@

Extremely Low Risk (RM7x7 S:2 L:1)

- + @@ -18759,23 +20523,23 @@

Extremely Low Risk (RM7x7 S:2 L:1)

-
-

Extremely Low Risk (RM7x7 S:2 L:2)

+
+

Moderate Risk (RM7x7 S:2 L:7)

TermRM7x7S2L1RM7x7S2L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:2 L:1)Moderate Risk (RM7x7 S:2 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L1https://w3id.org/dpv/risk#RM7x7S2L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
- + - + - + @@ -18803,7 +20567,7 @@

Extremely Low Risk (RM7x7 S:2 L:2)

- + @@ -18836,23 +20600,23 @@

Extremely Low Risk (RM7x7 S:2 L:2)

-
-

Very Low Risk (RM7x7 S:2 L:3)

+
+

Extremely Low Risk (RM7x7 S:3 L:1)

TermRM7x7S2L2RM7x7S2L7 Prefix risk
LabelExtremely Low Risk (RM7x7 S:2 L:2)Moderate Risk (RM7x7 S:2 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L2https://w3id.org/dpv/risk#RM7x7S2L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
- + - + - + @@ -18880,7 +20644,7 @@

Very Low Risk (RM7x7 S:2 L:3)

- + @@ -18913,23 +20677,23 @@

Very Low Risk (RM7x7 S:2 L:3)

-
-

Low Risk (RM7x7 S:2 L:4)

+
+

Very Low Risk (RM7x7 S:3 L:2)

TermRM7x7S2L3RM7x7S3L1 Prefix risk
LabelVery Low Risk (RM7x7 S:2 L:3)Extremely Low Risk (RM7x7 S:3 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L3https://w3id.org/dpv/risk#RM7x7S3L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -18957,7 +20721,7 @@

Low Risk (RM7x7 S:2 L:4)

- + @@ -18990,23 +20754,23 @@

Low Risk (RM7x7 S:2 L:4)

-
-

Low Risk (RM7x7 S:2 L:5)

+
+

Low Risk (RM7x7 S:3 L:3)

TermRM7x7S2L4RM7x7S3L2 Prefix risk
LabelLow Risk (RM7x7 S:2 L:4)Very Low Risk (RM7x7 S:3 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L4https://w3id.org/dpv/risk#RM7x7S3L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -19034,7 +20798,7 @@

Low Risk (RM7x7 S:2 L:5)

- + @@ -19067,23 +20831,23 @@

Low Risk (RM7x7 S:2 L:5)

-
-

Moderate Risk (RM7x7 S:2 L:6)

+
+

Moderate Risk (RM7x7 S:3 L:4)

TermRM7x7S2L5RM7x7S3L3 Prefix risk
LabelLow Risk (RM7x7 S:2 L:5)Low Risk (RM7x7 S:3 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L5https://w3id.org/dpv/risk#RM7x7S3L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
- + - + - + @@ -19111,7 +20875,7 @@

Moderate Risk (RM7x7 S:2 L:6)

- + @@ -19144,23 +20908,23 @@

Moderate Risk (RM7x7 S:2 L:6)

-
-

Moderate Risk (RM7x7 S:2 L:7)

+
+

High Risk (RM7x7 S:3 L:5)

TermRM7x7S2L6RM7x7S3L4 Prefix risk
LabelModerate Risk (RM7x7 S:2 L:6)Moderate Risk (RM7x7 S:3 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L6https://w3id.org/dpv/risk#RM7x7S3L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
- + - + - + @@ -19188,7 +20952,7 @@

Moderate Risk (RM7x7 S:2 L:7)

- + @@ -19221,23 +20985,23 @@

Moderate Risk (RM7x7 S:2 L:7)

-
-

Extremely Low Risk (RM7x7 S:3 L:1)

+
+

High Risk (RM7x7 S:3 L:6)

TermRM7x7S2L7RM7x7S3L5 Prefix risk
LabelModerate Risk (RM7x7 S:2 L:7)High Risk (RM7x7 S:3 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L7https://w3id.org/dpv/risk#RM7x7S3L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
- + - + - + @@ -19265,7 +21029,7 @@

Extremely Low Risk (RM7x7 S:3 L:1)

- + @@ -19298,23 +21062,23 @@

Extremely Low Risk (RM7x7 S:3 L:1)

-
-

Very Low Risk (RM7x7 S:3 L:2)

+
+

Very High Risk (RM7x7 S:3 L:7)

TermRM7x7S3L1RM7x7S3L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:3 L:1)High Risk (RM7x7 S:3 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L1https://w3id.org/dpv/risk#RM7x7S3L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
- + - + - + @@ -19342,7 +21106,7 @@

Very Low Risk (RM7x7 S:3 L:2)

- + @@ -19375,23 +21139,23 @@

Very Low Risk (RM7x7 S:3 L:2)

-
-

Low Risk (RM7x7 S:3 L:3)

+
+

Extremely Low Risk (RM7x7 S:4 L:1)

TermRM7x7S3L2RM7x7S3L7 Prefix risk
LabelVery Low Risk (RM7x7 S:3 L:2)Very High Risk (RM7x7 S:3 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L2https://w3id.org/dpv/risk#RM7x7S3L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
- + - + - + @@ -19419,7 +21183,7 @@

Low Risk (RM7x7 S:3 L:3)

- + @@ -19452,23 +21216,23 @@

Low Risk (RM7x7 S:3 L:3)

-
-

Moderate Risk (RM7x7 S:3 L:4)

+
+

Low Risk (RM7x7 S:4 L:2)

TermRM7x7S3L3RM7x7S4L1 Prefix risk
LabelLow Risk (RM7x7 S:3 L:3)Extremely Low Risk (RM7x7 S:4 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L3https://w3id.org/dpv/risk#RM7x7S4L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -19496,7 +21260,7 @@

Moderate Risk (RM7x7 S:3 L:4)

- + @@ -19529,23 +21293,23 @@

Moderate Risk (RM7x7 S:3 L:4)

-
-

High Risk (RM7x7 S:3 L:5)

+
+

Moderate Risk (RM7x7 S:4 L:3)

TermRM7x7S3L4RM7x7S4L2 Prefix risk
LabelModerate Risk (RM7x7 S:3 L:4)Low Risk (RM7x7 S:4 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L4https://w3id.org/dpv/risk#RM7x7S4L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -19573,7 +21337,7 @@

High Risk (RM7x7 S:3 L:5)

- + @@ -19606,23 +21370,23 @@

High Risk (RM7x7 S:3 L:5)

-
-

High Risk (RM7x7 S:3 L:6)

+
+

High Risk (RM7x7 S:4 L:4)

TermRM7x7S3L5RM7x7S4L3 Prefix risk
LabelHigh Risk (RM7x7 S:3 L:5)Moderate Risk (RM7x7 S:4 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L5https://w3id.org/dpv/risk#RM7x7S4L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -19650,7 +21414,7 @@

High Risk (RM7x7 S:3 L:6)

- + @@ -19683,23 +21447,23 @@

High Risk (RM7x7 S:3 L:6)

-
-

Very High Risk (RM7x7 S:3 L:7)

+
+

High Risk (RM7x7 S:4 L:5)

TermRM7x7S3L6RM7x7S4L4 Prefix risk
LabelHigh Risk (RM7x7 S:3 L:6)High Risk (RM7x7 S:4 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L6https://w3id.org/dpv/risk#RM7x7S4L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -19727,7 +21491,7 @@

Very High Risk (RM7x7 S:3 L:7)

- + @@ -19760,23 +21524,23 @@

Very High Risk (RM7x7 S:3 L:7)

-
-

Extremely Low Risk (RM7x7 S:4 L:1)

+
+

Very High Risk (RM7x7 S:4 L:6)

TermRM7x7S3L7RM7x7S4L5 Prefix risk
LabelVery High Risk (RM7x7 S:3 L:7)High Risk (RM7x7 S:4 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L7https://w3id.org/dpv/risk#RM7x7S4L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
- + - + - + @@ -19804,7 +21568,7 @@

Extremely Low Risk (RM7x7 S:4 L:1)

- + @@ -19837,23 +21601,23 @@

Extremely Low Risk (RM7x7 S:4 L:1)

-
-

Low Risk (RM7x7 S:4 L:2)

+
+

Very High Risk (RM7x7 S:4 L:7)

TermRM7x7S4L1RM7x7S4L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:4 L:1)Very High Risk (RM7x7 S:4 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L1https://w3id.org/dpv/risk#RM7x7S4L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -19881,7 +21645,7 @@

Low Risk (RM7x7 S:4 L:2)

- + @@ -19914,23 +21678,23 @@

Low Risk (RM7x7 S:4 L:2)

-
-

Moderate Risk (RM7x7 S:4 L:3)

+
+

Very Low Risk (RM7x7 S:5 L:1)

TermRM7x7S4L2RM7x7S4L7 Prefix risk
LabelLow Risk (RM7x7 S:4 L:2)Very High Risk (RM7x7 S:4 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L2https://w3id.org/dpv/risk#RM7x7S4L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
- + - + - + @@ -19958,7 +21722,7 @@

Moderate Risk (RM7x7 S:4 L:3)

- + @@ -19991,23 +21755,23 @@

Moderate Risk (RM7x7 S:4 L:3)

-
-

High Risk (RM7x7 S:4 L:4)

+
+

Low Risk (RM7x7 S:5 L:2)

TermRM7x7S4L3RM7x7S5L1 Prefix risk
LabelModerate Risk (RM7x7 S:4 L:3)Very Low Risk (RM7x7 S:5 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L3https://w3id.org/dpv/risk#RM7x7S5L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
- + - + - + @@ -20035,7 +21799,7 @@

High Risk (RM7x7 S:4 L:4)

- + @@ -20068,23 +21832,23 @@

High Risk (RM7x7 S:4 L:4)

-
-

High Risk (RM7x7 S:4 L:5)

+
+

Moderate Risk (RM7x7 S:5 L:3)

TermRM7x7S4L4RM7x7S5L2 Prefix risk
LabelHigh Risk (RM7x7 S:4 L:4)Low Risk (RM7x7 S:5 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L4https://w3id.org/dpv/risk#RM7x7S5L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -20112,7 +21876,7 @@

High Risk (RM7x7 S:4 L:5)

- + @@ -20145,23 +21909,23 @@

High Risk (RM7x7 S:4 L:5)

-
-

Very High Risk (RM7x7 S:4 L:6)

+
+

High Risk (RM7x7 S:5 L:4)

TermRM7x7S4L5RM7x7S5L3 Prefix risk
LabelHigh Risk (RM7x7 S:4 L:5)Moderate Risk (RM7x7 S:5 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L5https://w3id.org/dpv/risk#RM7x7S5L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -20189,7 +21953,7 @@

Very High Risk (RM7x7 S:4 L:6)

- + @@ -20222,23 +21986,23 @@

Very High Risk (RM7x7 S:4 L:6)

-
-

Very High Risk (RM7x7 S:4 L:7)

+
+

Very High Risk (RM7x7 S:5 L:5)

TermRM7x7S4L6RM7x7S5L4 Prefix risk
LabelVery High Risk (RM7x7 S:4 L:6)High Risk (RM7x7 S:5 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L6https://w3id.org/dpv/risk#RM7x7S5L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -20266,7 +22030,7 @@

Very High Risk (RM7x7 S:4 L:7)

- + @@ -20299,23 +22063,23 @@

Very High Risk (RM7x7 S:4 L:7)

-
-

Very Low Risk (RM7x7 S:5 L:1)

+
+

Extremely High Risk (RM7x7 S:5 L:6)

TermRM7x7S4L7RM7x7S5L5 Prefix risk
LabelVery High Risk (RM7x7 S:4 L:7)Very High Risk (RM7x7 S:5 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L7https://w3id.org/dpv/risk#RM7x7S5L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -20343,7 +22107,7 @@

Very Low Risk (RM7x7 S:5 L:1)

- + @@ -20376,23 +22140,23 @@

Very Low Risk (RM7x7 S:5 L:1)

-
-

Low Risk (RM7x7 S:5 L:2)

+
+

Extremely High Risk (RM7x7 S:5 L:7)

TermRM7x7S5L1RM7x7S5L6 Prefix risk
LabelVery Low Risk (RM7x7 S:5 L:1)Extremely High Risk (RM7x7 S:5 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L1https://w3id.org/dpv/risk#RM7x7S5L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
- + - + - + @@ -20420,7 +22184,7 @@

Low Risk (RM7x7 S:5 L:2)

- + @@ -20453,23 +22217,23 @@

Low Risk (RM7x7 S:5 L:2)

-
-

Moderate Risk (RM7x7 S:5 L:3)

+
+

Very Low Risk (RM7x7 S:6 L:1)

TermRM7x7S5L2RM7x7S5L7 Prefix risk
LabelLow Risk (RM7x7 S:5 L:2)Extremely High Risk (RM7x7 S:5 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L2https://w3id.org/dpv/risk#RM7x7S5L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
- + - + - + @@ -20497,7 +22261,7 @@

Moderate Risk (RM7x7 S:5 L:3)

- + @@ -20530,23 +22294,23 @@

Moderate Risk (RM7x7 S:5 L:3)

-
-

High Risk (RM7x7 S:5 L:4)

+
+

Moderate Risk (RM7x7 S:6 L:2)

TermRM7x7S5L3RM7x7S6L1 Prefix risk
LabelModerate Risk (RM7x7 S:5 L:3)Very Low Risk (RM7x7 S:6 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L3https://w3id.org/dpv/risk#RM7x7S6L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
- + - + - + @@ -20574,7 +22338,7 @@

High Risk (RM7x7 S:5 L:4)

- + @@ -20607,23 +22371,23 @@

High Risk (RM7x7 S:5 L:4)

-
-

Very High Risk (RM7x7 S:5 L:5)

+
+

High Risk (RM7x7 S:6 L:3)

TermRM7x7S5L4RM7x7S6L2 Prefix risk
LabelHigh Risk (RM7x7 S:5 L:4)Moderate Risk (RM7x7 S:6 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L4https://w3id.org/dpv/risk#RM7x7S6L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
- + - + - + @@ -20651,7 +22415,7 @@

Very High Risk (RM7x7 S:5 L:5)

- + @@ -20684,23 +22448,23 @@

Very High Risk (RM7x7 S:5 L:5)

-
-

Extremely High Risk (RM7x7 S:5 L:6)

+
+

Very High Risk (RM7x7 S:6 L:4)

TermRM7x7S5L5RM7x7S6L3 Prefix risk
LabelVery High Risk (RM7x7 S:5 L:5)High Risk (RM7x7 S:6 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L5https://w3id.org/dpv/risk#RM7x7S6L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
- + - + - + @@ -20728,7 +22492,7 @@

Extremely High Risk (RM7x7 S:5 L:6)

- + @@ -20761,23 +22525,23 @@

Extremely High Risk (RM7x7 S:5 L:6)

-
-

Extremely High Risk (RM7x7 S:5 L:7)

+
+

Very High Risk (RM7x7 S:6 L:5)

TermRM7x7S5L6RM7x7S6L4 Prefix risk
LabelExtremely High Risk (RM7x7 S:5 L:6)Very High Risk (RM7x7 S:6 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L6https://w3id.org/dpv/risk#RM7x7S6L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
- + - + - + @@ -20805,7 +22569,7 @@

Extremely High Risk (RM7x7 S:5 L:7)

- + @@ -20838,23 +22602,23 @@

Extremely High Risk (RM7x7 S:5 L:7)

-
-

Very Low Risk (RM7x7 S:6 L:1)

+
+

Extremely High Risk (RM7x7 S:6 L:6)

TermRM7x7S5L7RM7x7S6L5 Prefix risk
LabelExtremely High Risk (RM7x7 S:5 L:7)Very High Risk (RM7x7 S:6 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L7https://w3id.org/dpv/risk#RM7x7S6L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -20882,7 +22646,7 @@

Very Low Risk (RM7x7 S:6 L:1)

- + @@ -20915,23 +22679,23 @@

Very Low Risk (RM7x7 S:6 L:1)

-
-

Moderate Risk (RM7x7 S:6 L:2)

+
+

Extremely High Risk (RM7x7 S:6 L:7)

TermRM7x7S6L1RM7x7S6L6 Prefix risk
LabelVery Low Risk (RM7x7 S:6 L:1)Extremely High Risk (RM7x7 S:6 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L1https://w3id.org/dpv/risk#RM7x7S6L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
- + - + - + @@ -20959,7 +22723,7 @@

Moderate Risk (RM7x7 S:6 L:2)

- + @@ -20992,23 +22756,23 @@

Moderate Risk (RM7x7 S:6 L:2)

-
-

High Risk (RM7x7 S:6 L:3)

+
+

Low Risk (RM7x7 S:7 L:1)

TermRM7x7S6L2RM7x7S6L7 Prefix risk
LabelModerate Risk (RM7x7 S:6 L:2)Extremely High Risk (RM7x7 S:6 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L2https://w3id.org/dpv/risk#RM7x7S6L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
- + - + - + @@ -21036,7 +22800,7 @@

High Risk (RM7x7 S:6 L:3)

- + @@ -21069,23 +22833,23 @@

High Risk (RM7x7 S:6 L:3)

-
-

Very High Risk (RM7x7 S:6 L:4)

+
+

Moderate Risk (RM7x7 S:7 L:2)

TermRM7x7S6L3RM7x7S7L1 Prefix risk
LabelHigh Risk (RM7x7 S:6 L:3)Low Risk (RM7x7 S:7 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L3https://w3id.org/dpv/risk#RM7x7S7L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
- + - + - + @@ -21113,7 +22877,7 @@

Very High Risk (RM7x7 S:6 L:4)

- + @@ -21146,23 +22910,23 @@

Very High Risk (RM7x7 S:6 L:4)

-
-

Very High Risk (RM7x7 S:6 L:5)

+
+

High Risk (RM7x7 S:7 L:3)

TermRM7x7S6L4RM7x7S7L2 Prefix risk
LabelVery High Risk (RM7x7 S:6 L:4)Moderate Risk (RM7x7 S:7 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L4https://w3id.org/dpv/risk#RM7x7S7L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
- + - + - + @@ -21190,7 +22954,7 @@

Very High Risk (RM7x7 S:6 L:5)

- + @@ -21223,23 +22987,23 @@

Very High Risk (RM7x7 S:6 L:5)

-
-

Extremely High Risk (RM7x7 S:6 L:6)

+
+

Very High Risk (RM7x7 S:7 L:4)

TermRM7x7S6L5RM7x7S7L3 Prefix risk
LabelVery High Risk (RM7x7 S:6 L:5)High Risk (RM7x7 S:7 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L5https://w3id.org/dpv/risk#RM7x7S7L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
- + - + - + @@ -21267,7 +23031,7 @@

Extremely High Risk (RM7x7 S:6 L:6)

- + @@ -21300,23 +23064,23 @@

Extremely High Risk (RM7x7 S:6 L:6)

-
-

Extremely High Risk (RM7x7 S:6 L:7)

+
+

Extremely High Risk (RM7x7 S:7 L:5)

TermRM7x7S6L6RM7x7S7L4 Prefix risk
LabelExtremely High Risk (RM7x7 S:6 L:6)Very High Risk (RM7x7 S:7 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L6https://w3id.org/dpv/risk#RM7x7S7L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
- + - + - + @@ -21344,7 +23108,7 @@

Extremely High Risk (RM7x7 S:6 L:7)

- + @@ -21377,23 +23141,23 @@

Extremely High Risk (RM7x7 S:6 L:7)

-
-

Low Risk (RM7x7 S:7 L:1)

+
+

Extremely High Risk (RM7x7 S:7 L:6)

TermRM7x7S6L7RM7x7S7L5 Prefix risk
LabelExtremely High Risk (RM7x7 S:6 L:7)Extremely High Risk (RM7x7 S:7 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L7https://w3id.org/dpv/risk#RM7x7S7L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
- + - + - + @@ -21421,7 +23185,7 @@

Low Risk (RM7x7 S:7 L:1)

- + @@ -21454,23 +23218,23 @@

Low Risk (RM7x7 S:7 L:1)

-
-

Moderate Risk (RM7x7 S:7 L:2)

+
+

Extremely High Risk (RM7x7 S:7 L:7)

TermRM7x7S7L1RM7x7S7L6 Prefix risk
LabelLow Risk (RM7x7 S:7 L:1)Extremely High Risk (RM7x7 S:7 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S7L1https://w3id.org/dpv/risk#RM7x7S7L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
- + - + - + @@ -21498,7 +23262,7 @@

Moderate Risk (RM7x7 S:7 L:2)

- + @@ -21531,38 +23295,37 @@

Moderate Risk (RM7x7 S:7 L:2)

-
-

High Risk (RM7x7 S:7 L:3)

+
+

Rule-Based System Design

TermRM7x7S7L2RM7x7S7L7 Prefix risk
LabelModerate Risk (RM7x7 S:7 L:2)Extremely High Risk (RM7x7 S:7 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S7L2https://w3id.org/dpv/risk#RM7x7S7L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
- + - + - + - + - @@ -21575,31 +23338,37 @@

High Risk (RM7x7 S:7 L:3)

- + - + + + + - + + + + - + - + - @@ -21608,38 +23377,42 @@

High Risk (RM7x7 S:7 L:3)

-
-

Very High Risk (RM7x7 S:7 L:4)

+
+

Sabotage

TermRM7x7S7L3RuleBasedSystemDesign Prefix risk
LabelHigh Risk (RM7x7 S:7 L:3)Rule-Based System Design
IRIhttps://w3id.org/dpv/risk#RM7x7S7L3https://w3id.org/dpv/risk#RuleBasedSystemDesign
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighBias that occurs due to developer experience and expert advice having a significant influence on rule-based system design
Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
Source
Date Created2022-08-172024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-MATRIX in RISK + section BIAS in RISK
- + - + - + - + - + + + + @@ -21652,14 +23425,17 @@

Very High Risk (RM7x7 S:7 L:4)

- + - + + + + @@ -21667,7 +23443,10 @@

Very High Risk (RM7x7 S:7 L:4)

- + + + + @@ -21676,7 +23455,7 @@

Very High Risk (RM7x7 S:7 L:4)

- @@ -21685,38 +23464,39 @@

Very High Risk (RM7x7 S:7 L:4)

-
-

Extremely High Risk (RM7x7 S:7 L:5)

+
+

Sampling Bias

TermRM7x7S7L4Sabotage Prefix risk
LabelVery High Risk (RM7x7 S:7 L:4)Sabotage
IRIhttps://w3id.org/dpv/risk#RM7x7S7L4https://w3id.org/dpv/risk#Sabotage
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:AvailabilityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighSomething that acts as or causes Sabotage
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created 2022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-MATRIX in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - + + @@ -21729,31 +23509,34 @@

Extremely High Risk (RM7x7 S:7 L:5)

- + - + + + + - + - + - @@ -21762,38 +23545,39 @@

Extremely High Risk (RM7x7 S:7 L:5)

-
-

Extremely High Risk (RM7x7 S:7 L:6)

+
+

Scam

TermRM7x7S7L5SamplingBias Prefix risk
LabelExtremely High Risk (RM7x7 S:7 L:5)Sampling Bias
IRIhttps://w3id.org/dpv/risk#RM7x7S7L5https://w3id.org/dpv/risk#SamplingBias
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement +
Broader/Parent types risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighBias that occurs when data records are not collected randomly from the intended population
Source
Date Created2022-08-172024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-MATRIX in RISK + section BIAS in RISK
- + - + - + - + - + + @@ -21806,14 +23590,17 @@

Extremely High Risk (RM7x7 S:7 L:6)

- + - + + + + @@ -21821,7 +23608,10 @@

Extremely High Risk (RM7x7 S:7 L:6)

- + + + + @@ -21830,7 +23620,7 @@

Extremely High Risk (RM7x7 S:7 L:6)

- @@ -21839,38 +23629,45 @@

Extremely High Risk (RM7x7 S:7 L:6)

-
-

Extremely High Risk (RM7x7 S:7 L:7)

+
+

Security Attack

TermRM7x7S7L6Scam Prefix risk
LabelExtremely High Risk (RM7x7 S:7 L:6)Scam
IRIhttps://w3id.org/dpv/risk#RM7x7S7L6https://w3id.org/dpv/risk#Scam
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighSomething that acts as or causes Scam
SourceISO/IEC 27005:2018
Date Created 2022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-MATRIX in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + + + + + @@ -21883,7 +23680,7 @@

Extremely High Risk (RM7x7 S:7 L:7)

- + @@ -21894,20 +23691,14 @@

Extremely High Risk (RM7x7 S:7 L:7)

- - - - + - - - - + - @@ -21916,23 +23707,23 @@

Extremely High Risk (RM7x7 S:7 L:7)

-
-

Sabotage

+
+

Security Breach

TermRM7x7S7L7SecurityAttack Prefix risk
LabelExtremely High Risk (RM7x7 S:7 L:7)Security Attack
IRIhttps://w3id.org/dpv/risk#RM7x7S7L7https://w3id.org/dpv/risk#SecurityAttack
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:AvailabilityConcept +
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighSomething that acts as or causes an attack on security with the aim of undermining it
Date Created2022-08-17
ContributorsHarshvardhan J. Pandit
See More: section RISK-MATRIX in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -21947,11 +23738,14 @@

Sabotage

- + + @@ -21964,7 +23758,7 @@

Sabotage

- + @@ -21973,7 +23767,7 @@

Sabotage

- + @@ -22003,39 +23797,38 @@

Sabotage

-
-

Scam

+
+

Selection Bias

TermSabotageSecurityBreach Prefix risk
LabelSabotageSecurity Breach
IRIhttps://w3id.org/dpv/risk#Sabotagehttps://w3id.org/dpv/risk#SecurityBreach
risk:AvailabilityConcept
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:ConfidentialityConcept
Broader/Parent types risk:IntegrityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
DefinitionSomething that acts as or causes SabotageSomething that acts as or causes Security Breach
SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
- + - + - + - + - - - @@ -22048,7 +23841,7 @@

Scam

- + @@ -22057,28 +23850,25 @@

Scam

- + - + - - - - + - + - @@ -22087,23 +23877,28 @@

Scam

-
-

Security Attack

+ + + + + +
+

Sexual Violence

TermScamSelectionBias Prefix risk
LabelScamSelection Bias
IRIhttps://w3id.org/dpv/risk#Scamhttps://w3id.org/dpv/risk#SelectionBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes ScamBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + @@ -22115,17 +23910,7 @@

Security Attack

- - - - - - - @@ -22138,20 +23923,32 @@

Security Attack

- + - + + + + - - - + + + + + + + + + + + + @@ -22165,49 +23962,47 @@

Security Attack

-
-

Security Breach

+
+

Share Risk

TermSecurityAttackSexualViolence Prefix risk
LabelSecurity AttackSexual Violence
IRIhttps://w3id.org/dpv/risk#SecurityAttackhttps://w3id.org/dpv/risk#SexualViolence
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
Broader/Parent types risk:IntegrityConcept + risk:IndividualRisk
DefinitionSomething that acts as or causes an attack on security with the aim of undermining itSomething that acts as or causes Sexual Violence
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - - - - - + + + + @@ -22216,28 +24011,22 @@

Security Breach

- + - - - - + - + - - - - + @@ -22246,7 +24035,7 @@

Security Breach

- @@ -22255,40 +24044,37 @@

Security Breach

- - - - - -
-

Sexual Violence

+
+

Simpson'S Paradox Bias

TermSecurityBreachShareRisk Prefix risk
LabelSecurity BreachShare Risk
IRIhttps://w3id.org/dpv/risk#SecurityBreachhttps://w3id.org/dpv/risk#ShareRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:IntegrityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Security BreachRisk Mitigation Measure that shares Risk e.g. amongst stakeholders
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - @@ -22301,7 +24087,7 @@

Sexual Violence

- + @@ -22310,28 +24096,25 @@

Sexual Violence

- + - + - - - - + - + - @@ -22340,47 +24123,40 @@

Sexual Violence

-
-

Share Risk

+
+

Social Disadvantage

TermSexualViolenceSimpsonsParadoxBias Prefix risk
LabelSexual ViolenceSimpson'S Paradox Bias
IRIhttps://w3id.org/dpv/risk#SexualViolencehttps://w3id.org/dpv/risk#SimpsonsParadoxBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:IndividualRisk + risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Sexual ViolenceBias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -22389,7 +24165,7 @@

Share Risk

- + @@ -22402,18 +24178,21 @@

Share Risk

- + - + + + + - + - @@ -22422,36 +24201,37 @@

Share Risk

-
-

Social Disadvantage

+
+

Societal Bias

TermShareRiskSocialDisadvantage Prefix risk
LabelShare RiskSocial Disadvantage
IRIhttps://w3id.org/dpv/risk#ShareRiskhttps://w3id.org/dpv/risk#SocialDisadvantage
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionRisk Mitigation Measure that shares Risk e.g. amongst stakeholdersSomething that acts as or causes Social Disadvantage
Date Created2024-05-192022-08-19
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - @@ -22464,34 +24244,34 @@

Social Disadvantage

- + - + + + + - + - - - - + - + - @@ -22807,6 +24587,85 @@

Spoofing

+
+

Statistical Bias

+
TermSocialDisadvantageSocietalBias Prefix risk
LabelSocial DisadvantageSocietal Bias
IRIhttps://w3id.org/dpv/risk#SocialDisadvantagehttps://w3id.org/dpv/risk#SocietalBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Social DisadvantageBias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society
Source
Date Created2022-08-192024-09-13
Date Modified2024-08-16
ContributorsGeorg P. KrogDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermStatisticalBiasPrefixrisk
LabelStatistical Bias
IRIhttps://w3id.org/dpv/risk#StatisticalBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:DataBias + → risk:Bias + → risk:RiskConcept +
DefinitionBias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in RISK +
+
+ + +

System Failure

@@ -26016,6 +27875,10 @@

Properties

+ + + + @@ -26200,6 +28063,15 @@

caused by vulnerability

+ + + + + + + + + @@ -26236,6 +28108,18 @@

caused by vulnerability

+ + + + + + + + + + + + @@ -26364,6 +28248,9 @@

exploits vulnerability

+ + + @@ -26756,6 +28643,9 @@

has vulnerability

+ + + @@ -26824,6 +28714,12 @@

has vulnerability

+ + + + + + @@ -27088,6 +28984,15 @@

is vulnerability of

+ + + + + + + + + @@ -27209,6 +29114,9 @@

refers to risk

+ + + @@ -27611,6 +29519,24 @@

refers to risk

+ + + + + + + + + + + + + + + + + + @@ -27768,13 +29694,23 @@

External

+ + + + + + + + + + @@ -27801,9 +29737,12 @@

External

+ + + @@ -27817,6 +29756,18 @@

External

+ + + + + + + + + + + + @@ -27909,6 +29860,11 @@

External

+ + + + + @@ -27917,6 +29873,7 @@

External

+ @@ -28013,16 +29970,31 @@

External

+ + + + + + + + + + + + + + + @@ -28184,6 +30156,9 @@

External

+ + + @@ -28472,10 +30447,28 @@

External

+ + + + + + + + + + + + + + + + + + @@ -28615,6 +30608,7 @@

Contributors

  • Axel Polleres (Vienna University of Economics and Business)
  • Beatriz Esteves (IDLab, IMEC, Ghent University)
  • +
  • Daniel Doherty ()
  • Delaram Golpayegani (ADAPT Centre, Trinity College Dublin)
  • Fajar Ekaputra (Vienna University of Technology)
  • Georg P. Krog (Signatu AS)
  • diff --git a/2.1-dev/risk/risk-owl.html b/2.1-dev/risk/risk-owl.html index 7b3de49fc..27850fa79 100644 --- a/2.1-dev/risk/risk-owl.html +++ b/2.1-dev/risk/risk-owl.html @@ -1734,6 +1734,86 @@

    Benefit

    +
    +

    Bias

    +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermBiasPrefixrisk-owl
LabelBias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#Bias
+ https://w3id.org/dpv/risk#Bias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of risk-owl:RiskConcept +
DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inAi Bias
+
+ + + +

Blackmail

@@ -2169,6 +2249,86 @@

Coercion

+
+

Cognitive Bias

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermCognitiveBiasPrefixrisk-owl
LabelCognitive Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#CognitiveBias
+ https://w3id.org/dpv/risk#CognitiveBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of risk-owl:Bias + → risk-owl:RiskConcept +
DefinitionBias that occurs when humans are processing and interpreting information
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inAi Bias
+
+ + +

Compensation

@@ -2769,25 +2929,25 @@

Confidentiality Incident

-
-

Consequence Control

+
+

Confirmation Bias

- + - + @@ -2796,25 +2956,19 @@

Consequence Control

- - - - - + @@ -2823,29 +2977,32 @@

Consequence Control

- + - + + + + - + - + - +
TermConsequenceControlConfirmationBias Prefix risk-owl
LabelConsequence ControlConfirmation Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ConsequenceControl
- https://w3id.org/dpv/risk#ConsequenceControl + https://w3id.org/dpv/risk/owl/#ConfirmationBias
+ https://w3id.org/dpv/risk#ConfirmationBias
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , risk-owl:RiskConcept
Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionRisk Mitigation Measure that controls the ConsequencesBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information
Source
Date Created2024-05-192024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
Documented inRisk Risk-controlsRisk Bias
@@ -2853,25 +3010,25 @@

Consequence Control

-
-

Containment Control

+
+

Confounding Variables Bias

- + - + @@ -2880,25 +3037,20 @@

Containment Control

- - - - - + @@ -2907,26 +3059,32 @@

Containment Control

- + - + + + + - + - + + + + - +
TermContainmentControlConfoundingVariablesBias Prefix risk-owl
LabelContainment ControlConfounding Variables Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ContainmentControl
- https://w3id.org/dpv/risk#ContainmentControl + https://w3id.org/dpv/risk/owl/#ConfoundingVariablesBias
+ https://w3id.org/dpv/risk#ConfoundingVariablesBias
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , risk-owl:RiskConcept
Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:StatisticalBias + → risk-owl:DataBias + → risk-owl:Bias + → risk-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionControl to contain eventBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
Documented inRisk Risk-controlsRisk Bias
@@ -2934,25 +3092,25 @@

Containment Control

-
-

Copyright Violation

+
+

Consequence Control

- + - + @@ -2961,18 +3119,25 @@

Copyright Violation

- - + + + + @@ -2981,62 +3146,55 @@

Copyright Violation

- + - - - - + - + - - - - + - +
TermCopyrightViolationConsequenceControl Prefix risk-owl
LabelCopyright ViolationConsequence Control
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#CopyrightViolation
- https://w3id.org/dpv/risk#CopyrightViolation + https://w3id.org/dpv/risk/owl/#ConsequenceControl
+ https://w3id.org/dpv/risk#ConsequenceControl
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
Sub-class of risk-owl:LegalRisk - → dpv-owl:RiskConcept + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
DefinitionSomething that acts as or causes Copyright ViolationRisk Mitigation Measure that controls the Consequences
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-controls
- - -
-

Cross-Border Incident

+ +
+

Containment Control

- + - + @@ -3045,19 +3203,23 @@

Cross-Border Incident

- - @@ -3068,7 +3230,7 @@

Cross-Border Incident

- + @@ -3087,7 +3249,7 @@

Cross-Border Incident

- +
TermCrossBorderIncidentContainmentControl Prefix risk-owl
LabelCross-Border IncidentContainment Control
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#CrossBorderIncident
- https://w3id.org/dpv/risk#CrossBorderIncident + https://w3id.org/dpv/risk/owl/#ContainmentControl
+ https://w3id.org/dpv/risk#ContainmentControl
Type rdfs:Class , owl:Class + , risk-owl:RiskControl
Sub-class of risk-owl:Incident - → dpv-owl:RiskConcept + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of risk-owl:hasIncident + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
DefinitionIncident involving cross-border or multiple jurisdictionsControl to contain event
Documented inRisk IncidentRisk Risk-controls
@@ -3095,25 +3257,25 @@

Cross-Border Incident

-
-

Cryptojacking

+
+

Copyright Violation

- + - + @@ -3128,10 +3290,7 @@

Cryptojacking

- - - @@ -3145,7 +3304,7 @@

Cryptojacking

- + @@ -3154,7 +3313,7 @@

Cryptojacking

- + @@ -3178,28 +3337,30 @@

Cryptojacking

TermCryptojackingCopyrightViolation Prefix risk-owl
LabelCryptojackingCopyright Violation
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Cryptojacking
- https://w3id.org/dpv/risk#Cryptojacking + https://w3id.org/dpv/risk/owl/#CopyrightViolation
+ https://w3id.org/dpv/risk#CopyrightViolation
Sub-class of risk-owl:AvailabilityConcept -
Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:LegalRiskdpv-owl:RiskConcept
DefinitionSomething that acts as or causes CryptojackingSomething that acts as or causes Copyright Violation
SourceENISA Threat Landscape 2021ENISA Reference Incident Classification Taxonomy 2018
+ + -
-

Damage

+
+

Coverage Bias

- + - + @@ -3208,14 +3369,17 @@

Damage

- @@ -3228,58 +3392,57 @@

Damage

- + - + + + + - + - - - - + - + - +
TermDamageCoverageBias Prefix risk-owl
LabelDamageCoverage Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Damage
- https://w3id.org/dpv/risk#Damage + https://w3id.org/dpv/risk/owl/#CoverageBias
+ https://w3id.org/dpv/risk#CoverageBias
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskConcept
Sub-class of risk-owl:LegalRisk - → dpv-owl:RiskConcept + risk-owl:SelectionBias + → risk-owl:StatisticalBias + → risk-owl:DataBias + → risk-owl:Bias + → risk-owl:RiskConcept
DefinitionSomething that acts as or causes DamageBias that occurs when a population represented in a dataset does not match the actual or real population that are being used
Source
Date Created2022-03-302024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
Documented inRisk Risk-consequencesRisk Bias
- -
-

Data Breach

+
+

Cross-Border Incident

- + - + @@ -3288,31 +3451,21 @@

Data Breach

- - - - - - - - + + + + @@ -3321,40 +3474,26 @@

Data Breach

- + - - - - - - - + - + - - - - - - - - + + - +
TermDataBreachCrossBorderIncident Prefix risk-owl
LabelData BreachCross-Border Incident
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#DataBreach
- https://w3id.org/dpv/risk#DataBreach + https://w3id.org/dpv/risk/owl/#CrossBorderIncident
+ https://w3id.org/dpv/risk#CrossBorderIncident
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept
Sub-class of risk-owl:SecurityBreach - → risk-owl:AvailabilityConcept -
Sub-class of risk-owl:SecurityBreach - → risk-owl:ConfidentialityConcept -
Sub-class of risk-owl:SecurityBreach - → risk-owl:IntegrityConcept -
Sub-class of risk-owl:SecurityBreach - → risk-owl:OperationalSecurityRisk + risk-owl:Incidentdpv-owl:RiskConcept
in Range of risk-owl:hasIncident +
DefinitionSomething that acts as or causes Data BreachIncident involving cross-border or multiple jurisdictions
Examples Using DPV and RISK extension to represent incidents (E0069); - Using risk controls to express how tech/org measures address the risk (E0071) -
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented inDex Risk-consequencesRisk Incident
@@ -3362,25 +3501,25 @@

Data Breach

-
-

Data Corruption

+
+

Cryptojacking

- + - + @@ -3395,10 +3534,10 @@

Data Corruption

- - @@ -3412,19 +3551,16 @@

Data Corruption

- + - - - - + - + @@ -3450,25 +3586,26 @@

Data Corruption

-
-

Deliberate Incident

+ +
+

Damage

TermDataCorruptionCryptojacking Prefix risk-owl
LabelData CorruptionCryptojacking
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#DataCorruption
- https://w3id.org/dpv/risk#DataCorruption + https://w3id.org/dpv/risk/owl/#Cryptojacking
+ https://w3id.org/dpv/risk#Cryptojacking
Sub-class of risk-owl:IntegrityConcept + risk-owl:AvailabilityConcept
Sub-class of risk-owl:OperationalSecurityRisk + risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
DefinitionSomething that acts as or causes Corruption of DataSomething that acts as or causes Cryptojacking
Usage NoteThis concept was called "Corruption Data" in DPV 2.0
SourceISO/IEC 27005:2018ENISA Threat Landscape 2021
- + - + @@ -3477,21 +3614,18 @@

Deliberate Incident

- - - - - + @@ -3500,7 +3634,7 @@

Deliberate Incident

- + @@ -3513,13 +3647,19 @@

Deliberate Incident

- + - - + + + + + + + + - +
TermDeliberateIncidentDamage Prefix risk-owl
LabelDeliberate IncidentDamage
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#DeliberateIncident
- https://w3id.org/dpv/risk#DeliberateIncident + https://w3id.org/dpv/risk/owl/#Damage
+ https://w3id.org/dpv/risk#Damage
Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
Sub-class of risk-owl:Incident + risk-owl:LegalRiskdpv-owl:RiskConcept
in Range of risk-owl:hasIncident -
DefinitionIncident caused due to deliberate actions of a humanSomething that acts as or causes Damage
Date Created2024-05-192022-03-30
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented inRisk IncidentRisk Risk-consequences
@@ -3527,25 +3667,25 @@

Deliberate Incident

-
-

Denial of Service Attack (DoS)

+
+

Data Aggregation Bias

- + - + @@ -3554,17 +3694,15 @@

Denial of Service Attack (DoS)

- - - @@ -3577,7 +3715,7 @@

Denial of Service Attack (DoS)

- + @@ -3586,26 +3724,23 @@

Denial of Service Attack (DoS)

- + - + - - - - + - + - +
TermDenialServiceAttackDataAggregationBias Prefix risk-owl
LabelDenial of Service Attack (DoS)Data Aggregation Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#DenialServiceAttack
- https://w3id.org/dpv/risk#DenialServiceAttack + https://w3id.org/dpv/risk/owl/#DataAggregationBias
+ https://w3id.org/dpv/risk#DataAggregationBias
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskConcept
Sub-class of risk-owl:AvailabilityConcept -
Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept + risk-owl:DataBias + → risk-owl:Bias + → risk-owl:RiskConcept
DefinitionSomething that acts as or causes Denial of Service Attack (DoS)Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
Documented inRisk Risk-consequencesRisk Bias
@@ -3613,25 +3748,25 @@

Denial of Service Attack (DoS)

-
-

Detection Control

+
+

Data Bias

- + - + @@ -3640,25 +3775,18 @@

Detection Control

- - - - - + @@ -3667,26 +3795,32 @@

Detection Control

- + - + + + + - + - + + + + - +
TermDetectionControlDataBias Prefix risk-owl
LabelDetection ControlData Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#DetectionControl
- https://w3id.org/dpv/risk#DetectionControl + https://w3id.org/dpv/risk/owl/#DataBias
+ https://w3id.org/dpv/risk#DataBias
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , risk-owl:RiskConcept
Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:Bias + → risk-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionControl to detect eventBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
Documented inRisk Risk-controlsRisk Bias
@@ -3694,25 +3828,25 @@

Detection Control

-
-

Detriment

+
+

Data Breach

- + - + @@ -3727,34 +3861,55 @@

Detriment

- - - - - - - - - - - + + + + + + + + + + + + + + + + + - + + + + - + + + + - + @@ -3762,11 +3917,11 @@

Detriment

- + - +
TermDetrimentDataBreach Prefix risk-owl
LabelDetrimentData Breach
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Detriment
- https://w3id.org/dpv/risk#Detriment + https://w3id.org/dpv/risk/owl/#DataBreach
+ https://w3id.org/dpv/risk#DataBreach
Sub-class of risk-owl:LegalRisk - → dpv-owl:RiskConcept -
risk-owl:SecurityBreach + → risk-owl:AvailabilityConcept +
Sub-class of risk-owl:SecurityBreach + → risk-owl:ConfidentialityConcept +
Sub-class of risk-owl:SecurityBreach + → risk-owl:IntegrityConcept +
Sub-class of risk-owl:SecurityBreach + → risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept +
DefinitionSomething that acts as or causes DetrimentSomething that acts as or causes Data Breach
Examples Using DPV and RISK extension to represent incidents (E0069); + Using risk controls to express how tech/org measures address the risk (E0071) +
SourceISO/IEC 27005:2018
Date Created2022-03-232022-08-17
Date Modified
ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz EstevesHarshvardhan J. Pandit
Documented inRisk Risk-consequencesDex Risk-consequences
@@ -3774,25 +3929,25 @@

Detriment

-
-

Discrimination

+
+

Data Corruption

- + - + @@ -3807,7 +3962,10 @@

Discrimination

- + + @@ -3821,20 +3979,26 @@

Discrimination

- + - + + + + - + + + + - + @@ -3842,7 +4006,7 @@

Discrimination

- + @@ -3854,25 +4018,25 @@

Discrimination

-
-

Distributed Denial of Service Attack (DDoS)

+
+

Data Processing Bias

TermDiscriminationDataCorruption Prefix risk-owl
LabelDiscriminationData Corruption
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Discrimination
- https://w3id.org/dpv/risk#Discrimination + https://w3id.org/dpv/risk/owl/#DataCorruption
+ https://w3id.org/dpv/risk#DataCorruption
Sub-class of risk-owl:SocietalRisk + risk-owl:IntegrityConcept +
Sub-class of risk-owl:OperationalSecurityRiskdpv-owl:RiskConcept
DefinitionSomething that acts as or causes DiscriminationSomething that acts as or causes Corruption of Data
Usage NoteThis concept was called "Corruption Data" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2022-08-192022-08-17
Date Modified
ContributorsGeorg P. KrogHarshvardhan J. Pandit
Documented in
- + - + @@ -3881,17 +4045,15 @@

Distributed Denial of Service Attack (DDoS)

- - - @@ -3904,7 +4066,7 @@

Distributed Denial of Service Attack (DDoS)

- + @@ -3913,51 +4075,48 @@

Distributed Denial of Service Attack (DDoS)

- + - + - - - - + - + - +
TermDistributedDenialServiceAttackDataProcessingBias Prefix risk-owl
LabelDistributed Denial of Service Attack (DDoS)Data Processing Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#DistributedDenialServiceAttack
- https://w3id.org/dpv/risk#DistributedDenialServiceAttack + https://w3id.org/dpv/risk/owl/#DataProcessingBias
+ https://w3id.org/dpv/risk#DataProcessingBias
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskConcept
Sub-class of risk-owl:AvailabilityConcept -
Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept + risk-owl:DataBias + → risk-owl:Bias + → risk-owl:RiskConcept
DefinitionSomething that acts as or causes Distributed Denial of Service Attack (DDoS)Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
Documented inRisk Risk-consequencesRisk Bias
-
-

Environmental Incident

+
+

Deliberate Incident

- + - + @@ -3989,7 +4148,7 @@

Environmental Incident

- + @@ -4016,25 +4175,25 @@

Environmental Incident

-
-

Environmental Risk

+
+

Denial of Service Attack (DoS)

TermEnvironmentalIncidentDeliberateIncident Prefix risk-owl
LabelEnvironmental IncidentDeliberate Incident
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#EnvironmentalIncident
- https://w3id.org/dpv/risk#EnvironmentalIncident + https://w3id.org/dpv/risk/owl/#DeliberateIncident
+ https://w3id.org/dpv/risk#DeliberateIncident
DefinitionIncident caused due to environmental factors outside human controlsIncident caused due to deliberate actions of a human
- + - + @@ -4049,7 +4208,11 @@

Environmental Risk

- + + @@ -4062,20 +4225,32 @@

Environmental Risk

- + - + + + + - - - + + + + + + + + + + + + @@ -4086,25 +4261,25 @@

Environmental Risk

-
-

Equipment Failure

+
+

Detection Control

TermEnvironmentalRiskDenialServiceAttack Prefix risk-owl
LabelEnvironmental RiskDenial of Service Attack (DoS)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#EnvironmentalRisk
- https://w3id.org/dpv/risk#EnvironmentalRisk + https://w3id.org/dpv/risk/owl/#DenialServiceAttack
+ https://w3id.org/dpv/risk#DenialServiceAttack
Sub-class of dpv-owl:RiskConcept + risk-owl:AvailabilityConcept +
Sub-class of risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
DefinitionRisks and issues that have their origin in environment or can affect the environment at largeSomething that acts as or causes Denial of Service Attack (DoS)
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented in Risk Risk-consequences
- + - + @@ -4113,21 +4288,25 @@

Equipment Failure

- - - - + + + + @@ -4136,38 +4315,26 @@

Equipment Failure

- + - - - - + - - - - + - + - - - - - - - - + + - +
TermEquipmentFailureDetectionControl Prefix risk-owl
LabelEquipment FailureDetection Control
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#EquipmentFailure
- https://w3id.org/dpv/risk#EquipmentFailure + https://w3id.org/dpv/risk/owl/#DetectionControl
+ https://w3id.org/dpv/risk#DetectionControl
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
Sub-class of risk-owl:AvailabilityConcept -
Sub-class of risk-owl:OperationalSecurityRisk - → dpv-owl:RiskConcept + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
DefinitionSomething that acts as or causes Equipment FailureControl to detect event
Usage NoteHere equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-controls
@@ -4175,25 +4342,25 @@

Equipment Failure

-
-

Equipment Malfunction

+
+

Detriment

- + - + @@ -4208,10 +4375,7 @@

Equipment Malfunction

- - - @@ -4225,26 +4389,20 @@

Equipment Malfunction

- + - - - - + - - - - + - + @@ -4252,7 +4410,7 @@

Equipment Malfunction

- + @@ -4264,25 +4422,25 @@

Equipment Malfunction

-
-

Erroneous System Use

+
+

Discrimination

TermEquipmentMalfunctionDetriment Prefix risk-owl
LabelEquipment MalfunctionDetriment
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#EquipmentMalfunction
- https://w3id.org/dpv/risk#EquipmentMalfunction + https://w3id.org/dpv/risk/owl/#Detriment
+ https://w3id.org/dpv/risk#Detriment
Sub-class of risk-owl:AvailabilityConcept -
Sub-class of risk-owl:OperationalSecurityRisk + risk-owl:LegalRiskdpv-owl:RiskConcept
DefinitionSomething that acts as or causes Equipment MalfunctionSomething that acts as or causes Detriment
Usage NoteHere equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-172022-03-23
Date Modified
ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
Documented in
- + - + @@ -4297,7 +4455,7 @@

Erroneous System Use

- @@ -4311,23 +4469,20 @@

Erroneous System Use

- + - - - - + - + @@ -4335,7 +4490,7 @@

Erroneous System Use

- + @@ -4347,27 +4502,25 @@

Erroneous System Use

- - -
-

Exposure to Harmful Speech

+
+

Distributed Denial of Service Attack (DDoS)

TermErroneousSystemUseDiscrimination Prefix risk-owl
LabelErroneous System UseDiscrimination
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ErroneousSystemUse
- https://w3id.org/dpv/risk#ErroneousSystemUse + https://w3id.org/dpv/risk/owl/#Discrimination
+ https://w3id.org/dpv/risk#Discrimination
Sub-class of risk-owl:UserRisks + risk-owl:SocietalRiskdpv-owl:RiskConcept
DefinitionSomething that acts as or causes Erroneous System UseSomething that acts as or causes Discrimination
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-19
Date Modified
ContributorsHarshvardhan J. PanditGeorg P. Krog
Documented in
- + - + @@ -4382,7 +4535,10 @@

Exposure to Harmful Speech

- + + @@ -4396,19 +4552,16 @@

Exposure to Harmful Speech

- + - - - - + - + @@ -4434,26 +4587,25 @@

Exposure to Harmful Speech

- -
-

External Security Threat

+
+

Environmental Incident

TermExposureToHarmfulSpeechDistributedDenialServiceAttack Prefix risk-owl
LabelExposure to Harmful SpeechDistributed Denial of Service Attack (DDoS)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ExposureToHarmfulSpeech
- https://w3id.org/dpv/risk#ExposureToHarmfulSpeech + https://w3id.org/dpv/risk/owl/#DistributedDenialServiceAttack
+ https://w3id.org/dpv/risk#DistributedDenialServiceAttack
Sub-class of risk-owl:SocietalRisk + risk-owl:AvailabilityConcept +
Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
DefinitionSomething that acts as or causes Harmful SpeechSomething that acts as or causes Distributed Denial of Service Attack (DDoS)
Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
- + - + @@ -4462,17 +4614,21 @@

External Security Threat

- - + + + + @@ -4481,7 +4637,7 @@

External Security Threat

- + @@ -4492,12 +4648,15 @@

External Security Threat

- + + + + - +
TermExternalSecurityThreatEnvironmentalIncident Prefix risk-owl
LabelExternal Security ThreatEnvironmental Incident
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ExternalSecurityThreat
- https://w3id.org/dpv/risk#ExternalSecurityThreat + https://w3id.org/dpv/risk/owl/#EnvironmentalIncident
+ https://w3id.org/dpv/risk#EnvironmentalIncident
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept
Sub-class of dpv-owl:RiskConcept + risk-owl:Incident + → dpv-owl:RiskConcept
in Range of risk-owl:hasIncident +
DefinitionConcepts associated with security threats that are likely to originate externallyIncident caused due to environmental factors outside human controls
Date Created2024-05-19
Documented inRisk Risk-consequencesRisk Incident
@@ -4505,25 +4664,25 @@

External Security Threat

-
-

Extorsion

+
+

Environmental Risk

- + - + @@ -4538,11 +4697,7 @@

Extorsion

- - - @@ -4555,32 +4710,20 @@

Extorsion

- + - - - - + - - - - - - - - - - - - + + + @@ -4591,25 +4734,25 @@

Extorsion

-
-

Extremely High Likelihood

+
+

Equipment Failure

TermExtorsionEnvironmentalRisk Prefix risk-owl
LabelExtorsionEnvironmental Risk
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Extorsion
- https://w3id.org/dpv/risk#Extorsion + https://w3id.org/dpv/risk/owl/#EnvironmentalRisk
+ https://w3id.org/dpv/risk#EnvironmentalRisk
Sub-class of risk-owl:ConfidentialityConcept -
Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept + dpv-owl:RiskConcept
DefinitionSomething that acts as or causes ExtorsionRisks and issues that have their origin in environment or can affect the environment at large
SourceENISA Threat Taxonomy 2016
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented in Risk Risk-consequences
- + - + @@ -4618,22 +4761,21 @@

Extremely High Likelihood

- + + - - - - + @@ -4642,32 +4784,38 @@

Extremely High Likelihood

- + - + - + + + + - + - + + + + - +
TermExtremelyHighLikelihoodEquipmentFailure Prefix risk-owl
LabelExtremely High LikelihoodEquipment Failure
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ExtremelyHighLikelihood
- https://w3id.org/dpv/risk#ExtremelyHighLikelihood + https://w3id.org/dpv/risk/owl/#EquipmentFailure
+ https://w3id.org/dpv/risk#EquipmentFailure
Type rdfs:Class , owl:Class - , dpv-owl:Likelihood + , dpv-owl:RiskConcept
Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood + risk-owl:AvailabilityConcept +
Sub-class of risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
in Range of dpv-owl:hasLikelihood -
DefinitionLevel where Likelihood is Extremely HighSomething that acts as or causes Equipment Failure
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-levelsRisk Risk-consequences
@@ -4675,25 +4823,25 @@

Extremely High Likelihood

-
-

Extremely High Risk

+
+

Equipment Malfunction

- + - + @@ -4702,22 +4850,21 @@

Extremely High Risk

- + + - - - - + @@ -4726,32 +4873,38 @@

Extremely High Risk

- + - + - + + + + - + - + + + + - +
TermExtremelyHighRiskEquipmentMalfunction Prefix risk-owl
LabelExtremely High RiskEquipment Malfunction
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ExtremelyHighRisk
- https://w3id.org/dpv/risk#ExtremelyHighRisk + https://w3id.org/dpv/risk/owl/#EquipmentMalfunction
+ https://w3id.org/dpv/risk#EquipmentMalfunction
Type rdfs:Class , owl:Class - , dpv-owl:RiskLevel + , dpv-owl:RiskConcept
Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel + risk-owl:AvailabilityConcept +
Sub-class of risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
in Range of dpv-owl:hasRiskLevel -
DefinitionLevel where Risk is Extremely HighSomething that acts as or causes Equipment Malfunction
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-levelsRisk Risk-consequences
@@ -4759,25 +4912,25 @@

Extremely High Risk

-
-

Extremely High Severity

+
+

Erroneous System Use

- + - + @@ -4786,22 +4939,18 @@

Extremely High Severity

- - - - - + @@ -4810,32 +4959,35 @@

Extremely High Severity

- + - - - - + - + + + + - + - + + + + - +
TermExtremelyHighSeverityErroneousSystemUse Prefix risk-owl
LabelExtremely High SeverityErroneous System Use
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ExtremelyHighSeverity
- https://w3id.org/dpv/risk#ExtremelyHighSeverity + https://w3id.org/dpv/risk/owl/#ErroneousSystemUse
+ https://w3id.org/dpv/risk#ErroneousSystemUse
Type rdfs:Class , owl:Class - , dpv-owl:Severity + , dpv-owl:RiskConcept
Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity + risk-owl:UserRisks + → dpv-owl:RiskConcept
in Range of dpv-owl:hasSeverity -
DefinitionLevel where Severity is Extremely HighSomething that acts as or causes Erroneous System Use
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-levelsRisk Risk-consequences
@@ -4843,25 +4995,27 @@

Extremely High Severity

-
-

Extremely Low Likelihood

+ + +
+

Exposure to Harmful Speech

- + - + @@ -4870,22 +5024,18 @@

Extremely Low Likelihood

- - - - - + @@ -4894,32 +5044,38 @@

Extremely Low Likelihood

- + - + - + + + + - + - + + + + - +
TermExtremelyLowLikelihoodExposureToHarmfulSpeech Prefix risk-owl
LabelExtremely Low LikelihoodExposure to Harmful Speech
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ExtremelyLowLikelihood
- https://w3id.org/dpv/risk#ExtremelyLowLikelihood + https://w3id.org/dpv/risk/owl/#ExposureToHarmfulSpeech
+ https://w3id.org/dpv/risk#ExposureToHarmfulSpeech
Type rdfs:Class , owl:Class - , dpv-owl:Likelihood + , dpv-owl:RiskConcept
Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood + risk-owl:SocietalRisk + → dpv-owl:RiskConcept
in Range of dpv-owl:hasLikelihood -
DefinitionLevel where Likelihood is Extremely LowSomething that acts as or causes Harmful Speech
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1This concept was called "HarmfulSpeech" in DPV 2.0
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-levelsRisk Risk-consequences
@@ -4927,25 +5083,25 @@

Extremely Low Likelihood

-
-

Extremely Low Risk

+
+

External Security Threat

- + - + @@ -4954,22 +5110,17 @@

Extremely Low Risk

- - - - - + @@ -4978,12 +5129,9 @@

Extremely Low Risk

- + - - - - + @@ -4992,18 +5140,12 @@

Extremely Low Risk

- - - - + + - - - - - +
TermExtremelyLowRiskExternalSecurityThreat Prefix risk-owl
LabelExtremely Low RiskExternal Security Threat
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ExtremelyLowRisk
- https://w3id.org/dpv/risk#ExtremelyLowRisk + https://w3id.org/dpv/risk/owl/#ExternalSecurityThreat
+ https://w3id.org/dpv/risk#ExternalSecurityThreat
Type rdfs:Class , owl:Class - , dpv-owl:RiskLevel + , dpv-owl:RiskConcept
Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel + dpv-owl:RiskConcept
in Range of dpv-owl:hasRiskLevel -
DefinitionLevel where Risk is Extremely LowConcepts associated with security threats that are likely to originate externally
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-levelsRisk Risk-consequences
@@ -5011,25 +5153,25 @@

Extremely Low Risk

-
-

Extremely Low Severity

+
+

Extorsion

- + - + @@ -5038,22 +5180,21 @@

Extremely Low Severity

- + + - - - - + @@ -5062,32 +5203,35 @@

Extremely Low Severity

- + - - - - + - + + + + - + - + + + + - +
TermExtremelyLowSeverityExtorsion Prefix risk-owl
LabelExtremely Low SeverityExtorsion
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ExtremelyLowSeverity
- https://w3id.org/dpv/risk#ExtremelyLowSeverity + https://w3id.org/dpv/risk/owl/#Extorsion
+ https://w3id.org/dpv/risk#Extorsion
Type rdfs:Class , owl:Class - , dpv-owl:Severity + , dpv-owl:RiskConcept
Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity + risk-owl:ConfidentialityConcept +
Sub-class of risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
in Range of dpv-owl:hasSeverity -
DefinitionLevel where Severity is Extremely LowSomething that acts as or causes Extorsion
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
SourceENISA Threat Taxonomy 2016
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-levelsRisk Risk-consequences
@@ -5095,25 +5239,25 @@

Extremely Low Severity

-
-

Fee

+
+

Extremely High Likelihood

- + - + @@ -5122,18 +5266,22 @@

Fee

- - + + + + @@ -5142,35 +5290,32 @@

Fee

- + - + + + + - - - - + - + - - - - + - + - +
TermFeeExtremelyHighLikelihood Prefix risk-owl
LabelFeeExtremely High Likelihood
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Fee
- https://w3id.org/dpv/risk#Fee + https://w3id.org/dpv/risk/owl/#ExtremelyHighLikelihood
+ https://w3id.org/dpv/risk#ExtremelyHighLikelihood
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , dpv-owl:Likelihood
Sub-class of risk-owl:FinancialImpact - → dpv-owl:RiskConcept + risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood
in Range of dpv-owl:hasLikelihood +
DefinitionSomething that acts as or provides fees e.g. for using a serviceLevel where Likelihood is Extremely High
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Source
Date Created2024-04-142022-08-18
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-levels
@@ -5178,25 +5323,25 @@

Fee

-
-

Financial Impact

+
+

Extremely High Risk

- + - + @@ -5205,17 +5350,22 @@

Financial Impact

- - + + + + @@ -5224,9 +5374,12 @@

Financial Impact

- + - + + + + @@ -5235,12 +5388,18 @@

Financial Impact

- - + + + + + + + + - +
TermFinancialImpactExtremelyHighRisk Prefix risk-owl
LabelFinancial ImpactExtremely High Risk
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#FinancialImpact
- https://w3id.org/dpv/risk#FinancialImpact + https://w3id.org/dpv/risk/owl/#ExtremelyHighRisk
+ https://w3id.org/dpv/risk#ExtremelyHighRisk
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , dpv-owl:RiskLevel
Sub-class of dpv-owl:RiskConcept + risk-owl:7RiskLevels + → dpv-owl:RiskLevel
in Range of dpv-owl:hasRiskLevel +
DefinitionThings that cause or have the potential to impact financial resourcesLevel where Risk is Extremely High
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-levels
@@ -5248,25 +5407,25 @@

Financial Impact

-
-

Financial Loss

+
+

Extremely High Severity

- + - + @@ -5275,18 +5434,22 @@

Financial Loss

- - + + + + @@ -5295,35 +5458,32 @@

Financial Loss

- + - + + + + - - - - + - + - - - - + - +
TermFinancialLossExtremelyHighSeverity Prefix risk-owl
LabelFinancial LossExtremely High Severity
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#FinancialLoss
- https://w3id.org/dpv/risk#FinancialLoss + https://w3id.org/dpv/risk/owl/#ExtremelyHighSeverity
+ https://w3id.org/dpv/risk#ExtremelyHighSeverity
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , dpv-owl:Severity
Sub-class of risk-owl:FinancialImpact - → dpv-owl:RiskConcept + risk-owl:7SeverityLevels + → dpv-owl:Severity
in Range of dpv-owl:hasSeverity +
DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunityLevel where Severity is Extremely High
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-levels
@@ -5331,25 +5491,25 @@

Financial Loss

-
-

Fraud

+
+

Extremely Low Likelihood

- + - + @@ -5358,21 +5518,22 @@

Fraud

- - - - + + + + @@ -5381,35 +5542,32 @@

Fraud

- + - + + + + - - - - + - + - - - - + - +
TermFraudExtremelyLowLikelihood Prefix risk-owl
LabelFraudExtremely Low Likelihood
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Fraud
- https://w3id.org/dpv/risk#Fraud + https://w3id.org/dpv/risk/owl/#ExtremelyLowLikelihood
+ https://w3id.org/dpv/risk#ExtremelyLowLikelihood
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , dpv-owl:Likelihood
Sub-class of risk-owl:ConfidentialityConcept -
Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept + risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood
in Range of dpv-owl:hasLikelihood +
DefinitionSomething that acts as or causes FraudLevel where Likelihood is Extremely Low
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-levels
@@ -5417,25 +5575,25 @@

Fraud

-
-

Halt Source

+
+

Extremely Low Risk

- + - + @@ -5444,24 +5602,20 @@

Halt Source

- - @@ -5472,9 +5626,12 @@

Halt Source

- + - + + + + @@ -5485,7 +5642,7 @@

Halt Source

- + @@ -5494,7 +5651,7 @@

Halt Source

- +
TermHaltSourceExtremelyLowRisk Prefix risk-owl
LabelHalt SourceExtremely Low Risk
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#HaltSource
- https://w3id.org/dpv/risk#HaltSource + https://w3id.org/dpv/risk/owl/#ExtremelyLowRisk
+ https://w3id.org/dpv/risk#ExtremelyLowRisk
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskLevel
Sub-class of risk-owl:SourceControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:7RiskLevels + → dpv-owl:RiskLevel
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + dpv-owl:hasRiskLevel
DefinitionControl that halts the risk source or prevents it from materialisingLevel where Risk is Extremely Low
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2024-05-192022-08-18
Documented inRisk Risk-controlsRisk Risk-levels
@@ -5502,25 +5659,25 @@

Halt Source

-
-

Harm

+
+

Extremely Low Severity

- + - + @@ -5529,17 +5686,22 @@

Harm

- - + + + + @@ -5548,11 +5710,11 @@

Harm

- + - + @@ -5564,19 +5726,16 @@

Harm

- + - - - - + - +
TermHarmExtremelyLowSeverity Prefix risk-owl
LabelHarmExtremely Low Severity
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Harm
- https://w3id.org/dpv/risk#Harm + https://w3id.org/dpv/risk/owl/#ExtremelyLowSeverity
+ https://w3id.org/dpv/risk#ExtremelyLowSeverity
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , dpv-owl:Severity
Sub-class of risk-owl:IndividualRisk + risk-owl:7SeverityLevels + → dpv-owl:Severity
in Range of dpv-owl:hasSeverity +
DefinitionSomething that acts as or causes Harm to humansLevel where Severity is Extremely Low
Usage NoteThis concept refers to the general abstract notion of harmThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-132022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-levels
@@ -5584,35 +5743,25 @@

Harm

- - - - - - - - - - -
-

High Likelihood

+
+

Fee

- + - + @@ -5621,30 +5770,18 @@

High Likelihood

- - - - - - - - - + @@ -5653,32 +5790,35 @@

High Likelihood

- + - - - - + - + + + + - + - + + + + - + - +
TermHighLikelihoodFee Prefix risk-owl
LabelHigh LikelihoodFee
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#HighLikelihood
- https://w3id.org/dpv/risk#HighLikelihood + https://w3id.org/dpv/risk/owl/#Fee
+ https://w3id.org/dpv/risk#Fee
Type rdfs:Class , owl:Class - , dpv-owl:Likelihood + , dpv-owl:RiskConcept
Sub-class of risk-owl:3LikelihoodLevels - → dpv-owl:Likelihood -
Sub-class of risk-owl:5LikelihoodLevels - → dpv-owl:Likelihood -
Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood + risk-owl:FinancialImpact + → dpv-owl:RiskConcept
in Range of dpv-owl:hasLikelihood -
DefinitionLevel where Likelihood is HighSomething that acts as or provides fees e.g. for using a service
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Source
Date Created2022-08-182024-04-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
Documented inRisk Risk-levelsRisk Risk-consequences
@@ -5686,25 +5826,25 @@

High Likelihood

-
-

High Risk

+
+

Financial Impact

- + - + @@ -5713,30 +5853,17 @@

High Risk

- - - - - - - - - + @@ -5745,12 +5872,9 @@

High Risk

- + - - - - + @@ -5759,18 +5883,12 @@

High Risk

- - - - + + - - - - - +
TermHighRiskFinancialImpact Prefix risk-owl
LabelHigh RiskFinancial Impact
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#HighRisk
- https://w3id.org/dpv/risk#HighRisk + https://w3id.org/dpv/risk/owl/#FinancialImpact
+ https://w3id.org/dpv/risk#FinancialImpact
Type rdfs:Class , owl:Class - , dpv-owl:RiskLevel + , dpv-owl:RiskConcept
Sub-class of risk-owl:3RiskLevels - → dpv-owl:RiskLevel -
Sub-class of risk-owl:5RiskLevels - → dpv-owl:RiskLevel -
Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel + dpv-owl:RiskConcept
in Range of dpv-owl:hasRiskLevel -
DefinitionLevel where Risk is HighThings that cause or have the potential to impact financial resources
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-levelsRisk Risk-consequences
@@ -5778,25 +5896,25 @@

High Risk

-
-

High Severity

+
+

Financial Loss

- + - + @@ -5805,30 +5923,18 @@

High Severity

- - - - - - - - - + @@ -5837,32 +5943,35 @@

High Severity

- + - - - - + - + + + + - + - + + + + - +
TermHighSeverityFinancialLoss Prefix risk-owl
LabelHigh SeverityFinancial Loss
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#HighSeverity
- https://w3id.org/dpv/risk#HighSeverity + https://w3id.org/dpv/risk/owl/#FinancialLoss
+ https://w3id.org/dpv/risk#FinancialLoss
Type rdfs:Class , owl:Class - , dpv-owl:Severity + , dpv-owl:RiskConcept
Sub-class of risk-owl:3SeverityLevels - → dpv-owl:Severity -
Sub-class of risk-owl:5SeverityLevels - → dpv-owl:Severity -
Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity + risk-owl:FinancialImpact + → dpv-owl:RiskConcept
in Range of dpv-owl:hasSeverity -
DefinitionLevel where Severity is HighSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-levelsRisk Risk-consequences
@@ -5870,25 +5979,25 @@

High Severity

-
-

Human Errors

+
+

Fraud

- + - + @@ -5903,7 +6012,10 @@

Human Errors

- + + @@ -5917,7 +6029,7 @@

Human Errors

- + @@ -5926,7 +6038,7 @@

Human Errors

- + @@ -5953,25 +6065,25 @@

Human Errors

-
-

Identification Control

+
+

Group Attribution Bias

TermHumanErrorsFraud Prefix risk-owl
LabelHuman ErrorsFraud
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#HumanErrors
- https://w3id.org/dpv/risk#HumanErrors + https://w3id.org/dpv/risk/owl/#Fraud
+ https://w3id.org/dpv/risk#Fraud
Sub-class of risk-owl:UserRisks + risk-owl:ConfidentialityConcept +
Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept
DefinitionSomething that acts as or causes Human ErrorsSomething that acts as or causes Fraud
SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
- + - + @@ -5980,25 +6092,19 @@

Identification Control

- - - - - + @@ -6007,26 +6113,32 @@

Identification Control

- + - + + + + - + - + + + + - +
TermIdentificationControlGroupAttributionBias Prefix risk-owl
LabelIdentification ControlGroup Attribution Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IdentificationControl
- https://w3id.org/dpv/risk#IdentificationControl + https://w3id.org/dpv/risk/owl/#GroupAttributionBias
+ https://w3id.org/dpv/risk#GroupAttributionBias
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , risk-owl:RiskConcept
Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionControl to identify characteristics of eventBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
Documented inRisk Risk-controlsRisk Bias
@@ -6034,25 +6146,25 @@

Identification Control

-
-

Identity Fraud

+
+

Halt Source

- + - + @@ -6061,21 +6173,26 @@

Identity Fraud

- - - - + + + + @@ -6084,35 +6201,29 @@

Identity Fraud

- + - - - - + - + - - - - + - +
TermIdentityFraudHaltSource Prefix risk-owl
LabelIdentity FraudHalt Source
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IdentityFraud
- https://w3id.org/dpv/risk#IdentityFraud + https://w3id.org/dpv/risk/owl/#HaltSource
+ https://w3id.org/dpv/risk#HaltSource
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
Sub-class of risk-owl:ConfidentialityConcept -
Sub-class of risk-owl:OperationalSecurityRisk - → dpv-owl:RiskConcept + risk-owl:SourceControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
DefinitionSomething that acts as or causes Identity FraudControl that halts the risk source or prevents it from materialising
SourceENISA Threat Taxonomy 2016
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-controls
@@ -6120,25 +6231,25 @@

Identity Fraud

-
-

Identity Theft

+
+

Harm

- + - + @@ -6153,11 +6264,7 @@

Identity Theft

- - - @@ -6170,23 +6277,23 @@

Identity Theft

- + - + + + + - - - - + - + @@ -6206,25 +6313,35 @@

Identity Theft

-
-

Illegal Data Processing

+ + + + + + + + + + +
+

High Likelihood

TermIdentityTheftHarm Prefix risk-owl
LabelIdentity TheftHarm
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IdentityTheft
- https://w3id.org/dpv/risk#IdentityTheft + https://w3id.org/dpv/risk/owl/#Harm
+ https://w3id.org/dpv/risk#Harm
Sub-class of risk-owl:ConfidentialityConcept -
Sub-class of risk-owl:OperationalSecurityRisk - → dpv-owl:RiskConcept + risk-owl:IndividualRisk
DefinitionSomething that acts as or causes Identity TheftSomething that acts as or causes Harm to humans
Usage NoteThis concept refers to the general abstract notion of harm
SourceENISA Threat Taxonomy 2016
Date Created2022-08-172022-08-13
Date Modified
- + - + @@ -6233,18 +6350,30 @@

Illegal Data Processing

- + + + + - + + + + @@ -6253,38 +6382,32 @@

Illegal Data Processing

- + - + - - - - + - + - - - - + - +
TermIllegalDataProcessingHighLikelihood Prefix risk-owl
LabelIllegal Data ProcessingHigh Likelihood
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IllegalDataProcessing
- https://w3id.org/dpv/risk#IllegalDataProcessing + https://w3id.org/dpv/risk/owl/#HighLikelihood
+ https://w3id.org/dpv/risk#HighLikelihood
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , dpv-owl:Likelihood
Sub-class of risk-owl:LegalRisk - → dpv-owl:RiskConcept + risk-owl:3LikelihoodLevels + → dpv-owl:Likelihood +
Sub-class of risk-owl:5LikelihoodLevels + → dpv-owl:Likelihood +
Sub-class of risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood
in Range of dpv-owl:hasLikelihood +
DefinitionSomething that acts as or causes Illegal Processing of DataLevel where Likelihood is High
Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-levels
@@ -6292,25 +6415,25 @@

Illegal Data Processing

-
-

Impact Control

+
+

High Risk

- + - + @@ -6319,23 +6442,28 @@

Impact Control

- + + + + - @@ -6346,9 +6474,12 @@

Impact Control

- + - + + + + @@ -6359,7 +6490,7 @@

Impact Control

- + @@ -6368,32 +6499,33 @@

Impact Control

- +
TermImpactControlHighRisk Prefix risk-owl
LabelImpact ControlHigh Risk
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ImpactControl
- https://w3id.org/dpv/risk#ImpactControl + https://w3id.org/dpv/risk/owl/#HighRisk
+ https://w3id.org/dpv/risk#HighRisk
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskLevel
Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:3RiskLevels + → dpv-owl:RiskLevel +
Sub-class of risk-owl:5RiskLevels + → dpv-owl:RiskLevel +
Sub-class of risk-owl:7RiskLevels + → dpv-owl:RiskLevel
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + dpv-owl:hasRiskLevel
DefinitionRisk Mitigation Measure that controls ImpactsLevel where Risk is High
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2024-05-192022-08-18
Documented inRisk Risk-controlsRisk Risk-levels
-
-

Incident

+ +
+

High Severity

- + - + @@ -6402,18 +6534,28 @@

Incident

- + + + + - @@ -6424,18 +6566,13 @@

Incident

- + - + - - - @@ -6445,46 +6582,42 @@

Incident

- + - - - - + - + - +
TermIncidentHighSeverity Prefix risk-owl
LabelIncidentHigh Severity
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Incident
- https://w3id.org/dpv/risk#Incident + https://w3id.org/dpv/risk/owl/#HighSeverity
+ https://w3id.org/dpv/risk#HighSeverity
Type rdfs:Class , owl:Class + , dpv-owl:Severity
Sub-class of dpv-owl:RiskConcept + risk-owl:3SeverityLevels + → dpv-owl:Severity +
Sub-class of risk-owl:5SeverityLevels + → dpv-owl:Severity +
Sub-class of risk-owl:7SeverityLevels + → dpv-owl:Severity
in Range of risk-owl:hasIncident + dpv-owl:hasSeverity
DefinitionAn actual or occured eventLevel where Severity is High
Usage NoteIncident is realised or materialised riskThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Examples Using DPV and RISK extension to represent incidents (E0069); - Indicating personal data involved in an incident (E0070) -
Date Created2024-05-192022-08-18
Date Modified2024-08-16
ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio FernandezHarshvardhan J. Pandit
Documented inDex Core, Dex IncidentRisk Risk-levels
- - -
-

Incident Assessment Report

+ +
+

Human Errors

- + - + @@ -6493,25 +6626,18 @@

Incident Assessment Report

- - - - - + @@ -6520,26 +6646,35 @@

Incident Assessment Report

- + - + + + + - + - - + + + + + + + + - +
TermIncidentAssessmentReportHumanErrors Prefix risk-owl
LabelIncident Assessment ReportHuman Errors
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentAssessmentReport
- https://w3id.org/dpv/risk#IncidentAssessmentReport + https://w3id.org/dpv/risk/owl/#HumanErrors
+ https://w3id.org/dpv/risk#HumanErrors
Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:UserRisks + → dpv-owl:RiskConcept
in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure -
DefinitionA report describing the assessment of an incident in terms of its effects or impactsSomething that acts as or causes Human Errors
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented inRisk IncidentRisk Risk-consequences
@@ -6547,25 +6682,25 @@

Incident Assessment Report

-
-

Incident Concluded

+
+

Identification Control

- + - + @@ -6574,22 +6709,23 @@

Incident Concluded

- - @@ -6600,7 +6736,7 @@

Incident Concluded

- + @@ -6613,41 +6749,39 @@

Incident Concluded

- + - - - - + - +
TermIncidentConcludedIdentificationControl Prefix risk-owl
LabelIncident ConcludedIdentification Control
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentConcluded
- https://w3id.org/dpv/risk#IncidentConcluded + https://w3id.org/dpv/risk/owl/#IdentificationControl
+ https://w3id.org/dpv/risk#IdentificationControl
Type rdfs:Class , owl:Class - , risk-owl:IncidentStatus + , risk-owl:RiskControl
Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasContext, - dpv-owl:hasStatus + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringControl to identify characteristics of event
Date Created2024-02-142024-05-19
ContributorsHarshvardhan J. Pandit
Documented inRisk Incident-statusRisk Risk-controls
-
-

Incident Concluding Report

+ +
+

Identity Fraud

- + - + @@ -6656,25 +6790,21 @@

Incident Concluding Report

- + + - - - - + @@ -6683,51 +6813,61 @@

Incident Concluding Report

- + - + + + + - + - - + + + + + + + + - +
TermIncidentConcludingReportIdentityFraud Prefix risk-owl
LabelIncident Concluding ReportIdentity Fraud
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentConcludingReport
- https://w3id.org/dpv/risk#IncidentConcludingReport + https://w3id.org/dpv/risk/owl/#IdentityFraud
+ https://w3id.org/dpv/risk#IdentityFraud
Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:ConfidentialityConcept +
Sub-class of risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure -
DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownSomething that acts as or causes Identity Fraud
SourceENISA Threat Taxonomy 2016
Date Created2024-05-192022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented inRisk IncidentRisk Risk-consequences
-
-

Incident Detection Report

+ +
+

Identity Theft

- + - + @@ -6736,25 +6876,21 @@

Incident Detection Report

- + + - - - - + @@ -6763,26 +6899,35 @@

Incident Detection Report

- + - + + + + - + - - + + + + + + + + - +
TermIncidentDetectionReportIdentityTheft Prefix risk-owl
LabelIncident Detection ReportIdentity Theft
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentDetectionReport
- https://w3id.org/dpv/risk#IncidentDetectionReport + https://w3id.org/dpv/risk/owl/#IdentityTheft
+ https://w3id.org/dpv/risk#IdentityTheft
Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:ConfidentialityConcept +
Sub-class of risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure -
DefinitionA report describing the detection of a IncidentSomething that acts as or causes Identity Theft
SourceENISA Threat Taxonomy 2016
Date Created2024-05-192022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented inRisk IncidentRisk Risk-consequences
@@ -6790,25 +6935,25 @@

Incident Detection Report

-
-

Incident Halted

+
+

Illegal Data Processing

- + - + @@ -6817,24 +6962,18 @@

Incident Halted

- - - - - + @@ -6843,54 +6982,64 @@

Incident Halted

- + - + + + + - + + + + - + - + + + + - +
TermIncidentHaltedIllegalDataProcessing Prefix risk-owl
LabelIncident HaltedIllegal Data Processing
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentHalted
- https://w3id.org/dpv/risk#IncidentHalted + https://w3id.org/dpv/risk/owl/#IllegalDataProcessing
+ https://w3id.org/dpv/risk#IllegalDataProcessing
Type rdfs:Class , owl:Class - , risk-owl:IncidentStatus + , dpv-owl:RiskConcept
Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context + risk-owl:LegalRisk + → dpv-owl:RiskConcept
in Range of dpv-owl:hasContext, - dpv-owl:hasStatus -
DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringSomething that acts as or causes Illegal Processing of Data
Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2024-02-142022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Incident-statusRisk Risk-consequences
-
-

Incident Handling Report

+ +
+

Impact Control

- + - + @@ -6899,23 +7048,23 @@

Incident Handling Report

- - @@ -6926,7 +7075,7 @@

Incident Handling Report

- + @@ -6942,35 +7091,39 @@

Incident Handling Report

- + + + + - +
TermIncidentHandlingReportImpactControl Prefix risk-owl
LabelIncident Handling ReportImpact Control
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentHandlingReport
- https://w3id.org/dpv/risk#IncidentHandlingReport + https://w3id.org/dpv/risk/owl/#ImpactControl
+ https://w3id.org/dpv/risk#ImpactControl
Type rdfs:Class , owl:Class + , risk-owl:RiskControl
Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasuredpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceRisk Mitigation Measure that controls Impacts
2024-05-19
ContributorsHarshvardhan J. Pandit
Documented inRisk IncidentRisk Risk-controls
-
-

Incident Identifier

+ +
+

Implicit Bias

- + - + @@ -6979,10 +7132,16 @@

Incident Identifier

- + + + @@ -6994,51 +7153,57 @@

Incident Identifier

- + - + + + + - + - + + + + - +
TermIncidentIdentifierImplicitBias Prefix risk-owl
LabelIncident IdentifierImplicit Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentIdentifier
- https://w3id.org/dpv/risk#IncidentIdentifier + https://w3id.org/dpv/risk/owl/#ImplicitBias
+ https://w3id.org/dpv/risk#ImplicitBias
Type rdfs:Class , owl:Class + , risk-owl:RiskConcept
Sub-class of risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:RiskConcept +
DefinitionIdentifier associated with an incidentBias that occurs when a human makes an association or assumption based on their mental models and memories
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
Documented inRisk IncidentRisk Bias
-
-

Incident Impact Assessment

+
+

Incident

- + - + @@ -7052,21 +7217,13 @@

Incident Impact Assessment

- - @@ -7077,10 +7234,18 @@

Incident Impact Assessment

- + + + + + - + + + @@ -7090,42 +7255,46 @@

Incident Impact Assessment

- + - + + + + - + - +
TermIncidentImpactAssessmentIncident Prefix risk-owl
LabelIncident Impact AssessmentIncident
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentImpactAssessment
- https://w3id.org/dpv/risk#IncidentImpactAssessment + https://w3id.org/dpv/risk/owl/#Incident
+ https://w3id.org/dpv/risk#Incident
Sub-class of dpv-owl:ImpactAssessment - → dpv-owl:RiskAssessment - → dpv-owl:Assessment - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure + dpv-owl:RiskConcept
in Range of dpv-owl:hasAssessment, - dpv-owl:hasImpactAssessment, - dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRiskAssessment, - dpv-owl:hasTechnicalOrganisationalMeasure + risk-owl:hasIncident
DefinitionAn impact assessment associated with a incidentAn actual or occured event
Usage NoteIncident is realised or materialised risk
Examples Using DPV and RISK extension to represent incidents (E0069); + Indicating personal data involved in an incident (E0070) +
Date Created2024-05-192024-02-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
Documented inRisk IncidentDex Core, Dex Incident
+ + - -
-

Incident Mitigated

+
+

Incident Assessment Report

- + - + @@ -7134,22 +7303,23 @@

Incident Mitigated

- - @@ -7160,7 +7330,7 @@

Incident Mitigated

- + @@ -7173,41 +7343,39 @@

Incident Mitigated

- + - - - - + - +
TermIncidentMitigatedIncidentAssessmentReport Prefix risk-owl
LabelIncident MitigatedIncident Assessment Report
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentMitigated
- https://w3id.org/dpv/risk#IncidentMitigated + https://w3id.org/dpv/risk/owl/#IncidentAssessmentReport
+ https://w3id.org/dpv/risk#IncidentAssessmentReport
Type rdfs:Class , owl:Class - , risk-owl:IncidentStatus
Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context + risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasContext, - dpv-owl:hasStatus + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure
DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringA report describing the assessment of an incident in terms of its effects or impacts
Date Created2024-02-142024-05-19
ContributorsHarshvardhan J. Pandit
Documented inRisk Incident-statusRisk Incident
-
-

Incident Mitigation Measure

+ +
+

Incident Concluded

- + - + @@ -7216,20 +7384,22 @@

Incident Mitigation Measure

- - @@ -7240,7 +7410,7 @@

Incident Mitigation Measure

- + @@ -7253,39 +7423,41 @@

Incident Mitigation Measure

- + - + + + + - +
TermIncidentMitigationMeasureIncidentConcluded Prefix risk-owl
LabelIncident Mitigation MeasureIncident Concluded
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentMitigationMeasure
- https://w3id.org/dpv/risk#IncidentMitigationMeasure + https://w3id.org/dpv/risk/owl/#IncidentConcluded
+ https://w3id.org/dpv/risk#IncidentConcluded
Type rdfs:Class , owl:Class + , risk-owl:IncidentStatus
Sub-class of dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure + dpv-owl:hasContext, + dpv-owl:hasStatus
DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
Date Created2024-05-192024-02-14
ContributorsHarshvardhan J. Pandit
Documented inRisk IncidentRisk Incident-status
- -
-

Incident Near Miss

+
+

Incident Concluding Report

- + - + @@ -7294,22 +7466,23 @@

Incident Near Miss

- - @@ -7320,7 +7493,7 @@

Incident Near Miss

- + @@ -7333,41 +7506,38 @@

Incident Near Miss

- + - - - - + - +
TermIncidentNearMissIncidentConcludingReport Prefix risk-owl
LabelIncident Near MissIncident Concluding Report
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentNearMiss
- https://w3id.org/dpv/risk#IncidentNearMiss + https://w3id.org/dpv/risk/owl/#IncidentConcludingReport
+ https://w3id.org/dpv/risk#IncidentConcludingReport
Type rdfs:Class , owl:Class - , risk-owl:IncidentStatus
Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context + risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasContext, - dpv-owl:hasStatus + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure
DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
Date Created2024-02-142024-05-19
ContributorsHarshvardhan J. Pandit
Documented inRisk Incident-statusRisk Incident
-
-

Incident Notice

- +
+

Incident Detection Report

+
- + - + @@ -7381,7 +7551,8 @@

Incident Notice

- @@ -7389,8 +7560,8 @@

Incident Notice

- @@ -7402,7 +7573,7 @@

Incident Notice

- + @@ -7429,25 +7600,25 @@

Incident Notice

-
-

Incident Ongoing

+
+

Incident Halted

TermIncidentNoticeIncidentDetectionReport Prefix risk-owl
LabelIncident NoticeIncident Detection Report
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentNotice
- https://w3id.org/dpv/risk#IncidentNotice + https://w3id.org/dpv/risk/owl/#IncidentDetectionReport
+ https://w3id.org/dpv/risk#IncidentDetectionReport
Sub-class of dpv-owl:Notice + risk-owl:IncidentReport + → dpv-owl:RecordsOfActivitiesdpv-owl:OrganisationalMeasuredpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasNotice, - dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, dpv-owl:hasTechnicalOrganisationalMeasure
DefinitionNotice associated with an IncidentA report describing the detection of a Incident
- + - + @@ -7482,7 +7653,7 @@

Incident Ongoing

- + @@ -7511,25 +7682,25 @@

Incident Ongoing

-
-

Incident Ongoing Report

+
+

Incident Handling Report

TermIncidentOngoingIncidentHalted Prefix risk-owl
LabelIncident OngoingIncident Halted
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentOngoing
- https://w3id.org/dpv/risk#IncidentOngoing + https://w3id.org/dpv/risk/owl/#IncidentHalted
+ https://w3id.org/dpv/risk#IncidentHalted
DefinitionThe incident is ongoing i.e. still activeThe incident has halted or paused with a high likelihood of resuming or recurring
- + - + @@ -7565,7 +7736,7 @@

Incident Ongoing Report

- + @@ -7591,25 +7762,25 @@

Incident Ongoing Report

-
-

Incident Preliminary Report

+
+

Incident Identifier

TermIncidentOngoingReportIncidentHandlingReport Prefix risk-owl
LabelIncident Ongoing ReportIncident Handling Report
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentOngoingReport
- https://w3id.org/dpv/risk#IncidentOngoingReport + https://w3id.org/dpv/risk/owl/#IncidentHandlingReport
+ https://w3id.org/dpv/risk#IncidentHandlingReport
DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
- + - + @@ -7621,22 +7792,10 @@

Incident Preliminary Report

- - - + - - - - + @@ -7645,7 +7804,7 @@

Incident Preliminary Report

- + @@ -7671,25 +7830,25 @@

Incident Preliminary Report

-
-

Incident Register

+
+

Incident Impact Assessment

TermIncidentPreliminaryReportIncidentIdentifier Prefix risk-owl
LabelIncident Preliminary ReportIncident Identifier
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentPreliminaryReport
- https://w3id.org/dpv/risk#IncidentPreliminaryReport + https://w3id.org/dpv/risk/owl/#IncidentIdentifier
+ https://w3id.org/dpv/risk#IncidentIdentifier
Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure -
in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure -
DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownIdentifier associated with an incident
- + - + @@ -7703,7 +7862,9 @@

Incident Register

- @@ -7711,8 +7872,10 @@

Incident Register

- @@ -7724,7 +7887,7 @@

Incident Register

- + @@ -7753,25 +7916,26 @@

Incident Register

-
-

Incident Report

+ +
+

Incident Mitigated

TermIncidentRegisterIncidentImpactAssessment Prefix risk-owl
LabelIncident RegisterIncident Impact Assessment
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentRegister
- https://w3id.org/dpv/risk#IncidentRegister + https://w3id.org/dpv/risk/owl/#IncidentImpactAssessment
+ https://w3id.org/dpv/risk#IncidentImpactAssessment
Sub-class of dpv-owl:RecordsOfActivities + dpv-owl:ImpactAssessment + → dpv-owl:RiskAssessment + → dpv-owl:Assessmentdpv-owl:OrganisationalMeasuredpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, + dpv-owl:hasAssessment, + dpv-owl:hasImpactAssessment, + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRiskAssessment, dpv-owl:hasTechnicalOrganisationalMeasure
DefinitionA register recording incidentes, their reports, notifications, and other related activitiesAn impact assessment associated with a incident
- + - + @@ -7780,22 +7944,22 @@

Incident Report

- - @@ -7806,7 +7970,7 @@

Incident Report

- + @@ -7819,38 +7983,41 @@

Incident Report

- + - + + + + - +
TermIncidentReportIncidentMitigated Prefix risk-owl
LabelIncident ReportIncident Mitigated
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentReport
- https://w3id.org/dpv/risk#IncidentReport + https://w3id.org/dpv/risk/owl/#IncidentMitigated
+ https://w3id.org/dpv/risk#IncidentMitigated
Type rdfs:Class , owl:Class + , risk-owl:IncidentStatus
Sub-class of dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure + dpv-owl:hasContext, + dpv-owl:hasStatus
DefinitionDocumented information about an incident, its handling, assessments,and notificationsThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
Date Created2024-05-192024-02-14
ContributorsHarshvardhan J. Pandit
Documented inRisk IncidentRisk Incident-status
-
-

Incident Status

+
+

Incident Mitigation Measure

- + - + @@ -7864,15 +8031,15 @@

Incident Status

- - @@ -7883,14 +8050,10 @@

Incident Status

- + - - - @@ -7900,16 +8063,13 @@

Incident Status

- + - - - - + - +
TermIncidentStatusIncidentMitigationMeasure Prefix risk-owl
LabelIncident StatusIncident Mitigation Measure
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentStatus
- https://w3id.org/dpv/risk#IncidentStatus + https://w3id.org/dpv/risk/owl/#IncidentMitigationMeasure
+ https://w3id.org/dpv/risk#IncidentMitigationMeasure
Sub-class of dpv-owl:Status - → dpv-owl:Context + dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasContext, - dpv-owl:hasStatus + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure
DefinitionStatus associated with an incidentA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
Examples Using DPV and RISK extension to represent incidents (E0069) -
Date Created2024-02-142024-05-19
ContributorsHarshvardhan J. Pandit
Documented inDex Incident-statusRisk Incident
@@ -7917,25 +8077,25 @@

Incident Status

-
-

Incident Status Unknown

+
+

Incident Near Miss

- + - + @@ -7970,7 +8130,7 @@

Incident Status Unknown

- + @@ -7999,26 +8159,25 @@

Incident Status Unknown

- -
-

Incident Suspected

+
+

Incident Notice

TermIncidentStatusUnknownIncidentNearMiss Prefix risk-owl
LabelIncident Status UnknownIncident Near Miss
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentStatusUnknown
- https://w3id.org/dpv/risk#IncidentStatusUnknown + https://w3id.org/dpv/risk/owl/#IncidentNearMiss
+ https://w3id.org/dpv/risk#IncidentNearMiss
DefinitionThe status of a incident is unknownThe state where an incident was almost successful in taking place i.e. "it came very close"
- + - + @@ -8027,22 +8186,22 @@

Incident Suspected

- - @@ -8053,7 +8212,7 @@

Incident Suspected

- + @@ -8066,41 +8225,39 @@

Incident Suspected

- + - - - - + - +
TermIncidentSuspectedIncidentNotice Prefix risk-owl
LabelIncident SuspectedIncident Notice
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentSuspected
- https://w3id.org/dpv/risk#IncidentSuspected + https://w3id.org/dpv/risk/owl/#IncidentNotice
+ https://w3id.org/dpv/risk#IncidentNotice
Type rdfs:Class , owl:Class - , risk-owl:IncidentStatus
Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context + dpv-owl:Notice + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasContext, - dpv-owl:hasStatus + dpv-owl:hasNotice, + dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasTechnicalOrganisationalMeasure
DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingNotice associated with an Incident
Date Created2024-02-142024-05-19
ContributorsHarshvardhan J. Pandit
Documented inRisk Incident-statusRisk Incident
-
-

Incident Suspected Report

+ +
+

Incident Ongoing

- + - + @@ -8109,23 +8266,22 @@

Incident Suspected Report

- - @@ -8136,7 +8292,1529 @@

Incident Suspected Report

- + + + + + + + + + + + + + + + + + + + + + + + + + +
TermIncidentSuspectedReportIncidentOngoing Prefix risk-owl
LabelIncident Suspected ReportIncident Ongoing
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentSuspectedReport
- https://w3id.org/dpv/risk#IncidentSuspectedReport + https://w3id.org/dpv/risk/owl/#IncidentOngoing
+ https://w3id.org/dpv/risk#IncidentOngoing
Type rdfs:Class , owl:Class + , risk-owl:IncidentStatus
Sub-class of risk-owl:IncidentReport - → dpv-owl:RecordsOfActivities - → dpv-owl:OrganisationalMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context
in Range of dpv-owl:hasOrganisationalMeasure, - dpv-owl:hasRecordOfActivity, - dpv-owl:hasTechnicalOrganisationalMeasure + dpv-owl:hasContext, + dpv-owl:hasStatus
DefinitionA report describing the suspicion of an incident in the past or occuringThe incident is ongoing i.e. still active
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
Documented inRisk Incident-status
+
+ + +
+

Incident Ongoing Report

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermIncidentOngoingReportPrefixrisk-owl
LabelIncident Ongoing Report
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#IncidentOngoingReport
+ https://w3id.org/dpv/risk#IncidentOngoingReport +
Type rdfs:Class + , owl:Class +
Sub-class of risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure +
in Range of dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure +
DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
Date Created2024-05-19
Documented inRisk Incident
+
+ + +
+

Incident Preliminary Report

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermIncidentPreliminaryReportPrefixrisk-owl
LabelIncident Preliminary Report
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#IncidentPreliminaryReport
+ https://w3id.org/dpv/risk#IncidentPreliminaryReport +
Type rdfs:Class + , owl:Class +
Sub-class of risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure +
in Range of dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure +
DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
Date Created2024-05-19
Documented inRisk Incident
+
+ + +
+

Incident Register

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermIncidentRegisterPrefixrisk-owl
LabelIncident Register
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#IncidentRegister
+ https://w3id.org/dpv/risk#IncidentRegister +
Type rdfs:Class + , owl:Class +
Sub-class of dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure +
in Range of dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure +
DefinitionA register recording incidentes, their reports, notifications, and other related activities
Date Created2024-05-19
ContributorsHarshvardhan J. Pandit
Documented inRisk Incident
+
+ + +
+

Incident Report

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermIncidentReportPrefixrisk-owl
LabelIncident Report
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#IncidentReport
+ https://w3id.org/dpv/risk#IncidentReport +
Type rdfs:Class + , owl:Class +
Sub-class of dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure +
in Range of dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure +
DefinitionDocumented information about an incident, its handling, assessments,and notifications
Date Created2024-05-19
Documented inRisk Incident
+
+ + +
+

Incident Status

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermIncidentStatusPrefixrisk-owl
LabelIncident Status
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#IncidentStatus
+ https://w3id.org/dpv/risk#IncidentStatus +
Type rdfs:Class + , owl:Class +
Sub-class of dpv-owl:Status + → dpv-owl:Context +
in Range of dpv-owl:hasContext, + dpv-owl:hasStatus +
DefinitionStatus associated with an incident
Examples Using DPV and RISK extension to represent incidents (E0069) +
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
Documented inDex Incident-status
+
+ + + +
+

Incident Status Unknown

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermIncidentStatusUnknownPrefixrisk-owl
LabelIncident Status Unknown
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#IncidentStatusUnknown
+ https://w3id.org/dpv/risk#IncidentStatusUnknown +
Type rdfs:Class + , owl:Class + , risk-owl:IncidentStatus +
Sub-class of risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context +
in Range of dpv-owl:hasContext, + dpv-owl:hasStatus +
DefinitionThe status of a incident is unknown
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
Documented inRisk Incident-status
+
+ + + +
+

Incident Suspected

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermIncidentSuspectedPrefixrisk-owl
LabelIncident Suspected
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#IncidentSuspected
+ https://w3id.org/dpv/risk#IncidentSuspected +
Type rdfs:Class + , owl:Class + , risk-owl:IncidentStatus +
Sub-class of risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context +
in Range of dpv-owl:hasContext, + dpv-owl:hasStatus +
DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
Documented inRisk Incident-status
+
+ + +
+

Incident Suspected Report

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermIncidentSuspectedReportPrefixrisk-owl
LabelIncident Suspected Report
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#IncidentSuspectedReport
+ https://w3id.org/dpv/risk#IncidentSuspectedReport +
Type rdfs:Class + , owl:Class +
Sub-class of risk-owl:IncidentReport + → dpv-owl:RecordsOfActivities + → dpv-owl:OrganisationalMeasure + → dpv-owl:TechnicalOrganisationalMeasure +
in Range of dpv-owl:hasOrganisationalMeasure, + dpv-owl:hasRecordOfActivity, + dpv-owl:hasTechnicalOrganisationalMeasure +
DefinitionA report describing the suspicion of an incident in the past or occuring
Date Created2024-05-19
Documented inRisk Incident
+
+ + + +
+

Incident Terminated

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermIncidentTerminatedPrefixrisk-owl
LabelIncident Terminated
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#IncidentTerminated
+ https://w3id.org/dpv/risk#IncidentTerminated +
Type rdfs:Class + , owl:Class + , risk-owl:IncidentStatus +
Sub-class of risk-owl:IncidentStatus + → dpv-owl:Status + → dpv-owl:Context +
in Range of dpv-owl:hasContext, + dpv-owl:hasStatus +
DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
Documented inRisk Incident-status
+
+ + + +
+

Individual Health & Safety

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermIndividualHealthSafetyPrefixrisk-owl
LabelIndividual Health & Safety
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#IndividualHealthSafety
+ https://w3id.org/dpv/risk#IndividualHealthSafety +
Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept +
Sub-class of risk-owl:IndividualRisk +
Documented inRisk Risk-consequences
+
+ + +
+

Individual Risk

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermIndividualRiskPrefixrisk-owl
LabelIndividual Risk
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#IndividualRisk
+ https://w3id.org/dpv/risk#IndividualRisk +
Type rdfs:Class + , owl:Class +
DefinitionRisks and issues that affect or have the potential to affect specific individuals
Documented inRisk Risk-consequences
+
+ + + +
+

Informativeness Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermInformativenessBiasPrefixrisk-owl
LabelInformativeness Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#InformativenessBias
+ https://w3id.org/dpv/risk#InformativenessBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of risk-owl:EngineeringDecisionBias +
DefinitionBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inRisk Bias
+
+ + + +
+

In-Group Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermInGroupBiasPrefixrisk-owl
LabelIn-Group Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#InGroupBias
+ https://w3id.org/dpv/risk#InGroupBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:RiskConcept +
DefinitionBias that occurs when showing partiality to one's own group or own characteristics
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inRisk Bias
+
+ + + +
+

Injury

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermInjuryPrefixrisk-owl
LabelInjury
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#Injury
+ https://w3id.org/dpv/risk#Injury +
Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept +
Sub-class of risk-owl:IndividualRisk +
DefinitionSomething that acts as or causes Injury
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-consequences
+
+ + + +
+

None

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermIntegrityBreachPrefixrisk-owl
LabelNone
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#IntegrityBreach
+ https://w3id.org/dpv/risk#IntegrityBreach +
Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept +
Sub-class of risk-owl:DataBreach + → risk-owl:AvailabilityConcept +
Sub-class of risk-owl:DataBreach + → risk-owl:ConfidentialityConcept +
Sub-class of risk-owl:DataBreach + → risk-owl:IntegrityConcept +
Sub-class of risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:AvailabilityConcept +
Sub-class of risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:ConfidentialityConcept +
Sub-class of risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:IntegrityConcept +
Sub-class of risk-owl:DataBreach + → risk-owl:SecurityBreach + → risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept +
Documented inRisk Risk-consequences
+
+ + +
+

Integrity Incident

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermIntegrityIncidentPrefixrisk-owl
LabelIntegrity Incident
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#IntegrityIncident
+ https://w3id.org/dpv/risk#IntegrityIncident +
Type rdfs:Class + , owl:Class +
Sub-class of risk-owl:Incident + → dpv-owl:RiskConcept +
in Range of risk-owl:hasIncident +
DefinitionIncident where the integrity of information or system has been affected
Date Created2024-05-19
Documented inRisk Incident
+
+ + + +
+

Intentional Misuse

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermIntentionalMisusePrefixrisk-owl
LabelIntentional Misuse
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#IntentionalMisuse
+ https://w3id.org/dpv/risk#IntentionalMisuse +
Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept +
Sub-class of risk-owl:UserRisks + → dpv-owl:RiskConcept +
DefinitionIntentional Misuse
Documented inRisk Risk-consequences
+
+ + + +
+

Intercept Communications

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermInterceptCommunicationsPrefixrisk-owl
LabelIntercept Communications
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#InterceptCommunications
+ https://w3id.org/dpv/risk#InterceptCommunications +
Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept +
Sub-class of risk-owl:ConfidentialityConcept +
Sub-class of risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept +
DefinitionSomething that acts as or causes Interception of Communications
Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-consequences
+
+ + + + + + + +
+

Judicial Costs

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + @@ -8147,15 +9825,12 @@

Incident Suspected Report

- - - - + - +
TermJudicialCostsPrefixrisk-owl
LabelJudicial Costs
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#JudicialCosts
+ https://w3id.org/dpv/risk#JudicialCosts +
Type rdfs:Class + , owl:Class + , dpv-owl:RiskConcept +
Sub-class of risk-owl:FinancialImpact + → dpv-owl:RiskConcept +
DefinitionSomething that involves or causes judicial costs to be paid
Date Created2024-05-19
Documented inRisk IncidentRisk Risk-consequences
@@ -8163,25 +9838,25 @@

Incident Suspected Report

-
-

Incident Terminated

+
+

Judicial Penalty

- + - + @@ -8190,24 +9865,18 @@

Incident Terminated

- - - - - + @@ -8216,7 +9885,7 @@

Incident Terminated

- + @@ -8227,18 +9896,12 @@

Incident Terminated

- - - - + + - - - - - +
TermIncidentTerminatedJudicialPenalty Prefix risk-owl
LabelIncident TerminatedJudicial Penalty
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IncidentTerminated
- https://w3id.org/dpv/risk#IncidentTerminated + https://w3id.org/dpv/risk/owl/#JudicialPenalty
+ https://w3id.org/dpv/risk#JudicialPenalty
Type rdfs:Class , owl:Class - , risk-owl:IncidentStatus + , dpv-owl:RiskConcept
Sub-class of risk-owl:IncidentStatus - → dpv-owl:Status - → dpv-owl:Context + risk-owl:FinancialImpact + → dpv-owl:RiskConcept
in Range of dpv-owl:hasContext, - dpv-owl:hasStatus -
DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringSomething that involves or causes judicial penalties to be paid
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
Documented inRisk Incident-statusRisk Risk-consequences
@@ -8246,25 +9909,25 @@

Incident Terminated

-
-

Individual Health & Safety

+
+

Legal Risk

- + - + @@ -8279,7 +9942,7 @@

Individual Health & Safety

- @@ -8290,7 +9953,10 @@

Individual Health & Safety

- + + + + @@ -8312,25 +9978,26 @@

Individual Health & Safety

-
-

Individual Risk

+ +
+

Lose of Credibility

TermIndividualHealthSafetyLegalRisk Prefix risk-owl
LabelIndividual Health & SafetyLegal Risk
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IndividualHealthSafety
- https://w3id.org/dpv/risk#IndividualHealthSafety + https://w3id.org/dpv/risk/owl/#LegalRisk
+ https://w3id.org/dpv/risk#LegalRisk
Sub-class of risk-owl:IndividualRisk + dpv-owl:RiskConcept
DefinitionRisks and issues that have their basis in legal requirements and enforcement
- + - + @@ -8339,10 +10006,15 @@

Individual Risk

- + + + @@ -8354,20 +10026,32 @@

Individual Risk

- + - + + + + - - - + + + + + + + + + + + + @@ -8378,25 +10062,25 @@

Individual Risk

-
-

Injury

+
+

Lose of Customer Confidence

TermIndividualRiskLoseCredibility Prefix risk-owl
LabelIndividual RiskLose of Credibility
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IndividualRisk
- https://w3id.org/dpv/risk#IndividualRisk + https://w3id.org/dpv/risk/owl/#LoseCredibility
+ https://w3id.org/dpv/risk#LoseCredibility
Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
Sub-class of risk-owl:ReputationalRisk + → dpv-owl:RiskConcept +
DefinitionRisks and issues that affect or have the potential to affect specific individualsSomething that acts as or causes Loss of Credibility
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented in Risk Risk-consequences
- + - + @@ -8411,7 +10095,8 @@

Injury

- @@ -8424,7 +10109,7 @@

Injury

- + @@ -8460,25 +10145,25 @@

Injury

-
-

None

+
+

Lose of Goodwill

TermInjuryLoseCustomerConfidence Prefix risk-owl
LabelInjuryLose of Customer Confidence
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Injury
- https://w3id.org/dpv/risk#Injury + https://w3id.org/dpv/risk/owl/#LoseCustomerConfidence
+ https://w3id.org/dpv/risk#LoseCustomerConfidence
Sub-class of risk-owl:IndividualRisk + risk-owl:ReputationalRisk + → dpv-owl:RiskConcept
DefinitionSomething that acts as or causes InjurySomething that acts as or causes Loss of Customer Confidence
- + - + @@ -8493,36 +10178,7 @@

None

- - - - - - - - - - - - - @@ -8534,19 +10190,34 @@

None

- + + + + - + + + + - - - + + + + + + + + + + + + @@ -8556,25 +10227,26 @@

None

-
-

Integrity Incident

+ +
+

Lose of Negotiating Capacity

TermIntegrityBreachLoseGoodwill Prefix risk-owl
LabelNoneLose of Goodwill
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IntegrityBreach
- https://w3id.org/dpv/risk#IntegrityBreach + https://w3id.org/dpv/risk/owl/#LoseGoodwill
+ https://w3id.org/dpv/risk#LoseGoodwill
Sub-class of risk-owl:DataBreach - → risk-owl:AvailabilityConcept -
Sub-class of risk-owl:DataBreach - → risk-owl:ConfidentialityConcept -
Sub-class of risk-owl:DataBreach - → risk-owl:IntegrityConcept -
Sub-class of risk-owl:DataBreach - → risk-owl:SecurityBreach - → risk-owl:AvailabilityConcept -
Sub-class of risk-owl:DataBreach - → risk-owl:SecurityBreach - → risk-owl:ConfidentialityConcept -
Sub-class of risk-owl:DataBreach - → risk-owl:SecurityBreach - → risk-owl:IntegrityConcept -
Sub-class of risk-owl:DataBreach - → risk-owl:SecurityBreach - → risk-owl:OperationalSecurityRisk + risk-owl:ReputationalRiskdpv-owl:RiskConcept
DefinitionSomething that acts as or causes Loss of Goodwill
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented in Risk Risk-consequences
- + - + @@ -8583,21 +10255,18 @@

Integrity Incident

- - - - - + @@ -8606,26 +10275,35 @@

Integrity Incident

- + - + + + + - + - - + + + + + + + + - +
TermIntegrityIncidentLoseNegotiatingCapacity Prefix risk-owl
LabelIntegrity IncidentLose of Negotiating Capacity
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IntegrityIncident
- https://w3id.org/dpv/risk#IntegrityIncident + https://w3id.org/dpv/risk/owl/#LoseNegotiatingCapacity
+ https://w3id.org/dpv/risk#LoseNegotiatingCapacity
Type rdfs:Class , owl:Class + , dpv-owl:RiskConcept
Sub-class of risk-owl:Incident + risk-owl:ReputationalRiskdpv-owl:RiskConcept
in Range of risk-owl:hasIncident -
DefinitionIncident where the integrity of information or system has been affectedSomething that acts as or causes Loss of Negotiating Capacity
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented inRisk IncidentRisk Risk-consequences
@@ -8633,25 +10311,25 @@

Integrity Incident

-
-

Intentional Misuse

+
+

Lose of Opportunity

- + - + @@ -8666,7 +10344,7 @@

Intentional Misuse

- @@ -8680,20 +10358,32 @@

Intentional Misuse

- + - + + + + - - - + + + + + + + + + + + + @@ -8704,25 +10394,25 @@

Intentional Misuse

-
-

Intercept Communications

+
+

Lose of Reputation

TermIntentionalMisuseLoseOpportunity Prefix risk-owl
LabelIntentional MisuseLose of Opportunity
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#IntentionalMisuse
- https://w3id.org/dpv/risk#IntentionalMisuse + https://w3id.org/dpv/risk/owl/#LoseOpportunity
+ https://w3id.org/dpv/risk#LoseOpportunity
Sub-class of risk-owl:UserRisks + risk-owl:ReputationalRiskdpv-owl:RiskConcept
DefinitionIntentional MisuseSomething that acts as or causes Loss of Opportunity
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented in Risk Risk-consequences
- + - + @@ -8737,10 +10427,7 @@

Intercept Communications

- - - @@ -8754,12 +10441,9 @@

Intercept Communications

- + - - - - + @@ -8793,29 +10477,25 @@

Intercept Communications

- - - - -
-

Judicial Costs

+
+

Lose of Trust

TermInterceptCommunicationsLoseReputation Prefix risk-owl
LabelIntercept CommunicationsLose of Reputation
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#InterceptCommunications
- https://w3id.org/dpv/risk#InterceptCommunications + https://w3id.org/dpv/risk/owl/#LoseReputation
+ https://w3id.org/dpv/risk#LoseReputation
Sub-class of risk-owl:ConfidentialityConcept -
Sub-class of risk-owl:ExternalSecurityThreat + risk-owl:ReputationalRiskdpv-owl:RiskConcept
DefinitionSomething that acts as or causes Interception of CommunicationsSomething that acts as or causes Loss of Reputation
Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
- + - + @@ -8830,7 +10510,7 @@

Judicial Costs

- @@ -8844,20 +10524,32 @@

Judicial Costs

- + - + + + + - - - + + + + + + + + + + + + @@ -8868,25 +10560,25 @@

Judicial Costs

-
-

Judicial Penalty

+
+

Low Likelihood

TermJudicialCostsLoseTrust Prefix risk-owl
LabelJudicial CostsLose of Trust
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#JudicialCosts
- https://w3id.org/dpv/risk#JudicialCosts + https://w3id.org/dpv/risk/owl/#LoseTrust
+ https://w3id.org/dpv/risk#LoseTrust
Sub-class of risk-owl:FinancialImpact + risk-owl:ReputationalRiskdpv-owl:RiskConcept
DefinitionSomething that involves or causes judicial costs to be paidSomething that acts as or causes Loss of Trust
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented in Risk Risk-consequences
- + - + @@ -8895,18 +10587,30 @@

Judicial Penalty

- + + + + - + + + + @@ -8915,9 +10619,12 @@

Judicial Penalty

- + - + + + + @@ -8926,12 +10633,18 @@

Judicial Penalty

- - + + + + + + + + - +
TermJudicialPenaltyLowLikelihood Prefix risk-owl
LabelJudicial PenaltyLow Likelihood
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#JudicialPenalty
- https://w3id.org/dpv/risk#JudicialPenalty + https://w3id.org/dpv/risk/owl/#LowLikelihood
+ https://w3id.org/dpv/risk#LowLikelihood
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , dpv-owl:Likelihood
Sub-class of risk-owl:FinancialImpact - → dpv-owl:RiskConcept + risk-owl:3LikelihoodLevels + → dpv-owl:Likelihood +
Sub-class of risk-owl:5LikelihoodLevels + → dpv-owl:Likelihood +
Sub-class of risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood
in Range of dpv-owl:hasLikelihood +
DefinitionSomething that involves or causes judicial penalties to be paidLevel where Likelihood is Low
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-levels
@@ -8939,25 +10652,25 @@

Judicial Penalty

-
-

Legal Risk

+
+

Low Risk

- + - + @@ -8966,17 +10679,30 @@

Legal Risk

- + + + + - + + + + @@ -8985,9 +10711,12 @@

Legal Risk

- + - + + + + @@ -8996,12 +10725,18 @@

Legal Risk

- - + + + + + + + + - +
TermLegalRiskLowRisk Prefix risk-owl
LabelLegal RiskLow Risk
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#LegalRisk
- https://w3id.org/dpv/risk#LegalRisk + https://w3id.org/dpv/risk/owl/#LowRisk
+ https://w3id.org/dpv/risk#LowRisk
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , dpv-owl:RiskLevel
Sub-class of dpv-owl:RiskConcept + risk-owl:3RiskLevels + → dpv-owl:RiskLevel +
Sub-class of risk-owl:5RiskLevels + → dpv-owl:RiskLevel +
Sub-class of risk-owl:7RiskLevels + → dpv-owl:RiskLevel
in Range of dpv-owl:hasRiskLevel +
DefinitionRisks and issues that have their basis in legal requirements and enforcementLevel where Risk is Low
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-levels
@@ -9009,25 +10744,25 @@

Legal Risk

-
-

Lose of Credibility

+
+

Low Severity

- + - + @@ -9036,18 +10771,30 @@

Lose of Credibility

- + + + + - + + + + @@ -9056,35 +10803,32 @@

Lose of Credibility

- + - + + + + - - - - + - + - - - - + - +
TermLoseCredibilityLowSeverity Prefix risk-owl
LabelLose of CredibilityLow Severity
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#LoseCredibility
- https://w3id.org/dpv/risk#LoseCredibility + https://w3id.org/dpv/risk/owl/#LowSeverity
+ https://w3id.org/dpv/risk#LowSeverity
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , dpv-owl:Severity
Sub-class of risk-owl:ReputationalRisk - → dpv-owl:RiskConcept + risk-owl:3SeverityLevels + → dpv-owl:Severity +
Sub-class of risk-owl:5SeverityLevels + → dpv-owl:Severity +
Sub-class of risk-owl:7SeverityLevels + → dpv-owl:Severity
in Range of dpv-owl:hasSeverity +
DefinitionSomething that acts as or causes Loss of CredibilityLevel where Severity is Low
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-levels
@@ -9092,25 +10836,25 @@

Lose of Credibility

-
-

Lose of Customer Confidence

+
+

Malicious Code Attack

- + - + @@ -9125,8 +10869,17 @@

Lose of Customer Confidence

- + + + + + + @@ -9139,7 +10892,7 @@

Lose of Customer Confidence

- + @@ -9148,7 +10901,7 @@

Lose of Customer Confidence

- + @@ -9175,25 +10928,25 @@

Lose of Customer Confidence

-
-

Lose of Goodwill

+
+

Malware Attack

TermLoseCustomerConfidenceMaliciousCodeAttack Prefix risk-owl
LabelLose of Customer ConfidenceMalicious Code Attack
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#LoseCustomerConfidence
- https://w3id.org/dpv/risk#LoseCustomerConfidence + https://w3id.org/dpv/risk/owl/#MaliciousCodeAttack
+ https://w3id.org/dpv/risk#MaliciousCodeAttack
Sub-class of risk-owl:ReputationalRisk + risk-owl:AvailabilityConcept +
Sub-class of risk-owl:ConfidentialityConcept +
Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept +
Sub-class of risk-owl:IntegrityConcept
DefinitionSomething that acts as or causes Loss of Customer ConfidenceSomething that acts as or causes Malicious Code Attack
SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
- + - + @@ -9208,8 +10961,17 @@

Lose of Goodwill

- + + + + + + @@ -9222,7 +10984,7 @@

Lose of Goodwill

- + @@ -9231,7 +10993,7 @@

Lose of Goodwill

- + @@ -9258,25 +11020,25 @@

Lose of Goodwill

-
-

Lose of Negotiating Capacity

+
+

Material Damage

TermLoseGoodwillMalwareAttack Prefix risk-owl
LabelLose of GoodwillMalware Attack
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#LoseGoodwill
- https://w3id.org/dpv/risk#LoseGoodwill + https://w3id.org/dpv/risk/owl/#MalwareAttack
+ https://w3id.org/dpv/risk#MalwareAttack
Sub-class of risk-owl:ReputationalRisk + risk-owl:AvailabilityConcept +
Sub-class of risk-owl:ConfidentialityConcept +
Sub-class of risk-owl:ExternalSecurityThreatdpv-owl:RiskConcept +
Sub-class of risk-owl:IntegrityConcept
DefinitionSomething that acts as or causes Loss of GoodwillSomething that acts as or causes Malware Attack
SourceISO/IEC 27005:2018ENISA Methodology for Sectoral Cybersecurity Assessments
- + - + @@ -9291,7 +11053,7 @@

Lose of Negotiating Capacity

- @@ -9305,23 +11067,23 @@

Lose of Negotiating Capacity

- + - + + + + - - - - + - + @@ -9341,25 +11103,25 @@

Lose of Negotiating Capacity

-
-

Lose of Opportunity

+
+

Misuse

TermLoseNegotiatingCapacityMaterialDamage Prefix risk-owl
LabelLose of Negotiating CapacityMaterial Damage
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#LoseNegotiatingCapacity
- https://w3id.org/dpv/risk#LoseNegotiatingCapacity + https://w3id.org/dpv/risk/owl/#MaterialDamage
+ https://w3id.org/dpv/risk#MaterialDamage
Sub-class of risk-owl:ReputationalRisk + risk-owl:LegalRiskdpv-owl:RiskConcept
DefinitionSomething that acts as or causes Loss of Negotiating CapacitySomething that acts as or causes Material Damage
Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
SourceISO/IEC 27005:2018
Date Created2022-08-172022-03-30
Date Modified
- + - + @@ -9374,7 +11136,7 @@

Lose of Opportunity

- @@ -9388,23 +11150,20 @@

Lose of Opportunity

- + - - - - + - + @@ -9412,7 +11171,7 @@

Lose of Opportunity

- + @@ -9424,25 +11183,25 @@

Lose of Opportunity

-
-

Lose of Reputation

+
+

Moderate Likelihood

TermLoseOpportunityMisuse Prefix risk-owl
LabelLose of OpportunityMisuse
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#LoseOpportunity
- https://w3id.org/dpv/risk#LoseOpportunity + https://w3id.org/dpv/risk/owl/#Misuse
+ https://w3id.org/dpv/risk#Misuse
Sub-class of risk-owl:ReputationalRisk + risk-owl:UserRisksdpv-owl:RiskConcept
DefinitionSomething that acts as or causes Loss of OpportunitySomething that acts as or causes Misuse
SourceISO/IEC 27005:2018
Date Created2022-08-172024-06-11
Date Modified
ContributorsHarshvardhan J. PanditDelaram Golpayegani
Documented in
- + - + @@ -9451,18 +11210,30 @@

Lose of Reputation

- + + + + - + + + + @@ -9471,35 +11242,32 @@

Lose of Reputation

- + - + + + + - - - - + - + - - - - + - +
TermLoseReputationModerateLikelihood Prefix risk-owl
LabelLose of ReputationModerate Likelihood
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#LoseReputation
- https://w3id.org/dpv/risk#LoseReputation + https://w3id.org/dpv/risk/owl/#ModerateLikelihood
+ https://w3id.org/dpv/risk#ModerateLikelihood
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , dpv-owl:Likelihood
Sub-class of risk-owl:ReputationalRisk - → dpv-owl:RiskConcept + risk-owl:3LikelihoodLevels + → dpv-owl:Likelihood +
Sub-class of risk-owl:5LikelihoodLevels + → dpv-owl:Likelihood +
Sub-class of risk-owl:7LikelihoodLevels + → dpv-owl:Likelihood
in Range of dpv-owl:hasLikelihood +
DefinitionSomething that acts as or causes Loss of ReputationLevel where Likelihood is Moderate
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-levels
@@ -9507,25 +11275,25 @@

Lose of Reputation

-
-

Lose of Trust

+
+

Moderate Risk

- + - + @@ -9534,18 +11302,30 @@

Lose of Trust

- + + + + - + + + + @@ -9554,35 +11334,32 @@

Lose of Trust

- + - + + + + - - - - + - + - - - - + - +
TermLoseTrustModerateRisk Prefix risk-owl
LabelLose of TrustModerate Risk
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#LoseTrust
- https://w3id.org/dpv/risk#LoseTrust + https://w3id.org/dpv/risk/owl/#ModerateRisk
+ https://w3id.org/dpv/risk#ModerateRisk
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , dpv-owl:RiskLevel
Sub-class of risk-owl:ReputationalRisk - → dpv-owl:RiskConcept + risk-owl:3RiskLevels + → dpv-owl:RiskLevel +
Sub-class of risk-owl:5RiskLevels + → dpv-owl:RiskLevel +
Sub-class of risk-owl:7RiskLevels + → dpv-owl:RiskLevel
in Range of dpv-owl:hasRiskLevel +
DefinitionSomething that acts as or causes Loss of TrustLevel where Risk is Moderate
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-levels
@@ -9590,25 +11367,25 @@

Lose of Trust

-
-

Low Likelihood

+
+

Moderate Severity

- + - + @@ -9617,28 +11394,28 @@

Low Likelihood

- - - - @@ -9649,11 +11426,11 @@

Low Likelihood

- + - + @@ -9682,25 +11459,25 @@

Low Likelihood

-
-

Low Risk

+
+

Monitor Consequence

TermLowLikelihoodModerateSeverity Prefix risk-owl
LabelLow LikelihoodModerate Severity
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#LowLikelihood
- https://w3id.org/dpv/risk#LowLikelihood + https://w3id.org/dpv/risk/owl/#ModerateSeverity
+ https://w3id.org/dpv/risk#ModerateSeverity
Type rdfs:Class , owl:Class - , dpv-owl:Likelihood + , dpv-owl:Severity
Sub-class of risk-owl:3LikelihoodLevels - → dpv-owl:Likelihood + risk-owl:3SeverityLevels + → dpv-owl:Severity
Sub-class of risk-owl:5LikelihoodLevels - → dpv-owl:Likelihood + risk-owl:5SeverityLevels + → dpv-owl:Severity
Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood + risk-owl:7SeverityLevels + → dpv-owl:Severity
in Range of dpv-owl:hasLikelihood + dpv-owl:hasSeverity
DefinitionLevel where Likelihood is LowLevel where Severity is Moderate
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
- + - + @@ -9709,28 +11486,24 @@

Low Risk

- - - - - - @@ -9741,12 +11514,9 @@

Low Risk

- + - - - - + @@ -9757,7 +11527,7 @@

Low Risk

- + @@ -9766,7 +11536,7 @@

Low Risk

- +
TermLowRiskMonitorConsequence Prefix risk-owl
LabelLow RiskMonitor Consequence
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#LowRisk
- https://w3id.org/dpv/risk#LowRisk + https://w3id.org/dpv/risk/owl/#MonitorConsequence
+ https://w3id.org/dpv/risk#MonitorConsequence
Type rdfs:Class , owl:Class - , dpv-owl:RiskLevel + , risk-owl:RiskControl
Sub-class of risk-owl:3RiskLevels - → dpv-owl:RiskLevel -
Sub-class of risk-owl:5RiskLevels - → dpv-owl:RiskLevel -
Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel + risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasRiskLevel + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
DefinitionLevel where Risk is LowControl that monitors a Risk Consequence
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Date Created2022-08-182024-05-19
Documented inRisk Risk-levelsRisk Risk-controls
@@ -9774,25 +11544,25 @@

Low Risk

-
-

Low Severity

+
+

Monitor Control

- + - + @@ -9801,28 +11571,23 @@

Low Severity

- - - - - - @@ -9833,11 +11598,11 @@

Low Severity

- + - + @@ -9849,7 +11614,7 @@

Low Severity

- + @@ -9858,7 +11623,7 @@

Low Severity

- +
TermLowSeverityMonitorControl Prefix risk-owl
LabelLow SeverityMonitor Control
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#LowSeverity
- https://w3id.org/dpv/risk#LowSeverity + https://w3id.org/dpv/risk/owl/#MonitorControl
+ https://w3id.org/dpv/risk#MonitorControl
Type rdfs:Class , owl:Class - , dpv-owl:Severity + , risk-owl:RiskControl
Sub-class of risk-owl:3SeverityLevels - → dpv-owl:Severity -
Sub-class of risk-owl:5SeverityLevels - → dpv-owl:Severity -
Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasSeverity + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
DefinitionLevel where Severity is LowRisk Mitigation Measure that uses controls to monitor events
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
Date Created2022-08-182024-05-19
Documented inRisk Risk-levelsRisk Risk-controls
@@ -9866,25 +11631,25 @@

Low Severity

-
-

Malicious Code Attack

+
+

Monitor Impact

- + - + @@ -9893,27 +11658,26 @@

Malicious Code Attack

- - - - - - - - + + + + @@ -9922,35 +11686,29 @@

Malicious Code Attack

- + - - - - + - + - - - - + - +
TermMaliciousCodeAttackMonitorImpact Prefix risk-owl
LabelMalicious Code AttackMonitor Impact
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#MaliciousCodeAttack
- https://w3id.org/dpv/risk#MaliciousCodeAttack + https://w3id.org/dpv/risk/owl/#MonitorImpact
+ https://w3id.org/dpv/risk#MonitorImpact
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
Sub-class of risk-owl:AvailabilityConcept -
Sub-class of risk-owl:ConfidentialityConcept -
Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept -
Sub-class of risk-owl:IntegrityConcept + risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
DefinitionSomething that acts as or causes Malicious Code AttackControl that monitors a Risk Impact
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-controls
@@ -9958,25 +11716,25 @@

Malicious Code Attack

-
-

Malware Attack

+
+

Monitor Risk

- + - + @@ -9985,27 +11743,26 @@

Malware Attack

- - - - - - - - + + + + @@ -10014,35 +11771,29 @@

Malware Attack

- + - - - - + - + - - - - + - +
TermMalwareAttackMonitorRisk Prefix risk-owl
LabelMalware AttackMonitor Risk
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#MalwareAttack
- https://w3id.org/dpv/risk#MalwareAttack + https://w3id.org/dpv/risk/owl/#MonitorRisk
+ https://w3id.org/dpv/risk#MonitorRisk
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
Sub-class of risk-owl:AvailabilityConcept -
Sub-class of risk-owl:ConfidentialityConcept -
Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept -
Sub-class of risk-owl:IntegrityConcept + risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
DefinitionSomething that acts as or causes Malware AttackControl that monitors a Risk
SourceENISA Methodology for Sectoral Cybersecurity Assessments
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-controls
@@ -10050,25 +11801,25 @@

Malware Attack

-
-

Material Damage

+
+

Monitor Control

- + - + @@ -10077,18 +11828,26 @@

Material Damage

- - + + + + @@ -10097,12 +11856,9 @@

Material Damage

- + - - - - + @@ -10113,19 +11869,16 @@

Material Damage

- + - - - - + - +
TermMaterialDamageMonitorRiskControl Prefix risk-owl
LabelMaterial DamageMonitor Control
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#MaterialDamage
- https://w3id.org/dpv/risk#MaterialDamage + https://w3id.org/dpv/risk/owl/#MonitorRiskControl
+ https://w3id.org/dpv/risk#MonitorRiskControl
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
Sub-class of risk-owl:LegalRisk - → dpv-owl:RiskConcept + risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
DefinitionSomething that acts as or causes Material DamageControl that monitors another Control
Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
Date Created2022-03-302024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-controls
@@ -10133,25 +11886,25 @@

Material Damage

-
-

Misuse

+
+

Monitor Risk Source

- + - + @@ -10160,18 +11913,26 @@

Misuse

- - + + + + @@ -10180,7 +11941,7 @@

Misuse

- + @@ -10193,19 +11954,16 @@

Misuse

- + - - - - + - + - +
TermMisuseMonitorRiskSource Prefix risk-owl
LabelMisuseMonitor Risk Source
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Misuse
- https://w3id.org/dpv/risk#Misuse + https://w3id.org/dpv/risk/owl/#MonitorRiskSource
+ https://w3id.org/dpv/risk#MonitorRiskSource
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
Sub-class of risk-owl:UserRisks - → dpv-owl:RiskConcept + risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
DefinitionSomething that acts as or causes MisuseControl that monitors a Risk Source
Date Created2024-06-112024-05-19
Date Modified2024-08-16
ContributorsDelaram GolpayeganiHarshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-controls
@@ -10213,25 +11971,25 @@

Misuse

-
-

Moderate Likelihood

+
+

Monitor Vulnerabilities

- + - + @@ -10240,28 +11998,24 @@

Moderate Likelihood

- - - - - - @@ -10272,12 +12026,9 @@

Moderate Likelihood

- + - - - - + @@ -10288,7 +12039,7 @@

Moderate Likelihood

- + @@ -10297,7 +12048,7 @@

Moderate Likelihood

- +
TermModerateLikelihoodMonitorVulnerabilities Prefix risk-owl
LabelModerate LikelihoodMonitor Vulnerabilities
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ModerateLikelihood
- https://w3id.org/dpv/risk#ModerateLikelihood + https://w3id.org/dpv/risk/owl/#MonitorVulnerabilities
+ https://w3id.org/dpv/risk#MonitorVulnerabilities
Type rdfs:Class , owl:Class - , dpv-owl:Likelihood + , risk-owl:RiskControl
Sub-class of risk-owl:3LikelihoodLevels - → dpv-owl:Likelihood -
Sub-class of risk-owl:5LikelihoodLevels - → dpv-owl:Likelihood -
Sub-class of risk-owl:7LikelihoodLevels - → dpv-owl:Likelihood + risk-owl:MonitorControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasLikelihood + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
DefinitionLevel where Likelihood is ModerateControl that monitors a Risk Vulnerability
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Date Created2022-08-182024-05-19
Documented inRisk Risk-levelsRisk Risk-controls
@@ -10305,25 +12056,25 @@

Moderate Likelihood

-
-

Moderate Risk

+
+

Non-Material Damage

- + - + @@ -10332,30 +12083,18 @@

Moderate Risk

- - - - - - - - - + @@ -10364,11 +12103,11 @@

Moderate Risk

- + - + @@ -10380,16 +12119,19 @@

Moderate Risk

- + - + + + + - +
TermModerateRiskNonMaterialDamage Prefix risk-owl
LabelModerate RiskNon-Material Damage
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ModerateRisk
- https://w3id.org/dpv/risk#ModerateRisk + https://w3id.org/dpv/risk/owl/#NonMaterialDamage
+ https://w3id.org/dpv/risk#NonMaterialDamage
Type rdfs:Class , owl:Class - , dpv-owl:RiskLevel + , dpv-owl:RiskConcept
Sub-class of risk-owl:3RiskLevels - → dpv-owl:RiskLevel -
Sub-class of risk-owl:5RiskLevels - → dpv-owl:RiskLevel -
Sub-class of risk-owl:7RiskLevels - → dpv-owl:RiskLevel + risk-owl:LegalRisk + → dpv-owl:RiskConcept
in Range of dpv-owl:hasRiskLevel -
DefinitionLevel where Risk is ModerateSomething that acts as or causes Non-Material Damage
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1The criteria for what is considered material damage is based in jurisdictional laws and norms
Date Created2022-08-182022-03-30
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-levelsRisk Risk-consequences
@@ -10397,25 +12139,25 @@

Moderate Risk

-
-

Moderate Severity

+
+

Non-Normality Bias

- + - + @@ -10424,30 +12166,20 @@

Moderate Severity

- - - - - - - - - + @@ -10456,32 +12188,32 @@

Moderate Severity

- + - - - - + - + + + + - + - + - +
TermModerateSeverityNonNormalityBias Prefix risk-owl
LabelModerate SeverityNon-Normality Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ModerateSeverity
- https://w3id.org/dpv/risk#ModerateSeverity + https://w3id.org/dpv/risk/owl/#NonNormalityBias
+ https://w3id.org/dpv/risk#NonNormalityBias
Type rdfs:Class , owl:Class - , dpv-owl:Severity + , risk-owl:RiskConcept
Sub-class of risk-owl:3SeverityLevels - → dpv-owl:Severity -
Sub-class of risk-owl:5SeverityLevels - → dpv-owl:Severity -
Sub-class of risk-owl:7SeverityLevels - → dpv-owl:Severity + risk-owl:StatisticalBias + → risk-owl:DataBias + → risk-owl:Bias + → risk-owl:RiskConcept
in Range of dpv-owl:hasSeverity -
DefinitionLevel where Severity is ModerateBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Source
Date Created2022-08-182024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
Documented inRisk Risk-levelsRisk Bias
@@ -10489,25 +12221,25 @@

Moderate Severity

-
-

Monitor Consequence

+
+

Non-Response Bias

- + - + @@ -10516,26 +12248,21 @@

Monitor Consequence

- - - - - + @@ -10544,29 +12271,32 @@

Monitor Consequence

- + - + + + + - + - + - +
TermMonitorConsequenceNonResponseBias Prefix risk-owl
LabelMonitor ConsequenceNon-Response Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#MonitorConsequence
- https://w3id.org/dpv/risk#MonitorConsequence + https://w3id.org/dpv/risk/owl/#NonResponseBias
+ https://w3id.org/dpv/risk#NonResponseBias
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , risk-owl:RiskConcept
Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:SelectionBias + → risk-owl:StatisticalBias + → risk-owl:DataBias + → risk-owl:Bias + → risk-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionControl that monitors a Risk ConsequenceBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias
Source
Date Created2024-05-192024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
Documented inRisk Risk-controlsRisk Bias
@@ -10574,25 +12304,25 @@

Monitor Consequence

-
-

Monitor Control

+
+

Operational Security Risk

- + - + @@ -10601,25 +12331,17 @@

Monitor Control

- - - - - + @@ -10628,12 +12350,9 @@

Monitor Control

- + - - - - + @@ -10642,18 +12361,12 @@

Monitor Control

- - - - + + - - - - - +
TermMonitorControlOperationalSecurityRisk Prefix risk-owl
LabelMonitor ControlOperational Security Risk
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#MonitorControl
- https://w3id.org/dpv/risk#MonitorControl + https://w3id.org/dpv/risk/owl/#OperationalSecurityRisk
+ https://w3id.org/dpv/risk#OperationalSecurityRisk
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + dpv-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionRisk Mitigation Measure that uses controls to monitor eventsRisks and issues that arise during operational processes
Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
Date Created2024-05-19
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-controlsRisk Risk-consequences
@@ -10661,25 +12374,25 @@

Monitor Control

-
-

Monitor Impact

+
+

Out-Group Homogeneity Bias

- + - + @@ -10688,26 +12401,19 @@

Monitor Impact

- - - - - + @@ -10716,29 +12422,32 @@

Monitor Impact

- + - + + + + - + - + - +
TermMonitorImpactOutGroupHomogeneityBias Prefix risk-owl
LabelMonitor ImpactOut-Group Homogeneity Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#MonitorImpact
- https://w3id.org/dpv/risk#MonitorImpact + https://w3id.org/dpv/risk/owl/#OutGroupHomogeneityBias
+ https://w3id.org/dpv/risk#OutGroupHomogeneityBias
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , risk-owl:RiskConcept
Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionControl that monitors a Risk ImpactBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics
Source
Date Created2024-05-192024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
Documented inRisk Risk-controlsRisk Bias
@@ -10746,25 +12455,25 @@

Monitor Impact

-
-

Monitor Risk

+
+

Payment

- + - + @@ -10773,26 +12482,18 @@

Monitor Risk

- - - - - + @@ -10801,7 +12502,7 @@

Monitor Risk

- + @@ -10814,42 +12515,45 @@

Monitor Risk

- + - + + + + - + - +
TermMonitorRiskPayment Prefix risk-owl
LabelMonitor RiskPayment
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#MonitorRisk
- https://w3id.org/dpv/risk#MonitorRisk + https://w3id.org/dpv/risk/owl/#Payment
+ https://w3id.org/dpv/risk#Payment
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:FinancialImpact + → dpv-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionControl that monitors a RiskSomething that acts as or provides payment e.g. to access a service or purchase resources
Date Created2024-05-192024-04-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
Documented inRisk Risk-controlsRisk Risk-consequences
- -
-

Monitor Control

+ +
+

Personal Safety Endangerment

- + - + @@ -10858,26 +12562,18 @@

Monitor Control

- - - - - + @@ -10886,29 +12582,35 @@

Monitor Control

- + - + + + + - + - + + + + - +
TermMonitorRiskControlPersonalSafetyEndangerment Prefix risk-owl
LabelMonitor ControlPersonal Safety Endangerment
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#MonitorRiskControl
- https://w3id.org/dpv/risk#MonitorRiskControl + https://w3id.org/dpv/risk/owl/#PersonalSafetyEndangerment
+ https://w3id.org/dpv/risk#PersonalSafetyEndangerment
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:SocietalRisk + → dpv-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionControl that monitors another ControlSomething that acts as or causes Personal Safety Endangerment
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-controlsRisk Risk-consequences
@@ -10916,25 +12618,25 @@

Monitor Control

-
-

Monitor Risk Source

+
+

Phishing Scam

- + - + @@ -10943,26 +12645,21 @@

Monitor Risk Source

- + + - - - - + @@ -10971,29 +12668,35 @@

Monitor Risk Source

- + - + + + + - + - + + + + - +
TermMonitorRiskSourcePhishingScam Prefix risk-owl
LabelMonitor Risk SourcePhishing Scam
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#MonitorRiskSource
- https://w3id.org/dpv/risk#MonitorRiskSource + https://w3id.org/dpv/risk/owl/#PhishingScam
+ https://w3id.org/dpv/risk#PhishingScam
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:ConfidentialityConcept +
Sub-class of risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionControl that monitors a Risk SourceSomething that acts as or causes Phishing Scam
SourceENISA Threat Landscape for Ransomware Attacks 2022
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-controlsRisk Risk-consequences
@@ -11001,25 +12704,25 @@

Monitor Risk Source

-
-

Monitor Vulnerabilities

+
+

Physical Assault

- + - + @@ -11028,26 +12731,17 @@

Monitor Vulnerabilities

- - - - - + @@ -11056,29 +12750,35 @@

Monitor Vulnerabilities

- + - + + + + - + - + + + + - +
TermMonitorVulnerabilitiesPhysicalAssault Prefix risk-owl
LabelMonitor VulnerabilitiesPhysical Assault
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#MonitorVulnerabilities
- https://w3id.org/dpv/risk#MonitorVulnerabilities + https://w3id.org/dpv/risk/owl/#PhysicalAssault
+ https://w3id.org/dpv/risk#PhysicalAssault
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
Sub-class of risk-owl:MonitorControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:IndividualRisk
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionControl that monitors a Risk VulnerabilitySomething that acts as or causes Physical Assault
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-controlsRisk Risk-consequences
@@ -11086,25 +12786,25 @@

Monitor Vulnerabilities

-
-

Non-Material Damage

+
+

Physical Harm

- + - + @@ -11119,8 +12819,7 @@

Non-Material Damage

- @@ -11131,14 +12830,8 @@

Non-Material Damage

- - - - - - - - + + @@ -11147,18 +12840,9 @@

Non-Material Damage

- - - - - - - - - - - - + + + @@ -11169,25 +12853,25 @@

Non-Material Damage

-
-

Operational Security Risk

+
+

Privacy

TermNonMaterialDamagePhysicalHarm Prefix risk-owl
LabelNon-Material DamagePhysical Harm
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#NonMaterialDamage
- https://w3id.org/dpv/risk#NonMaterialDamage + https://w3id.org/dpv/risk/owl/#PhysicalHarm
+ https://w3id.org/dpv/risk#PhysicalHarm
Sub-class of risk-owl:LegalRisk - → dpv-owl:RiskConcept + risk-owl:IndividualRisk
DefinitionSomething that acts as or causes Non-Material Damage
Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
Date Created2022-03-30
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented in Risk Risk-consequences
- + - + @@ -11202,7 +12886,7 @@

Operational Security Risk

- @@ -11213,10 +12897,7 @@

Operational Security Risk

- - - - + @@ -11239,25 +12920,25 @@

Operational Security Risk

-
-

Payment

+
+

Psychological Harm

TermOperationalSecurityRiskPrivacy Prefix risk-owl
LabelOperational Security RiskPrivacy
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#OperationalSecurityRisk
- https://w3id.org/dpv/risk#OperationalSecurityRisk + https://w3id.org/dpv/risk/owl/#Privacy
+ https://w3id.org/dpv/risk#Privacy
Sub-class of dpv-owl:RiskConcept + risk-owl:IndividualRisk
DefinitionRisks and issues that arise during operational processes
- + - + @@ -11272,8 +12953,7 @@

Payment

- @@ -11286,20 +12966,23 @@

Payment

- + - + + + + - + @@ -11307,7 +12990,7 @@

Payment

- + @@ -11319,25 +13002,25 @@

Payment

-
-

Personal Safety Endangerment

+
+

Public Order Breach

TermPaymentPsychologicalHarm Prefix risk-owl
LabelPaymentPsychological Harm
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Payment
- https://w3id.org/dpv/risk#Payment + https://w3id.org/dpv/risk/owl/#PsychologicalHarm
+ https://w3id.org/dpv/risk#PsychologicalHarm
Sub-class of risk-owl:FinancialImpact - → dpv-owl:RiskConcept + risk-owl:IndividualRisk
DefinitionSomething that acts as or provides payment e.g. to access a service or purchase resourcesSomething that acts as or causes Psychological Harm
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2024-04-142022-08-17
Date Modified
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
Documented in
- + - + @@ -11352,7 +13035,7 @@

Personal Safety Endangerment

- @@ -11366,7 +13049,7 @@

Personal Safety Endangerment

- + @@ -11402,25 +13085,25 @@

Personal Safety Endangerment

-
-

Phishing Scam

+
+

Recovery Control

TermPersonalSafetyEndangermentPublicOrderBreach Prefix risk-owl
LabelPersonal Safety EndangermentPublic Order Breach
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#PersonalSafetyEndangerment
- https://w3id.org/dpv/risk#PersonalSafetyEndangerment + https://w3id.org/dpv/risk/owl/#PublicOrderBreach
+ https://w3id.org/dpv/risk#PublicOrderBreach
Sub-class of risk-owl:SocietalRisk + risk-owl:LegalRiskdpv-owl:RiskConcept
DefinitionSomething that acts as or causes Personal Safety EndangermentSomething that acts as or causes Public Order Breach
- + - + @@ -11429,21 +13112,25 @@

Phishing Scam

- - - - + + + + @@ -11452,35 +13139,26 @@

Phishing Scam

- + - - - - + - + - - - - - - - - + + - +
TermPhishingScamRecoveryControl Prefix risk-owl
LabelPhishing ScamRecovery Control
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#PhishingScam
- https://w3id.org/dpv/risk#PhishingScam + https://w3id.org/dpv/risk/owl/#RecoveryControl
+ https://w3id.org/dpv/risk#RecoveryControl
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
Sub-class of risk-owl:ConfidentialityConcept -
Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
DefinitionSomething that acts as or causes Phishing ScamControl to recover from event
SourceENISA Threat Landscape for Ransomware Attacks 2022
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-controls
@@ -11488,25 +13166,25 @@

Phishing Scam

-
-

Physical Assault

+
+

Reduce Likelihood

- + - + @@ -11515,17 +13193,26 @@

Physical Assault

- - + + + + @@ -11534,35 +13221,29 @@

Physical Assault

- + - - - - + - + - - - - + - +
TermPhysicalAssaultReduceLikelihood Prefix risk-owl
LabelPhysical AssaultReduce Likelihood
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#PhysicalAssault
- https://w3id.org/dpv/risk#PhysicalAssault + https://w3id.org/dpv/risk/owl/#ReduceLikelihood
+ https://w3id.org/dpv/risk#ReduceLikelihood
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
Sub-class of risk-owl:IndividualRisk + risk-owl:ReductionControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
DefinitionSomething that acts as or causes Physical AssaultControl that reduces the likelihood of an event
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-controls
@@ -11570,25 +13251,25 @@

Physical Assault

-
-

Physical Harm

+
+

Reduce Severity

- + - + @@ -11597,24 +13278,36 @@

Physical Harm

- - + + + + - + + + + @@ -11624,12 +13317,18 @@

Physical Harm

- - + + + + + + + + - +
TermPhysicalHarmReduceSeverity Prefix risk-owl
LabelPhysical HarmReduce Severity
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#PhysicalHarm
- https://w3id.org/dpv/risk#PhysicalHarm + https://w3id.org/dpv/risk/owl/#ReduceSeverity
+ https://w3id.org/dpv/risk#ReduceSeverity
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
Sub-class of risk-owl:IndividualRisk + risk-owl:ReductionControl + → risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
DefinitionControl that reduces the severity of an event
Date Created2024-05-19
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-controls
@@ -11637,25 +13336,25 @@

Physical Harm

-
-

Privacy

+
+

Reduction Control

- + - + @@ -11664,24 +13363,35 @@

Privacy

- - + + + + - + + + + @@ -11691,12 +13401,15 @@

Privacy

- + + + + - +
TermPrivacyReductionControl Prefix risk-owl
LabelPrivacyReduction Control
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Privacy
- https://w3id.org/dpv/risk#Privacy + https://w3id.org/dpv/risk/owl/#ReductionControl
+ https://w3id.org/dpv/risk#ReductionControl
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
Sub-class of risk-owl:IndividualRisk + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
DefinitionControl that reduces the likelihood or severity of an event
Date Created2024-05-19
Documented inRisk Risk-consequencesRisk Risk-controls
@@ -11704,25 +13417,27 @@

Privacy

-
-

Psychological Harm

+ + +
+

Re-identification

- + - + @@ -11737,7 +13452,11 @@

Psychological Harm

- + + @@ -11750,23 +13469,23 @@

Psychological Harm

- + - + + + + - - - - + - + @@ -11786,25 +13505,25 @@

Psychological Harm

-
-

Public Order Breach

+
+

Remedy Control

TermPsychologicalHarmReidentification Prefix risk-owl
LabelPsychological HarmRe-identification
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#PsychologicalHarm
- https://w3id.org/dpv/risk#PsychologicalHarm + https://w3id.org/dpv/risk/owl/#Reidentification
+ https://w3id.org/dpv/risk#Reidentification
Sub-class of risk-owl:IndividualRisk + risk-owl:ConfidentialityConcept +
Sub-class of risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
DefinitionSomething that acts as or causes Psychological HarmSomething that acts as or causes Re-identification
Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172022-08-19
Date Modified
- + - + @@ -11813,18 +13532,25 @@

Public Order Breach

- - + + + + @@ -11833,35 +13559,26 @@

Public Order Breach

- + - - - - + - + - - - - - - - - + + - +
TermPublicOrderBreachRemedyControl Prefix risk-owl
LabelPublic Order BreachRemedy Control
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#PublicOrderBreach
- https://w3id.org/dpv/risk#PublicOrderBreach + https://w3id.org/dpv/risk/owl/#RemedyControl
+ https://w3id.org/dpv/risk#RemedyControl
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
Sub-class of risk-owl:LegalRisk - → dpv-owl:RiskConcept + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
DefinitionSomething that acts as or causes Public Order BreachControl to remedy consequences of event
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-controls
@@ -11869,25 +13586,25 @@

Public Order Breach

-
-

Recovery Control

+
+

Remove Consequence

- + - + @@ -11902,7 +13619,8 @@

Recovery Control

- @@ -11923,7 +13641,7 @@

Recovery Control

- + @@ -11939,7 +13657,10 @@

Recovery Control

- + + + + @@ -11950,25 +13671,25 @@

Recovery Control

-
-

Reduce Likelihood

+
+

Remove Impact

TermRecoveryControlRemoveConsequence Prefix risk-owl
LabelRecovery ControlRemove Consequence
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RecoveryControl
- https://w3id.org/dpv/risk#RecoveryControl + https://w3id.org/dpv/risk/owl/#RemoveConsequence
+ https://w3id.org/dpv/risk#RemoveConsequence
Sub-class of risk-owl:RiskControl + risk-owl:ConsequenceControl + → risk-owl:RiskControldpv-owl:RiskMitigationMeasuredpv-owl:TechnicalOrganisationalMeasure
DefinitionControl to recover from eventControl that removes Consequence i.e. prevents it from materialising
2024-05-19
ContributorsHarshvardhan J. Pandit
Documented in Risk Risk-controls
- + - + @@ -11983,7 +13704,7 @@

Reduce Likelihood

- - + @@ -12035,25 +13756,25 @@

Reduce Likelihood

-
-

Reduce Severity

+
+

Remove Source

TermReduceLikelihoodRemoveImpact Prefix risk-owl
LabelReduce LikelihoodRemove Impact
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ReduceLikelihood
- https://w3id.org/dpv/risk#ReduceLikelihood + https://w3id.org/dpv/risk/owl/#RemoveImpact
+ https://w3id.org/dpv/risk#RemoveImpact
Sub-class of risk-owl:ReductionControl + risk-owl:ImpactControlrisk-owl:RiskControldpv-owl:RiskMitigationMeasuredpv-owl:TechnicalOrganisationalMeasure @@ -12005,7 +13726,7 @@

Reduce Likelihood

DefinitionControl that reduces the likelihood of an eventControl that removes Impact i.e. prevents it from materialising
- + - + @@ -12068,7 +13789,7 @@

Reduce Severity

- - + @@ -12120,25 +13841,25 @@

Reduce Severity

-
-

Reduction Control

+
+

Remuneration

TermReduceSeverityRemoveSource Prefix risk-owl
LabelReduce SeverityRemove Source
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ReduceSeverity
- https://w3id.org/dpv/risk#ReduceSeverity + https://w3id.org/dpv/risk/owl/#RemoveSource
+ https://w3id.org/dpv/risk#RemoveSource
Sub-class of risk-owl:ReductionControl + risk-owl:SourceControlrisk-owl:RiskControldpv-owl:RiskMitigationMeasuredpv-owl:TechnicalOrganisationalMeasure @@ -12090,7 +13811,7 @@

Reduce Severity

DefinitionControl that reduces the severity of an eventControl that removes the risk source
- + - + @@ -12147,25 +13868,18 @@

Reduction Control

- - - - - + @@ -12174,7 +13888,7 @@

Reduction Control

- + @@ -12187,13 +13901,19 @@

Reduction Control

- + - - + + + + + + + + - +
TermReductionControlRenumeration Prefix risk-owl
LabelReduction ControlRemuneration
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ReductionControl
- https://w3id.org/dpv/risk#ReductionControl + https://w3id.org/dpv/risk/owl/#Renumeration
+ https://w3id.org/dpv/risk#Renumeration
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:FinancialImpact + → dpv-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionControl that reduces the likelihood or severity of an eventSomething that acts as or provides renumeration which is in monetary or financial form
Date Created2024-05-192024-04-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
Documented inRisk Risk-controlsRisk Risk-consequences
@@ -12201,27 +13921,25 @@

Reduction Control

- - -
-

Re-identification

+
+

Reputational Risk

- + - + @@ -12236,11 +13954,7 @@

Re-identification

- - - @@ -12253,12 +13967,9 @@

Re-identification

- + - - - - + @@ -12267,18 +13978,9 @@

Re-identification

- - - - - - - - - - - - + + + @@ -12289,25 +13991,25 @@

Re-identification

-
-

Remedy Control

+
+

Requirements Bias

TermReidentificationReputationalRisk Prefix risk-owl
LabelRe-identificationReputational Risk
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Reidentification
- https://w3id.org/dpv/risk#Reidentification + https://w3id.org/dpv/risk/owl/#ReputationalRisk
+ https://w3id.org/dpv/risk#ReputationalRisk
Sub-class of risk-owl:ConfidentialityConcept -
Sub-class of risk-owl:OperationalSecurityRisk - → dpv-owl:RiskConcept + dpv-owl:RiskConcept
DefinitionSomething that acts as or causes Re-identificationRisks and issues that affect the reputation of the organisation
Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
Date Created2022-08-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented in Risk Risk-consequences
- + - + @@ -12316,25 +14018,19 @@

Remedy Control

- - - - - + @@ -12343,26 +14039,35 @@

Remedy Control

- + - + + + + - + + + + - + - + + + + - +
TermRemedyControlRequirementsBias Prefix risk-owl
LabelRemedy ControlRequirements Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RemedyControl
- https://w3id.org/dpv/risk#RemedyControl + https://w3id.org/dpv/risk/owl/#RequirementsBias
+ https://w3id.org/dpv/risk#RequirementsBias
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , risk-owl:RiskConcept
Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionControl to remedy consequences of eventBias that occurs in or during requirements creation
Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifest
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
Documented inRisk Risk-controlsRisk Bias
@@ -12370,25 +14075,25 @@

Remedy Control

-
-

Remove Consequence

+
+

Reward

- + - + @@ -12397,26 +14102,18 @@

Remove Consequence

- - - - - + @@ -12425,7 +14122,7 @@

Remove Consequence

- + @@ -12438,16 +14135,19 @@

Remove Consequence

- + - + + + + - + - +
TermRemoveConsequenceReward Prefix risk-owl
LabelRemove ConsequenceReward
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RemoveConsequence
- https://w3id.org/dpv/risk#RemoveConsequence + https://w3id.org/dpv/risk/owl/#Reward
+ https://w3id.org/dpv/risk#Reward
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
Sub-class of risk-owl:ConsequenceControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:FinancialImpact + → dpv-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionControl that removes Consequence i.e. prevents it from materialisingSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
Date Created2024-05-192024-04-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
Documented inRisk Risk-controlsRisk Risk-consequences
@@ -12455,25 +14155,25 @@

Remove Consequence

-
-

Remove Impact

+
+

Prevent Exercising of Rights

- + - + @@ -12482,26 +14182,18 @@

Remove Impact

- - - - - + @@ -12510,9 +14202,12 @@

Remove Impact

- + - + + + + @@ -12523,16 +14218,19 @@

Remove Impact

- + - + + + + - + - +
TermRemoveImpactRightsExercisePrevention Prefix risk-owl
LabelRemove ImpactPrevent Exercising of Rights
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RemoveImpact
- https://w3id.org/dpv/risk#RemoveImpact + https://w3id.org/dpv/risk/owl/#RightsExercisePrevention
+ https://w3id.org/dpv/risk#RightsExercisePrevention
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
Sub-class of risk-owl:ImpactControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:SocietalRisk + → dpv-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionControl that removes Impact i.e. prevents it from materialisingSomething that acts as or causes Prevent Exercising of Rights
Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
Date Created2024-05-192022-08-18
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
Documented inRisk Risk-controlsRisk Risk-consequences
@@ -12540,25 +14238,25 @@

Remove Impact

-
-

Remove Source

+
+

Impact to Rights

- + - + @@ -12567,24 +14265,26 @@

Remove Source

- + + - @@ -12595,29 +14295,38 @@

Remove Source

- + - + + + + - + + + + - + - + + + + - +
TermRemoveSourceRightsImpact Prefix risk-owl
LabelRemove SourceImpact to Rights
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RemoveSource
- https://w3id.org/dpv/risk#RemoveSource + https://w3id.org/dpv/risk/owl/#RightsImpact
+ https://w3id.org/dpv/risk#RightsImpact
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
Sub-class of risk-owl:SourceControl - → risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + dpv-owl:Impact + → dpv-owl:Consequence + → dpv-owl:RiskConcept +
Sub-class of risk-owl:SocietalRisk + → dpv-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl + dpv-owl:hasConsequence, + dpv-owl:hasImpact
DefinitionControl that removes the risk sourceSomething that acts as or causes Impact to Rights
Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-controlsRisk Risk-consequences
@@ -12625,25 +14334,25 @@

Remove Source

-
-

Remuneration

+
+

Limitation of Rights

- + - + @@ -12658,7 +14367,7 @@

Remuneration

- @@ -12672,9 +14381,12 @@

Remuneration

- + - + + + + @@ -12685,7 +14397,7 @@

Remuneration

- + @@ -12705,25 +14417,25 @@

Remuneration

-
-

Reputational Risk

+
+

Violation of Rights

TermRenumerationRightsLimitation Prefix risk-owl
LabelRemunerationLimitation of Rights
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Renumeration
- https://w3id.org/dpv/risk#Renumeration + https://w3id.org/dpv/risk/owl/#RightsLimitation
+ https://w3id.org/dpv/risk#RightsLimitation
Sub-class of risk-owl:FinancialImpact + risk-owl:SocietalRiskdpv-owl:RiskConcept
DefinitionSomething that acts as or provides renumeration which is in monetary or financial formSomething that acts as or causes Limitation of Rights
Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
Date Created2024-04-142022-08-18
Date Modified
- + - + @@ -12738,7 +14450,8 @@

Reputational Risk

- @@ -12751,9 +14464,12 @@

Reputational Risk

- + - + + + + @@ -12762,9 +14478,18 @@

Reputational Risk

- - - + + + + + + + + + + + + @@ -12772,28 +14497,31 @@

Reputational Risk

TermReputationalRiskRightsViolation Prefix risk-owl
LabelReputational RiskViolation of Rights
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ReputationalRisk
- https://w3id.org/dpv/risk#ReputationalRisk + https://w3id.org/dpv/risk/owl/#RightsViolation
+ https://w3id.org/dpv/risk#RightsViolation
Sub-class of dpv-owl:RiskConcept + risk-owl:SocietalRisk + → dpv-owl:RiskConcept
DefinitionRisks and issues that affect the reputation of the organisationSomething that acts as or causes Violation of Rights
Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
Date Created2022-08-18
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
Documented in Risk Risk-consequences
+ + + + - -
-

Reward

+
+

Risk Analysis

- + - + @@ -12802,14 +14530,13 @@

Reward

- @@ -12822,58 +14549,57 @@

Reward

- + - + + + + - + - - - - + - + - +
TermRewardRiskAnalysis Prefix risk-owl
LabelRewardRisk Analysis
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Reward
- https://w3id.org/dpv/risk#Reward + https://w3id.org/dpv/risk/owl/#RiskAnalysis
+ https://w3id.org/dpv/risk#RiskAnalysis
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept
Sub-class of risk-owl:FinancialImpact - → dpv-owl:RiskConcept + risk-owl:RiskAssessment + → risk-owl:RiskManagement
DefinitionSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or feeA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
SourceIEC 31010:2019
Date Created2024-04-142022-08-18
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Core
- -
-

Prevent Exercising of Rights

+
+

Risk Assessment

- + - + @@ -12882,14 +14608,12 @@

Prevent Exercising of Rights

- @@ -12902,61 +14626,54 @@

Prevent Exercising of Rights

- + - - - - + - + + + + - + - - - - - - - - + + - +
TermRightsExercisePreventionRiskAssessment Prefix risk-owl
LabelPrevent Exercising of RightsRisk Assessment
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RightsExercisePrevention
- https://w3id.org/dpv/risk#RightsExercisePrevention + https://w3id.org/dpv/risk/owl/#RiskAssessment
+ https://w3id.org/dpv/risk#RiskAssessment
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept
Sub-class of risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:RiskManagement
DefinitionSomething that acts as or causes Prevent Exercising of RightsAssessment of risk involving its identification, analysis, and evaluation
Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
Source
Date Created2022-08-182024-02-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Core
- -
-

Impact to Rights

+
+

Risk Control

- + - + @@ -12965,26 +14682,21 @@

Impact to Rights

- - - - @@ -12995,64 +14707,55 @@

Impact to Rights

- + - - - - + + + + - - - - + - + - - - - - - - - + + - +
TermRightsImpactRiskControl Prefix risk-owl
LabelImpact to RightsRisk Control
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RightsImpact
- https://w3id.org/dpv/risk#RightsImpact + https://w3id.org/dpv/risk/owl/#RiskControl
+ https://w3id.org/dpv/risk#RiskControl
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept
Sub-class of dpv-owl:Impact - → dpv-owl:Consequence - → dpv-owl:RiskConcept -
Sub-class of risk-owl:SocietalRisk - → dpv-owl:RiskConcept + dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasConsequence, - dpv-owl:hasImpact + dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl
DefinitionSomething that acts as or causes Impact to RightsControl that modifies risk
Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
Examples Using risk controls to express how tech/org measures address the risk (E0071) +
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-consequencesDex Risk-controls
- -
-

Limitation of Rights

+
+

Risk Management

- + - + @@ -13061,15 +14764,10 @@

Limitation of Rights

- - - - + + @@ -13081,35 +14779,29 @@

Limitation of Rights

- + - - - - + - + + + + - + - - - - - - - - + + - +
TermRightsLimitationRiskManagement Prefix risk-owl
LabelLimitation of RightsRisk Management
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RightsLimitation
- https://w3id.org/dpv/risk#RightsLimitation + https://w3id.org/dpv/risk/owl/#RiskManagement
+ https://w3id.org/dpv/risk#RiskManagement
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept
Sub-class of risk-owl:SocietalRisk - → dpv-owl:RiskConcept -
DefinitionSomething that acts as or causes Limitation of RightsSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
Source
Date Created2022-08-182024-06-12
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Core
@@ -13117,25 +14809,25 @@

Limitation of Rights

-
-

Violation of Rights

+
+

Risk Matrix

- + - + @@ -13144,14 +14836,14 @@

Violation of Rights

- @@ -13164,64 +14856,58 @@

Violation of Rights

- + - - - - + - + + + + - + - - - - + - + - +
TermRightsViolationRiskMatrix Prefix risk-owl
LabelViolation of RightsRisk Matrix
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RightsViolation
- https://w3id.org/dpv/risk#RightsViolation + https://w3id.org/dpv/risk/owl/#RiskMatrix
+ https://w3id.org/dpv/risk#RiskMatrix
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskAssessment
Sub-class of risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:RiskAssessment + → risk-owl:RiskManagement
DefinitionSomething that acts as or causes Violation of RightsCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
SourceIEC 31010:2019
Date Created2022-08-182024-02-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Core
- - - - -
-

Risk Analysis

+ +
+

Risk Matrix 3x3

- + - + @@ -13230,12 +14916,14 @@

Risk Analysis

- @@ -13249,23 +14937,20 @@

Risk Analysis

- + - - - - + - + @@ -13274,32 +14959,33 @@

Risk Analysis

- +
TermRiskAnalysisRiskMatrix3x3 Prefix risk-owl
LabelRisk AnalysisRisk Matrix 3x3
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RiskAnalysis
- https://w3id.org/dpv/risk#RiskAnalysis + https://w3id.org/dpv/risk/owl/#RiskMatrix3x3
+ https://w3id.org/dpv/risk#RiskMatrix3x3
Type rdfs:Class , owl:Class + , risk-owl:RiskAnalysis
Sub-class of risk-owl:RiskAssessment + risk-owl:RiskMatrix + → risk-owl:RiskAssessmentrisk-owl:RiskManagement
DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
SourceIEC 31010:2019
Date Created2022-08-182022-08-17
Documented inRisk CoreRisk Risk-matrix
-
-

Risk Assessment

+ +
+

Risk Matrix 5x5

- + - + @@ -13308,12 +14994,15 @@

Risk Assessment

- @@ -13326,54 +15015,55 @@

Risk Assessment

- + - - - - + - + - + + + + - +
TermRiskAssessmentRiskMatrix5x5 Prefix risk-owl
LabelRisk AssessmentRisk Matrix 5x5
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RiskAssessment
- https://w3id.org/dpv/risk#RiskAssessment + https://w3id.org/dpv/risk/owl/#RiskMatrix5x5
+ https://w3id.org/dpv/risk#RiskMatrix5x5
Type rdfs:Class , owl:Class + , risk-owl:RiskAnalysis
Sub-class of risk-owl:RiskManagement + risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
DefinitionAssessment of risk involving its identification, analysis, and evaluationA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
Source
Date Created2024-02-142022-08-17
ContributorsHarshvardhan J. Pandit
Documented inRisk CoreRisk Risk-matrix
-
-

Risk Control

+ +
+

Risk Matrix 7x7

- + - + @@ -13382,23 +15072,19 @@

Risk Control

- - - - - + @@ -13407,14 +15093,10 @@

Risk Control

- + - - - @@ -13424,38 +15106,41 @@

Risk Control

- + - + + + + - +
TermRiskControlRiskMatrix7x7 Prefix risk-owl
LabelRisk ControlRisk Matrix 7x7
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RiskControl
- https://w3id.org/dpv/risk#RiskControl + https://w3id.org/dpv/risk/owl/#RiskMatrix7x7
+ https://w3id.org/dpv/risk#RiskMatrix7x7
Type rdfs:Class , owl:Class + , risk-owl:RiskAnalysis
Sub-class of dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionControl that modifies riskA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
Examples Using risk controls to express how tech/org measures address the risk (E0071) -
Date Created2024-05-192022-08-17
ContributorsHarshvardhan J. Pandit
Documented inDex Risk-controlsRisk Risk-matrix
-
-

Risk Management

+
+

Risk Source

- + - + @@ -13467,10 +15152,17 @@

Risk Management

- + + + - + + + + @@ -13479,25 +15171,25 @@

Risk Management

- + - - - - + - + - + + + + @@ -13509,25 +15201,25 @@

Risk Management

-
-

Risk Matrix

+
+

Low Risk (RM3x3 S:1 L:1)

TermRiskManagementRiskSource Prefix risk-owl
LabelRisk ManagementRisk Source
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RiskManagement
- https://w3id.org/dpv/risk#RiskManagement + https://w3id.org/dpv/risk/owl/#RiskSource
+ https://w3id.org/dpv/risk#RiskSource
Sub-class of dpv-owl:RiskConcept +
in Range of risk-owl:hasRiskSource +
DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
Source
Date Created2024-06-122024-02-14
Date Modified2024-08-16
Documented in
- + - + @@ -13536,13 +15228,15 @@

Risk Matrix

- @@ -13556,23 +15250,20 @@

Risk Matrix

- + - - - - + - + @@ -13581,7 +15272,7 @@

Risk Matrix

- +
TermRiskMatrixRM3x3S1L1 Prefix risk-owl
LabelRisk MatrixLow Risk (RM3x3 S:1 L:1)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RiskMatrix
- https://w3id.org/dpv/risk#RiskMatrix + https://w3id.org/dpv/risk/owl/#RM3x3S1L1
+ https://w3id.org/dpv/risk#RM3x3S1L1
Type rdfs:Class , owl:Class - , risk-owl:RiskAssessment + , risk-owl:RiskAnalysis
Sub-class of risk-owl:RiskAssessment + risk-owl:RiskMatrix3x3 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessmentrisk-owl:RiskManagement
DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
SourceIEC 31010:2019
Date Created2024-02-142022-08-17
Documented inRisk CoreRisk Risk-matrix
@@ -13589,25 +15280,25 @@

Risk Matrix

-
-

Risk Matrix 3x3

+
+

Low Risk (RM3x3 S:1 L:2)

- + - + @@ -13622,7 +15313,8 @@

Risk Matrix 3x3

- @@ -13637,7 +15329,7 @@

Risk Matrix 3x3

- + @@ -13667,25 +15359,25 @@

Risk Matrix 3x3

-
-

Risk Matrix 5x5

+
+

Moderate Risk (RM3x3 S:1 L:3)

TermRiskMatrix3x3RM3x3S1L2 Prefix risk-owl
LabelRisk Matrix 3x3Low Risk (RM3x3 S:1 L:2)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RiskMatrix3x3
- https://w3id.org/dpv/risk#RiskMatrix3x3 + https://w3id.org/dpv/risk/owl/#RM3x3S1L2
+ https://w3id.org/dpv/risk#RM3x3S1L2
Sub-class of risk-owl:RiskMatrix + risk-owl:RiskMatrix3x3 + → risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement
DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
- + - + @@ -13700,7 +15392,8 @@

Risk Matrix 5x5

- @@ -13715,7 +15408,7 @@

Risk Matrix 5x5

- + @@ -13745,25 +15438,25 @@

Risk Matrix 5x5

-
-

Risk Matrix 7x7

+
+

Low Risk (RM3x3 S:2 L:1)

TermRiskMatrix5x5RM3x3S1L3 Prefix risk-owl
LabelRisk Matrix 5x5Moderate Risk (RM3x3 S:1 L:3)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RiskMatrix5x5
- https://w3id.org/dpv/risk#RiskMatrix5x5 + https://w3id.org/dpv/risk/owl/#RM3x3S1L3
+ https://w3id.org/dpv/risk#RM3x3S1L3
Sub-class of risk-owl:RiskMatrix + risk-owl:RiskMatrix3x3 + → risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement
DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
- + - + @@ -13778,7 +15471,8 @@

Risk Matrix 7x7

- @@ -13793,7 +15487,7 @@

Risk Matrix 7x7

- + @@ -13822,25 +15516,26 @@

Risk Matrix 7x7

-
-

Risk Source

+ +
+

Moderate Risk (RM3x3 S:2 L:2)

TermRiskMatrix7x7RM3x3S2L1 Prefix risk-owl
LabelRisk Matrix 7x7Low Risk (RM3x3 S:2 L:1)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RiskMatrix7x7
- https://w3id.org/dpv/risk#RiskMatrix7x7 + https://w3id.org/dpv/risk/owl/#RM3x3S2L1
+ https://w3id.org/dpv/risk#RM3x3S2L1
Sub-class of risk-owl:RiskMatrix + risk-owl:RiskMatrix3x3 + → risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement
DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
- + - + @@ -13849,20 +15544,20 @@

Risk Source

- - - - - + @@ -13871,7 +15566,7 @@

Risk Source

- + @@ -13884,16 +15579,16 @@

Risk Source

- + + - - + + - - +
TermRiskSourceRM3x3S2L2 Prefix risk-owl
LabelRisk SourceModerate Risk (RM3x3 S:2 L:2)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RiskSource
- https://w3id.org/dpv/risk#RiskSource + https://w3id.org/dpv/risk/owl/#RM3x3S2L2
+ https://w3id.org/dpv/risk#RM3x3S2L2
Type rdfs:Class , owl:Class + , risk-owl:RiskAnalysis
Sub-class of dpv-owl:RiskConcept + risk-owl:RiskMatrix3x3 + → risk-owl:RiskMatrix + → risk-owl:RiskAssessment + → risk-owl:RiskManagement
in Range of risk-owl:hasRiskSource -
DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
Date Created2024-02-142022-08-17
Date Modified2024-08-16ContributorsHarshvardhan J. Pandit
Documented inRisk CoreRisk Risk-matrix
@@ -13901,25 +15596,25 @@

Risk Source

-
-

Low Risk (RM3x3 S:1 L:1)

+
+

High Risk (RM3x3 S:2 L:3)

- + - + @@ -13950,7 +15645,7 @@

Low Risk (RM3x3 S:1 L:1)

- + @@ -13980,25 +15675,25 @@

Low Risk (RM3x3 S:1 L:1)

-
-

Low Risk (RM3x3 S:1 L:2)

+
+

Moderate Risk (RM3x3 S:3 L:1)

TermRM3x3S1L1RM3x3S2L3 Prefix risk-owl
LabelLow Risk (RM3x3 S:1 L:1)High Risk (RM3x3 S:2 L:3)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM3x3S1L1
- https://w3id.org/dpv/risk#RM3x3S1L1 + https://w3id.org/dpv/risk/owl/#RM3x3S2L3
+ https://w3id.org/dpv/risk#RM3x3S2L3
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
- + - + @@ -14029,7 +15724,7 @@

Low Risk (RM3x3 S:1 L:2)

- + @@ -14059,25 +15754,25 @@

Low Risk (RM3x3 S:1 L:2)

-
-

Moderate Risk (RM3x3 S:1 L:3)

+
+

High Risk (RM3x3 S:3 L:2)

TermRM3x3S1L2RM3x3S3L1 Prefix risk-owl
LabelLow Risk (RM3x3 S:1 L:2)Moderate Risk (RM3x3 S:3 L:1)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM3x3S1L2
- https://w3id.org/dpv/risk#RM3x3S1L2 + https://w3id.org/dpv/risk/owl/#RM3x3S3L1
+ https://w3id.org/dpv/risk#RM3x3S3L1
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
- + - + @@ -14108,7 +15803,7 @@

Moderate Risk (RM3x3 S:1 L:3)

- + @@ -14138,25 +15833,25 @@

Moderate Risk (RM3x3 S:1 L:3)

-
-

Low Risk (RM3x3 S:2 L:1)

+
+

High Risk (RM3x3 S:3 L:3)

TermRM3x3S1L3RM3x3S3L2 Prefix risk-owl
LabelModerate Risk (RM3x3 S:1 L:3)High Risk (RM3x3 S:3 L:2)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM3x3S1L3
- https://w3id.org/dpv/risk#RM3x3S1L3 + https://w3id.org/dpv/risk/owl/#RM3x3S3L2
+ https://w3id.org/dpv/risk#RM3x3S3L2
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
- + - + @@ -14187,7 +15882,7 @@

Low Risk (RM3x3 S:2 L:1)

- + @@ -14217,25 +15912,25 @@

Low Risk (RM3x3 S:2 L:1)

-
-

Moderate Risk (RM3x3 S:2 L:2)

+
+

Very Low Risk (RM5x5 S:1 L:1)

TermRM3x3S2L1RM3x3S3L3 Prefix risk-owl
LabelLow Risk (RM3x3 S:2 L:1)High Risk (RM3x3 S:3 L:3)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM3x3S2L1
- https://w3id.org/dpv/risk#RM3x3S2L1 + https://w3id.org/dpv/risk/owl/#RM3x3S3L3
+ https://w3id.org/dpv/risk#RM3x3S3L3
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
- + - + @@ -14250,7 +15945,7 @@

Moderate Risk (RM3x3 S:2 L:2)

- - + @@ -14296,25 +15991,25 @@

Moderate Risk (RM3x3 S:2 L:2)

-
-

High Risk (RM3x3 S:2 L:3)

+
+

Very Low Risk (RM5x5 S:1 L:2)

TermRM3x3S2L2RM5x5S1L1 Prefix risk-owl
LabelModerate Risk (RM3x3 S:2 L:2)Very Low Risk (RM5x5 S:1 L:1)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM3x3S2L2
- https://w3id.org/dpv/risk#RM3x3S2L2 + https://w3id.org/dpv/risk/owl/#RM5x5S1L1
+ https://w3id.org/dpv/risk#RM5x5S1L1
Sub-class of risk-owl:RiskMatrix3x3 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -14266,7 +15961,7 @@

Moderate Risk (RM3x3 S:2 L:2)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
- + - + @@ -14329,7 +16024,7 @@

High Risk (RM3x3 S:2 L:3)

- - + @@ -14375,25 +16070,25 @@

High Risk (RM3x3 S:2 L:3)

-
-

Moderate Risk (RM3x3 S:3 L:1)

+
+

Very Low Risk (RM5x5 S:1 L:3)

TermRM3x3S2L3RM5x5S1L2 Prefix risk-owl
LabelHigh Risk (RM3x3 S:2 L:3)Very Low Risk (RM5x5 S:1 L:2)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM3x3S2L3
- https://w3id.org/dpv/risk#RM3x3S2L3 + https://w3id.org/dpv/risk/owl/#RM5x5S1L2
+ https://w3id.org/dpv/risk#RM5x5S1L2
Sub-class of risk-owl:RiskMatrix3x3 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -14345,7 +16040,7 @@

High Risk (RM3x3 S:2 L:3)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
- + - + @@ -14408,7 +16103,7 @@

Moderate Risk (RM3x3 S:3 L:1)

- - + @@ -14454,25 +16149,25 @@

Moderate Risk (RM3x3 S:3 L:1)

-
-

High Risk (RM3x3 S:3 L:2)

+
+

Low Risk (RM5x5 S:1 L:4)

TermRM3x3S3L1RM5x5S1L3 Prefix risk-owl
LabelModerate Risk (RM3x3 S:3 L:1)Very Low Risk (RM5x5 S:1 L:3)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM3x3S3L1
- https://w3id.org/dpv/risk#RM3x3S3L1 + https://w3id.org/dpv/risk/owl/#RM5x5S1L3
+ https://w3id.org/dpv/risk#RM5x5S1L3
Sub-class of risk-owl:RiskMatrix3x3 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -14424,7 +16119,7 @@

Moderate Risk (RM3x3 S:3 L:1)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
- + - + @@ -14487,7 +16182,7 @@

High Risk (RM3x3 S:3 L:2)

- - + @@ -14533,25 +16228,25 @@

High Risk (RM3x3 S:3 L:2)

-
-

High Risk (RM3x3 S:3 L:3)

+
+

Low Risk (RM5x5 S:1 L:5)

TermRM3x3S3L2RM5x5S1L4 Prefix risk-owl
LabelHigh Risk (RM3x3 S:3 L:2)Low Risk (RM5x5 S:1 L:4)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM3x3S3L2
- https://w3id.org/dpv/risk#RM3x3S3L2 + https://w3id.org/dpv/risk/owl/#RM5x5S1L4
+ https://w3id.org/dpv/risk#RM5x5S1L4
Sub-class of risk-owl:RiskMatrix3x3 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -14503,7 +16198,7 @@

High Risk (RM3x3 S:3 L:2)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
- + - + @@ -14566,7 +16261,7 @@

High Risk (RM3x3 S:3 L:3)

- - + @@ -14612,25 +16307,25 @@

High Risk (RM3x3 S:3 L:3)

-
-

Very Low Risk (RM5x5 S:1 L:1)

+
+

Very Low Risk (RM5x5 S:2 L:1)

TermRM3x3S3L3RM5x5S1L5 Prefix risk-owl
LabelHigh Risk (RM3x3 S:3 L:3)Low Risk (RM5x5 S:1 L:5)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM3x3S3L3
- https://w3id.org/dpv/risk#RM3x3S3L3 + https://w3id.org/dpv/risk/owl/#RM5x5S1L5
+ https://w3id.org/dpv/risk#RM5x5S1L5
Sub-class of risk-owl:RiskMatrix3x3 + risk-owl:RiskMatrix5x5risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -14582,7 +16277,7 @@

High Risk (RM3x3 S:3 L:3)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
- + - + @@ -14661,7 +16356,7 @@

Very Low Risk (RM5x5 S:1 L:1)

- + @@ -14691,25 +16386,25 @@

Very Low Risk (RM5x5 S:1 L:1)

-
-

Very Low Risk (RM5x5 S:1 L:2)

+
+

Low Risk (RM5x5 S:2 L:2)

TermRM5x5S1L1RM5x5S2L1 Prefix risk-owl
LabelVery Low Risk (RM5x5 S:1 L:1)Very Low Risk (RM5x5 S:2 L:1)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S1L1
- https://w3id.org/dpv/risk#RM5x5S1L1 + https://w3id.org/dpv/risk/owl/#RM5x5S2L1
+ https://w3id.org/dpv/risk#RM5x5S2L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
- + - + @@ -14740,7 +16435,7 @@

Very Low Risk (RM5x5 S:1 L:2)

- + @@ -14770,25 +16465,25 @@

Very Low Risk (RM5x5 S:1 L:2)

-
-

Very Low Risk (RM5x5 S:1 L:3)

+
+

Moderate Risk (RM5x5 S:2 L:3)

TermRM5x5S1L2RM5x5S2L2 Prefix risk-owl
LabelVery Low Risk (RM5x5 S:1 L:2)Low Risk (RM5x5 S:2 L:2)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S1L2
- https://w3id.org/dpv/risk#RM5x5S1L2 + https://w3id.org/dpv/risk/owl/#RM5x5S2L2
+ https://w3id.org/dpv/risk#RM5x5S2L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
- + - + @@ -14819,7 +16514,7 @@

Very Low Risk (RM5x5 S:1 L:3)

- + @@ -14848,26 +16543,26 @@

Very Low Risk (RM5x5 S:1 L:3)

- -
-

Low Risk (RM5x5 S:1 L:4)

+ +
+

Moderate Risk (RM5x5 S:2 L:4)

TermRM5x5S1L3RM5x5S2L3 Prefix risk-owl
LabelVery Low Risk (RM5x5 S:1 L:3)Moderate Risk (RM5x5 S:2 L:3)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S1L3
- https://w3id.org/dpv/risk#RM5x5S1L3 + https://w3id.org/dpv/risk/owl/#RM5x5S2L3
+ https://w3id.org/dpv/risk#RM5x5S2L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
- + - + @@ -14898,7 +16593,7 @@

Low Risk (RM5x5 S:1 L:4)

- + @@ -14928,25 +16623,25 @@

Low Risk (RM5x5 S:1 L:4)

-
-

Low Risk (RM5x5 S:1 L:5)

+
+

High Risk (RM5x5 S:2 L:5)

TermRM5x5S1L4RM5x5S2L4 Prefix risk-owl
LabelLow Risk (RM5x5 S:1 L:4)Moderate Risk (RM5x5 S:2 L:4)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S1L4
- https://w3id.org/dpv/risk#RM5x5S1L4 + https://w3id.org/dpv/risk/owl/#RM5x5S2L4
+ https://w3id.org/dpv/risk#RM5x5S2L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
- + - + @@ -14977,7 +16672,7 @@

Low Risk (RM5x5 S:1 L:5)

- + @@ -15007,25 +16702,25 @@

Low Risk (RM5x5 S:1 L:5)

-
-

Very Low Risk (RM5x5 S:2 L:1)

+
+

Very Low Risk (RM5x5 S:3 L:1)

TermRM5x5S1L5RM5x5S2L5 Prefix risk-owl
LabelLow Risk (RM5x5 S:1 L:5)High Risk (RM5x5 S:2 L:5)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S1L5
- https://w3id.org/dpv/risk#RM5x5S1L5 + https://w3id.org/dpv/risk/owl/#RM5x5S2L5
+ https://w3id.org/dpv/risk#RM5x5S2L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
- + - + @@ -15056,7 +16751,7 @@

Very Low Risk (RM5x5 S:2 L:1)

- + @@ -15086,25 +16781,25 @@

Very Low Risk (RM5x5 S:2 L:1)

-
-

Low Risk (RM5x5 S:2 L:2)

+
+

Moderate Risk (RM5x5 S:3 L:2)

TermRM5x5S2L1RM5x5S3L1 Prefix risk-owl
LabelVery Low Risk (RM5x5 S:2 L:1)Very Low Risk (RM5x5 S:3 L:1)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S2L1
- https://w3id.org/dpv/risk#RM5x5S2L1 + https://w3id.org/dpv/risk/owl/#RM5x5S3L1
+ https://w3id.org/dpv/risk#RM5x5S3L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
- + - + @@ -15135,7 +16830,7 @@

Low Risk (RM5x5 S:2 L:2)

- + @@ -15165,25 +16860,25 @@

Low Risk (RM5x5 S:2 L:2)

-
-

Moderate Risk (RM5x5 S:2 L:3)

+
+

Moderate Risk (RM5x5 S:3 L:3)

TermRM5x5S2L2RM5x5S3L2 Prefix risk-owl
LabelLow Risk (RM5x5 S:2 L:2)Moderate Risk (RM5x5 S:3 L:2)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S2L2
- https://w3id.org/dpv/risk#RM5x5S2L2 + https://w3id.org/dpv/risk/owl/#RM5x5S3L2
+ https://w3id.org/dpv/risk#RM5x5S3L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
- + - + @@ -15214,7 +16909,7 @@

Moderate Risk (RM5x5 S:2 L:3)

- + @@ -15244,25 +16939,25 @@

Moderate Risk (RM5x5 S:2 L:3)

-
-

Moderate Risk (RM5x5 S:2 L:4)

+
+

High Risk (RM5x5 S:3 L:4)

TermRM5x5S2L3RM5x5S3L3 Prefix risk-owl
LabelModerate Risk (RM5x5 S:2 L:3)Moderate Risk (RM5x5 S:3 L:3)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S2L3
- https://w3id.org/dpv/risk#RM5x5S2L3 + https://w3id.org/dpv/risk/owl/#RM5x5S3L3
+ https://w3id.org/dpv/risk#RM5x5S3L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
- + - + @@ -15293,7 +16988,7 @@

Moderate Risk (RM5x5 S:2 L:4)

- + @@ -15323,25 +17018,25 @@

Moderate Risk (RM5x5 S:2 L:4)

-
-

High Risk (RM5x5 S:2 L:5)

+
+

Very High Risk (RM5x5 S:3 L:5)

TermRM5x5S2L4RM5x5S3L4 Prefix risk-owl
LabelModerate Risk (RM5x5 S:2 L:4)High Risk (RM5x5 S:3 L:4)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S2L4
- https://w3id.org/dpv/risk#RM5x5S2L4 + https://w3id.org/dpv/risk/owl/#RM5x5S3L4
+ https://w3id.org/dpv/risk#RM5x5S3L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
- + - + @@ -15372,7 +17067,7 @@

High Risk (RM5x5 S:2 L:5)

- + @@ -15402,25 +17097,25 @@

High Risk (RM5x5 S:2 L:5)

-
-

Very Low Risk (RM5x5 S:3 L:1)

+
+

Low Risk (RM5x5 S:4 L:1)

TermRM5x5S2L5RM5x5S3L5 Prefix risk-owl
LabelHigh Risk (RM5x5 S:2 L:5)Very High Risk (RM5x5 S:3 L:5)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S2L5
- https://w3id.org/dpv/risk#RM5x5S2L5 + https://w3id.org/dpv/risk/owl/#RM5x5S3L5
+ https://w3id.org/dpv/risk#RM5x5S3L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
- + - + @@ -15451,7 +17146,7 @@

Very Low Risk (RM5x5 S:3 L:1)

- + @@ -15481,25 +17176,25 @@

Very Low Risk (RM5x5 S:3 L:1)

-
-

Moderate Risk (RM5x5 S:3 L:2)

+
+

Moderate Risk (RM5x5 S:4 L:2)

TermRM5x5S3L1RM5x5S4L1 Prefix risk-owl
LabelVery Low Risk (RM5x5 S:3 L:1)Low Risk (RM5x5 S:4 L:1)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S3L1
- https://w3id.org/dpv/risk#RM5x5S3L1 + https://w3id.org/dpv/risk/owl/#RM5x5S4L1
+ https://w3id.org/dpv/risk#RM5x5S4L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
- + - + @@ -15530,7 +17225,7 @@

Moderate Risk (RM5x5 S:3 L:2)

- + @@ -15560,25 +17255,25 @@

Moderate Risk (RM5x5 S:3 L:2)

-
-

Moderate Risk (RM5x5 S:3 L:3)

+
+

High Risk (RM5x5 S:4 L:3)

TermRM5x5S3L2RM5x5S4L2 Prefix risk-owl
LabelModerate Risk (RM5x5 S:3 L:2)Moderate Risk (RM5x5 S:4 L:2)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S3L2
- https://w3id.org/dpv/risk#RM5x5S3L2 + https://w3id.org/dpv/risk/owl/#RM5x5S4L2
+ https://w3id.org/dpv/risk#RM5x5S4L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
- + - + @@ -15609,7 +17304,7 @@

Moderate Risk (RM5x5 S:3 L:3)

- + @@ -15639,25 +17334,25 @@

Moderate Risk (RM5x5 S:3 L:3)

-
-

High Risk (RM5x5 S:3 L:4)

+
+

Very High Risk (RM5x5 S:4 L:4)

TermRM5x5S3L3RM5x5S4L3 Prefix risk-owl
LabelModerate Risk (RM5x5 S:3 L:3)High Risk (RM5x5 S:4 L:3)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S3L3
- https://w3id.org/dpv/risk#RM5x5S3L3 + https://w3id.org/dpv/risk/owl/#RM5x5S4L3
+ https://w3id.org/dpv/risk#RM5x5S4L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
- + - + @@ -15688,7 +17383,7 @@

High Risk (RM5x5 S:3 L:4)

- + @@ -15718,25 +17413,25 @@

High Risk (RM5x5 S:3 L:4)

-
-

Very High Risk (RM5x5 S:3 L:5)

+
+

Very High Risk (RM5x5 S:4 L:5)

TermRM5x5S3L4RM5x5S4L4 Prefix risk-owl
LabelHigh Risk (RM5x5 S:3 L:4)Very High Risk (RM5x5 S:4 L:4)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S3L4
- https://w3id.org/dpv/risk#RM5x5S3L4 + https://w3id.org/dpv/risk/owl/#RM5x5S4L4
+ https://w3id.org/dpv/risk#RM5x5S4L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
- + - + @@ -15767,7 +17462,7 @@

Very High Risk (RM5x5 S:3 L:5)

- + @@ -15797,25 +17492,25 @@

Very High Risk (RM5x5 S:3 L:5)

-
-

Low Risk (RM5x5 S:4 L:1)

+
+

Low Risk (RM5x5 S:5 L:1)

TermRM5x5S3L5RM5x5S4L5 Prefix risk-owl
LabelVery High Risk (RM5x5 S:3 L:5)Very High Risk (RM5x5 S:4 L:5)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S3L5
- https://w3id.org/dpv/risk#RM5x5S3L5 + https://w3id.org/dpv/risk/owl/#RM5x5S4L5
+ https://w3id.org/dpv/risk#RM5x5S4L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
- + - + @@ -15846,7 +17541,7 @@

Low Risk (RM5x5 S:4 L:1)

- + @@ -15876,25 +17571,25 @@

Low Risk (RM5x5 S:4 L:1)

-
-

Moderate Risk (RM5x5 S:4 L:2)

+
+

High Risk (RM5x5 S:5 L:2)

TermRM5x5S4L1RM5x5S5L1 Prefix risk-owl
LabelLow Risk (RM5x5 S:4 L:1)Low Risk (RM5x5 S:5 L:1)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S4L1
- https://w3id.org/dpv/risk#RM5x5S4L1 + https://w3id.org/dpv/risk/owl/#RM5x5S5L1
+ https://w3id.org/dpv/risk#RM5x5S5L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
- + - + @@ -15925,7 +17620,7 @@

Moderate Risk (RM5x5 S:4 L:2)

- + @@ -15955,25 +17650,25 @@

Moderate Risk (RM5x5 S:4 L:2)

-
-

High Risk (RM5x5 S:4 L:3)

+
+

High Risk (RM5x5 S:5 L:3)

TermRM5x5S4L2RM5x5S5L2 Prefix risk-owl
LabelModerate Risk (RM5x5 S:4 L:2)High Risk (RM5x5 S:5 L:2)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S4L2
- https://w3id.org/dpv/risk#RM5x5S4L2 + https://w3id.org/dpv/risk/owl/#RM5x5S5L2
+ https://w3id.org/dpv/risk#RM5x5S5L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
- + - + @@ -16004,7 +17699,7 @@

High Risk (RM5x5 S:4 L:3)

- + @@ -16034,25 +17729,25 @@

High Risk (RM5x5 S:4 L:3)

-
-

Very High Risk (RM5x5 S:4 L:4)

+
+

Very High Risk (RM5x5 S:5 L:4)

TermRM5x5S4L3RM5x5S5L3 Prefix risk-owl
LabelHigh Risk (RM5x5 S:4 L:3)High Risk (RM5x5 S:5 L:3)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S4L3
- https://w3id.org/dpv/risk#RM5x5S4L3 + https://w3id.org/dpv/risk/owl/#RM5x5S5L3
+ https://w3id.org/dpv/risk#RM5x5S5L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
- + - + @@ -16083,7 +17778,7 @@

Very High Risk (RM5x5 S:4 L:4)

- + @@ -16113,25 +17808,25 @@

Very High Risk (RM5x5 S:4 L:4)

-
-

Very High Risk (RM5x5 S:4 L:5)

+
+

Very High Risk (RM5x5 S:5 L:5)

TermRM5x5S4L4RM5x5S5L4 Prefix risk-owl
LabelVery High Risk (RM5x5 S:4 L:4)Very High Risk (RM5x5 S:5 L:4)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S4L4
- https://w3id.org/dpv/risk#RM5x5S4L4 + https://w3id.org/dpv/risk/owl/#RM5x5S5L4
+ https://w3id.org/dpv/risk#RM5x5S5L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
- + - + @@ -16162,7 +17857,7 @@

Very High Risk (RM5x5 S:4 L:5)

- + @@ -16192,25 +17887,25 @@

Very High Risk (RM5x5 S:4 L:5)

-
-

Low Risk (RM5x5 S:5 L:1)

+
+

Extremely Low Risk (RM7x7 S:1 L:1)

TermRM5x5S4L5RM5x5S5L5 Prefix risk-owl
LabelVery High Risk (RM5x5 S:4 L:5)Very High Risk (RM5x5 S:5 L:5)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S4L5
- https://w3id.org/dpv/risk#RM5x5S4L5 + https://w3id.org/dpv/risk/owl/#RM5x5S5L5
+ https://w3id.org/dpv/risk#RM5x5S5L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
- + - + @@ -16225,7 +17920,7 @@

Low Risk (RM5x5 S:5 L:1)

- - + @@ -16271,25 +17966,25 @@

Low Risk (RM5x5 S:5 L:1)

-
-

High Risk (RM5x5 S:5 L:2)

+
+

Extremely Low Risk (RM7x7 S:1 L:2)

TermRM5x5S5L1RM7x7S1L1 Prefix risk-owl
LabelLow Risk (RM5x5 S:5 L:1)Extremely Low Risk (RM7x7 S:1 L:1)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S5L1
- https://w3id.org/dpv/risk#RM5x5S5L1 + https://w3id.org/dpv/risk/owl/#RM7x7S1L1
+ https://w3id.org/dpv/risk#RM7x7S1L1
Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix7x7risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -16241,7 +17936,7 @@

Low Risk (RM5x5 S:5 L:1)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + @@ -16304,7 +17999,7 @@

High Risk (RM5x5 S:5 L:2)

- - + @@ -16350,25 +18045,25 @@

High Risk (RM5x5 S:5 L:2)

-
-

High Risk (RM5x5 S:5 L:3)

+
+

Extremely Low Risk (RM7x7 S:1 L:3)

TermRM5x5S5L2RM7x7S1L2 Prefix risk-owl
LabelHigh Risk (RM5x5 S:5 L:2)Extremely Low Risk (RM7x7 S:1 L:2)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S5L2
- https://w3id.org/dpv/risk#RM5x5S5L2 + https://w3id.org/dpv/risk/owl/#RM7x7S1L2
+ https://w3id.org/dpv/risk#RM7x7S1L2
Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix7x7risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -16320,7 +18015,7 @@

High Risk (RM5x5 S:5 L:2)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
- + - + @@ -16383,7 +18078,7 @@

High Risk (RM5x5 S:5 L:3)

- - + @@ -16429,25 +18124,25 @@

High Risk (RM5x5 S:5 L:3)

-
-

Very High Risk (RM5x5 S:5 L:4)

+
+

Very Low Risk (RM7x7 S:1 L:4)

TermRM5x5S5L3RM7x7S1L3 Prefix risk-owl
LabelHigh Risk (RM5x5 S:5 L:3)Extremely Low Risk (RM7x7 S:1 L:3)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S5L3
- https://w3id.org/dpv/risk#RM5x5S5L3 + https://w3id.org/dpv/risk/owl/#RM7x7S1L3
+ https://w3id.org/dpv/risk#RM7x7S1L3
Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix7x7risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -16399,7 +18094,7 @@

High Risk (RM5x5 S:5 L:3)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
- + - + @@ -16462,7 +18157,7 @@

Very High Risk (RM5x5 S:5 L:4)

- - + @@ -16508,25 +18203,25 @@

Very High Risk (RM5x5 S:5 L:4)

-
-

Very High Risk (RM5x5 S:5 L:5)

+
+

Very Low Risk (RM7x7 S:1 L:5)

TermRM5x5S5L4RM7x7S1L4 Prefix risk-owl
LabelVery High Risk (RM5x5 S:5 L:4)Very Low Risk (RM7x7 S:1 L:4)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S5L4
- https://w3id.org/dpv/risk#RM5x5S5L4 + https://w3id.org/dpv/risk/owl/#RM7x7S1L4
+ https://w3id.org/dpv/risk#RM7x7S1L4
Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix7x7risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -16478,7 +18173,7 @@

Very High Risk (RM5x5 S:5 L:4)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
- + - + @@ -16541,7 +18236,7 @@

Very High Risk (RM5x5 S:5 L:5)

- - + @@ -16587,25 +18282,25 @@

Very High Risk (RM5x5 S:5 L:5)

-
-

Extremely Low Risk (RM7x7 S:1 L:1)

+
+

Very Low Risk (RM7x7 S:1 L:6)

TermRM5x5S5L5RM7x7S1L5 Prefix risk-owl
LabelVery High Risk (RM5x5 S:5 L:5)Very Low Risk (RM7x7 S:1 L:5)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM5x5S5L5
- https://w3id.org/dpv/risk#RM5x5S5L5 + https://w3id.org/dpv/risk/owl/#RM7x7S1L5
+ https://w3id.org/dpv/risk#RM7x7S1L5
Sub-class of risk-owl:RiskMatrix5x5 + risk-owl:RiskMatrix7x7risk-owl:RiskMatrixrisk-owl:RiskAssessmentrisk-owl:RiskManagement @@ -16557,7 +18252,7 @@

Very High Risk (RM5x5 S:5 L:5)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
- + - + @@ -16636,7 +18331,7 @@

Extremely Low Risk (RM7x7 S:1 L:1)

- + @@ -16666,25 +18361,25 @@

Extremely Low Risk (RM7x7 S:1 L:1)

-
-

Extremely Low Risk (RM7x7 S:1 L:2)

+
+

Low Risk (RM7x7 S:1 L:7)

TermRM7x7S1L1RM7x7S1L6 Prefix risk-owl
LabelExtremely Low Risk (RM7x7 S:1 L:1)Very Low Risk (RM7x7 S:1 L:6)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S1L1
- https://w3id.org/dpv/risk#RM7x7S1L1 + https://w3id.org/dpv/risk/owl/#RM7x7S1L6
+ https://w3id.org/dpv/risk#RM7x7S1L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
- + - + @@ -16715,7 +18410,7 @@

Extremely Low Risk (RM7x7 S:1 L:2)

- + @@ -16745,25 +18440,25 @@

Extremely Low Risk (RM7x7 S:1 L:2)

-
-

Extremely Low Risk (RM7x7 S:1 L:3)

+
+

Extremely Low Risk (RM7x7 S:2 L:1)

TermRM7x7S1L2RM7x7S1L7 Prefix risk-owl
LabelExtremely Low Risk (RM7x7 S:1 L:2)Low Risk (RM7x7 S:1 L:7)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S1L2
- https://w3id.org/dpv/risk#RM7x7S1L2 + https://w3id.org/dpv/risk/owl/#RM7x7S1L7
+ https://w3id.org/dpv/risk#RM7x7S1L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
- + - + @@ -16794,7 +18489,7 @@

Extremely Low Risk (RM7x7 S:1 L:3)

- + @@ -16824,25 +18519,25 @@

Extremely Low Risk (RM7x7 S:1 L:3)

-
-

Very Low Risk (RM7x7 S:1 L:4)

+
+

Extremely Low Risk (RM7x7 S:2 L:2)

TermRM7x7S1L3RM7x7S2L1 Prefix risk-owl
LabelExtremely Low Risk (RM7x7 S:1 L:3)Extremely Low Risk (RM7x7 S:2 L:1)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S1L3
- https://w3id.org/dpv/risk#RM7x7S1L3 + https://w3id.org/dpv/risk/owl/#RM7x7S2L1
+ https://w3id.org/dpv/risk#RM7x7S2L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + @@ -16873,7 +18568,7 @@

Very Low Risk (RM7x7 S:1 L:4)

- + @@ -16903,25 +18598,25 @@

Very Low Risk (RM7x7 S:1 L:4)

-
-

Very Low Risk (RM7x7 S:1 L:5)

+
+

Very Low Risk (RM7x7 S:2 L:3)

TermRM7x7S1L4RM7x7S2L2 Prefix risk-owl
LabelVery Low Risk (RM7x7 S:1 L:4)Extremely Low Risk (RM7x7 S:2 L:2)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S1L4
- https://w3id.org/dpv/risk#RM7x7S1L4 + https://w3id.org/dpv/risk/owl/#RM7x7S2L2
+ https://w3id.org/dpv/risk#RM7x7S2L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
- + - + @@ -16952,7 +18647,7 @@

Very Low Risk (RM7x7 S:1 L:5)

- + @@ -16982,25 +18677,25 @@

Very Low Risk (RM7x7 S:1 L:5)

-
-

Very Low Risk (RM7x7 S:1 L:6)

+
+

Low Risk (RM7x7 S:2 L:4)

TermRM7x7S1L5RM7x7S2L3 Prefix risk-owl
LabelVery Low Risk (RM7x7 S:1 L:5)Very Low Risk (RM7x7 S:2 L:3)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S1L5
- https://w3id.org/dpv/risk#RM7x7S1L5 + https://w3id.org/dpv/risk/owl/#RM7x7S2L3
+ https://w3id.org/dpv/risk#RM7x7S2L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
- + - + @@ -17031,7 +18726,7 @@

Very Low Risk (RM7x7 S:1 L:6)

- + @@ -17061,25 +18756,25 @@

Very Low Risk (RM7x7 S:1 L:6)

-
-

Low Risk (RM7x7 S:1 L:7)

+
+

Low Risk (RM7x7 S:2 L:5)

TermRM7x7S1L6RM7x7S2L4 Prefix risk-owl
LabelVery Low Risk (RM7x7 S:1 L:6)Low Risk (RM7x7 S:2 L:4)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S1L6
- https://w3id.org/dpv/risk#RM7x7S1L6 + https://w3id.org/dpv/risk/owl/#RM7x7S2L4
+ https://w3id.org/dpv/risk#RM7x7S2L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
- + - + @@ -17110,7 +18805,7 @@

Low Risk (RM7x7 S:1 L:7)

- + @@ -17140,25 +18835,25 @@

Low Risk (RM7x7 S:1 L:7)

-
-

Extremely Low Risk (RM7x7 S:2 L:1)

+
+

Moderate Risk (RM7x7 S:2 L:6)

TermRM7x7S1L7RM7x7S2L5 Prefix risk-owl
LabelLow Risk (RM7x7 S:1 L:7)Low Risk (RM7x7 S:2 L:5)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S1L7
- https://w3id.org/dpv/risk#RM7x7S1L7 + https://w3id.org/dpv/risk/owl/#RM7x7S2L5
+ https://w3id.org/dpv/risk#RM7x7S2L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
- + - + @@ -17189,7 +18884,7 @@

Extremely Low Risk (RM7x7 S:2 L:1)

- + @@ -17219,25 +18914,25 @@

Extremely Low Risk (RM7x7 S:2 L:1)

-
-

Extremely Low Risk (RM7x7 S:2 L:2)

+
+

Moderate Risk (RM7x7 S:2 L:7)

TermRM7x7S2L1RM7x7S2L6 Prefix risk-owl
LabelExtremely Low Risk (RM7x7 S:2 L:1)Moderate Risk (RM7x7 S:2 L:6)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S2L1
- https://w3id.org/dpv/risk#RM7x7S2L1 + https://w3id.org/dpv/risk/owl/#RM7x7S2L6
+ https://w3id.org/dpv/risk#RM7x7S2L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
- + - + @@ -17268,7 +18963,7 @@

Extremely Low Risk (RM7x7 S:2 L:2)

- + @@ -17298,25 +18993,25 @@

Extremely Low Risk (RM7x7 S:2 L:2)

-
-

Very Low Risk (RM7x7 S:2 L:3)

+
+

Extremely Low Risk (RM7x7 S:3 L:1)

TermRM7x7S2L2RM7x7S2L7 Prefix risk-owl
LabelExtremely Low Risk (RM7x7 S:2 L:2)Moderate Risk (RM7x7 S:2 L:7)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S2L2
- https://w3id.org/dpv/risk#RM7x7S2L2 + https://w3id.org/dpv/risk/owl/#RM7x7S2L7
+ https://w3id.org/dpv/risk#RM7x7S2L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
- + - + @@ -17347,7 +19042,7 @@

Very Low Risk (RM7x7 S:2 L:3)

- + @@ -17377,25 +19072,25 @@

Very Low Risk (RM7x7 S:2 L:3)

-
-

Low Risk (RM7x7 S:2 L:4)

+
+

Very Low Risk (RM7x7 S:3 L:2)

TermRM7x7S2L3RM7x7S3L1 Prefix risk-owl
LabelVery Low Risk (RM7x7 S:2 L:3)Extremely Low Risk (RM7x7 S:3 L:1)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S2L3
- https://w3id.org/dpv/risk#RM7x7S2L3 + https://w3id.org/dpv/risk/owl/#RM7x7S3L1
+ https://w3id.org/dpv/risk#RM7x7S3L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + @@ -17426,7 +19121,7 @@

Low Risk (RM7x7 S:2 L:4)

- + @@ -17456,25 +19151,25 @@

Low Risk (RM7x7 S:2 L:4)

-
-

Low Risk (RM7x7 S:2 L:5)

+
+

Low Risk (RM7x7 S:3 L:3)

TermRM7x7S2L4RM7x7S3L2 Prefix risk-owl
LabelLow Risk (RM7x7 S:2 L:4)Very Low Risk (RM7x7 S:3 L:2)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S2L4
- https://w3id.org/dpv/risk#RM7x7S2L4 + https://w3id.org/dpv/risk/owl/#RM7x7S3L2
+ https://w3id.org/dpv/risk#RM7x7S3L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
- + - + @@ -17505,7 +19200,7 @@

Low Risk (RM7x7 S:2 L:5)

- + @@ -17535,25 +19230,25 @@

Low Risk (RM7x7 S:2 L:5)

-
-

Moderate Risk (RM7x7 S:2 L:6)

+
+

Moderate Risk (RM7x7 S:3 L:4)

TermRM7x7S2L5RM7x7S3L3 Prefix risk-owl
LabelLow Risk (RM7x7 S:2 L:5)Low Risk (RM7x7 S:3 L:3)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S2L5
- https://w3id.org/dpv/risk#RM7x7S2L5 + https://w3id.org/dpv/risk/owl/#RM7x7S3L3
+ https://w3id.org/dpv/risk#RM7x7S3L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
- + - + @@ -17584,7 +19279,7 @@

Moderate Risk (RM7x7 S:2 L:6)

- + @@ -17614,25 +19309,25 @@

Moderate Risk (RM7x7 S:2 L:6)

-
-

Moderate Risk (RM7x7 S:2 L:7)

+
+

High Risk (RM7x7 S:3 L:5)

TermRM7x7S2L6RM7x7S3L4 Prefix risk-owl
LabelModerate Risk (RM7x7 S:2 L:6)Moderate Risk (RM7x7 S:3 L:4)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S2L6
- https://w3id.org/dpv/risk#RM7x7S2L6 + https://w3id.org/dpv/risk/owl/#RM7x7S3L4
+ https://w3id.org/dpv/risk#RM7x7S3L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
- + - + @@ -17663,7 +19358,7 @@

Moderate Risk (RM7x7 S:2 L:7)

- + @@ -17693,25 +19388,25 @@

Moderate Risk (RM7x7 S:2 L:7)

-
-

Extremely Low Risk (RM7x7 S:3 L:1)

+
+

High Risk (RM7x7 S:3 L:6)

TermRM7x7S2L7RM7x7S3L5 Prefix risk-owl
LabelModerate Risk (RM7x7 S:2 L:7)High Risk (RM7x7 S:3 L:5)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S2L7
- https://w3id.org/dpv/risk#RM7x7S2L7 + https://w3id.org/dpv/risk/owl/#RM7x7S3L5
+ https://w3id.org/dpv/risk#RM7x7S3L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
- + - + @@ -17742,7 +19437,7 @@

Extremely Low Risk (RM7x7 S:3 L:1)

- + @@ -17772,25 +19467,25 @@

Extremely Low Risk (RM7x7 S:3 L:1)

-
-

Very Low Risk (RM7x7 S:3 L:2)

+
+

Very High Risk (RM7x7 S:3 L:7)

TermRM7x7S3L1RM7x7S3L6 Prefix risk-owl
LabelExtremely Low Risk (RM7x7 S:3 L:1)High Risk (RM7x7 S:3 L:6)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S3L1
- https://w3id.org/dpv/risk#RM7x7S3L1 + https://w3id.org/dpv/risk/owl/#RM7x7S3L6
+ https://w3id.org/dpv/risk#RM7x7S3L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
- + - + @@ -17821,7 +19516,7 @@

Very Low Risk (RM7x7 S:3 L:2)

- + @@ -17851,25 +19546,25 @@

Very Low Risk (RM7x7 S:3 L:2)

-
-

Low Risk (RM7x7 S:3 L:3)

+
+

Extremely Low Risk (RM7x7 S:4 L:1)

TermRM7x7S3L2RM7x7S3L7 Prefix risk-owl
LabelVery Low Risk (RM7x7 S:3 L:2)Very High Risk (RM7x7 S:3 L:7)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S3L2
- https://w3id.org/dpv/risk#RM7x7S3L2 + https://w3id.org/dpv/risk/owl/#RM7x7S3L7
+ https://w3id.org/dpv/risk#RM7x7S3L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
- + - + @@ -17900,7 +19595,7 @@

Low Risk (RM7x7 S:3 L:3)

- + @@ -17930,25 +19625,25 @@

Low Risk (RM7x7 S:3 L:3)

-
-

Moderate Risk (RM7x7 S:3 L:4)

+
+

Low Risk (RM7x7 S:4 L:2)

TermRM7x7S3L3RM7x7S4L1 Prefix risk-owl
LabelLow Risk (RM7x7 S:3 L:3)Extremely Low Risk (RM7x7 S:4 L:1)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S3L3
- https://w3id.org/dpv/risk#RM7x7S3L3 + https://w3id.org/dpv/risk/owl/#RM7x7S4L1
+ https://w3id.org/dpv/risk#RM7x7S4L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + @@ -17979,7 +19674,7 @@

Moderate Risk (RM7x7 S:3 L:4)

- + @@ -18009,25 +19704,25 @@

Moderate Risk (RM7x7 S:3 L:4)

-
-

High Risk (RM7x7 S:3 L:5)

+
+

Moderate Risk (RM7x7 S:4 L:3)

TermRM7x7S3L4RM7x7S4L2 Prefix risk-owl
LabelModerate Risk (RM7x7 S:3 L:4)Low Risk (RM7x7 S:4 L:2)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S3L4
- https://w3id.org/dpv/risk#RM7x7S3L4 + https://w3id.org/dpv/risk/owl/#RM7x7S4L2
+ https://w3id.org/dpv/risk#RM7x7S4L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
- + - + @@ -18058,7 +19753,7 @@

High Risk (RM7x7 S:3 L:5)

- + @@ -18088,25 +19783,25 @@

High Risk (RM7x7 S:3 L:5)

-
-

High Risk (RM7x7 S:3 L:6)

+
+

High Risk (RM7x7 S:4 L:4)

TermRM7x7S3L5RM7x7S4L3 Prefix risk-owl
LabelHigh Risk (RM7x7 S:3 L:5)Moderate Risk (RM7x7 S:4 L:3)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S3L5
- https://w3id.org/dpv/risk#RM7x7S3L5 + https://w3id.org/dpv/risk/owl/#RM7x7S4L3
+ https://w3id.org/dpv/risk#RM7x7S4L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
- + - + @@ -18137,7 +19832,7 @@

High Risk (RM7x7 S:3 L:6)

- + @@ -18167,25 +19862,25 @@

High Risk (RM7x7 S:3 L:6)

-
-

Very High Risk (RM7x7 S:3 L:7)

+
+

High Risk (RM7x7 S:4 L:5)

TermRM7x7S3L6RM7x7S4L4 Prefix risk-owl
LabelHigh Risk (RM7x7 S:3 L:6)High Risk (RM7x7 S:4 L:4)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S3L6
- https://w3id.org/dpv/risk#RM7x7S3L6 + https://w3id.org/dpv/risk/owl/#RM7x7S4L4
+ https://w3id.org/dpv/risk#RM7x7S4L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
- + - + @@ -18216,7 +19911,7 @@

Very High Risk (RM7x7 S:3 L:7)

- + @@ -18246,25 +19941,25 @@

Very High Risk (RM7x7 S:3 L:7)

-
-

Extremely Low Risk (RM7x7 S:4 L:1)

+
+

Very High Risk (RM7x7 S:4 L:6)

TermRM7x7S3L7RM7x7S4L5 Prefix risk-owl
LabelVery High Risk (RM7x7 S:3 L:7)High Risk (RM7x7 S:4 L:5)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S3L7
- https://w3id.org/dpv/risk#RM7x7S3L7 + https://w3id.org/dpv/risk/owl/#RM7x7S4L5
+ https://w3id.org/dpv/risk#RM7x7S4L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
- + - + @@ -18295,7 +19990,7 @@

Extremely Low Risk (RM7x7 S:4 L:1)

- + @@ -18325,25 +20020,25 @@

Extremely Low Risk (RM7x7 S:4 L:1)

-
-

Low Risk (RM7x7 S:4 L:2)

+
+

Very High Risk (RM7x7 S:4 L:7)

TermRM7x7S4L1RM7x7S4L6 Prefix risk-owl
LabelExtremely Low Risk (RM7x7 S:4 L:1)Very High Risk (RM7x7 S:4 L:6)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S4L1
- https://w3id.org/dpv/risk#RM7x7S4L1 + https://w3id.org/dpv/risk/owl/#RM7x7S4L6
+ https://w3id.org/dpv/risk#RM7x7S4L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
- + - + @@ -18374,7 +20069,7 @@

Low Risk (RM7x7 S:4 L:2)

- + @@ -18404,25 +20099,25 @@

Low Risk (RM7x7 S:4 L:2)

-
-

Moderate Risk (RM7x7 S:4 L:3)

+
+

Very Low Risk (RM7x7 S:5 L:1)

TermRM7x7S4L2RM7x7S4L7 Prefix risk-owl
LabelLow Risk (RM7x7 S:4 L:2)Very High Risk (RM7x7 S:4 L:7)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S4L2
- https://w3id.org/dpv/risk#RM7x7S4L2 + https://w3id.org/dpv/risk/owl/#RM7x7S4L7
+ https://w3id.org/dpv/risk#RM7x7S4L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
- + - + @@ -18453,7 +20148,7 @@

Moderate Risk (RM7x7 S:4 L:3)

- + @@ -18483,25 +20178,25 @@

Moderate Risk (RM7x7 S:4 L:3)

-
-

High Risk (RM7x7 S:4 L:4)

+
+

Low Risk (RM7x7 S:5 L:2)

TermRM7x7S4L3RM7x7S5L1 Prefix risk-owl
LabelModerate Risk (RM7x7 S:4 L:3)Very Low Risk (RM7x7 S:5 L:1)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S4L3
- https://w3id.org/dpv/risk#RM7x7S4L3 + https://w3id.org/dpv/risk/owl/#RM7x7S5L1
+ https://w3id.org/dpv/risk#RM7x7S5L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
- + - + @@ -18532,7 +20227,7 @@

High Risk (RM7x7 S:4 L:4)

- + @@ -18562,25 +20257,25 @@

High Risk (RM7x7 S:4 L:4)

-
-

High Risk (RM7x7 S:4 L:5)

+
+

Moderate Risk (RM7x7 S:5 L:3)

TermRM7x7S4L4RM7x7S5L2 Prefix risk-owl
LabelHigh Risk (RM7x7 S:4 L:4)Low Risk (RM7x7 S:5 L:2)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S4L4
- https://w3id.org/dpv/risk#RM7x7S4L4 + https://w3id.org/dpv/risk/owl/#RM7x7S5L2
+ https://w3id.org/dpv/risk#RM7x7S5L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
- + - + @@ -18611,7 +20306,7 @@

High Risk (RM7x7 S:4 L:5)

- + @@ -18641,25 +20336,25 @@

High Risk (RM7x7 S:4 L:5)

-
-

Very High Risk (RM7x7 S:4 L:6)

+
+

High Risk (RM7x7 S:5 L:4)

TermRM7x7S4L5RM7x7S5L3 Prefix risk-owl
LabelHigh Risk (RM7x7 S:4 L:5)Moderate Risk (RM7x7 S:5 L:3)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S4L5
- https://w3id.org/dpv/risk#RM7x7S4L5 + https://w3id.org/dpv/risk/owl/#RM7x7S5L3
+ https://w3id.org/dpv/risk#RM7x7S5L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
- + - + @@ -18690,7 +20385,7 @@

Very High Risk (RM7x7 S:4 L:6)

- + @@ -18720,25 +20415,25 @@

Very High Risk (RM7x7 S:4 L:6)

-
-

Very High Risk (RM7x7 S:4 L:7)

+
+

Very High Risk (RM7x7 S:5 L:5)

TermRM7x7S4L6RM7x7S5L4 Prefix risk-owl
LabelVery High Risk (RM7x7 S:4 L:6)High Risk (RM7x7 S:5 L:4)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S4L6
- https://w3id.org/dpv/risk#RM7x7S4L6 + https://w3id.org/dpv/risk/owl/#RM7x7S5L4
+ https://w3id.org/dpv/risk#RM7x7S5L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
- + - + @@ -18769,7 +20464,7 @@

Very High Risk (RM7x7 S:4 L:7)

- + @@ -18799,25 +20494,25 @@

Very High Risk (RM7x7 S:4 L:7)

-
-

Very Low Risk (RM7x7 S:5 L:1)

+
+

Extremely High Risk (RM7x7 S:5 L:6)

TermRM7x7S4L7RM7x7S5L5 Prefix risk-owl
LabelVery High Risk (RM7x7 S:4 L:7)Very High Risk (RM7x7 S:5 L:5)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S4L7
- https://w3id.org/dpv/risk#RM7x7S4L7 + https://w3id.org/dpv/risk/owl/#RM7x7S5L5
+ https://w3id.org/dpv/risk#RM7x7S5L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
- + - + @@ -18848,7 +20543,7 @@

Very Low Risk (RM7x7 S:5 L:1)

- + @@ -18878,25 +20573,25 @@

Very Low Risk (RM7x7 S:5 L:1)

-
-

Low Risk (RM7x7 S:5 L:2)

+
+

Extremely High Risk (RM7x7 S:5 L:7)

TermRM7x7S5L1RM7x7S5L6 Prefix risk-owl
LabelVery Low Risk (RM7x7 S:5 L:1)Extremely High Risk (RM7x7 S:5 L:6)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S5L1
- https://w3id.org/dpv/risk#RM7x7S5L1 + https://w3id.org/dpv/risk/owl/#RM7x7S5L6
+ https://w3id.org/dpv/risk#RM7x7S5L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
- + - + @@ -18927,7 +20622,7 @@

Low Risk (RM7x7 S:5 L:2)

- + @@ -18957,25 +20652,25 @@

Low Risk (RM7x7 S:5 L:2)

-
-

Moderate Risk (RM7x7 S:5 L:3)

+
+

Very Low Risk (RM7x7 S:6 L:1)

TermRM7x7S5L2RM7x7S5L7 Prefix risk-owl
LabelLow Risk (RM7x7 S:5 L:2)Extremely High Risk (RM7x7 S:5 L:7)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S5L2
- https://w3id.org/dpv/risk#RM7x7S5L2 + https://w3id.org/dpv/risk/owl/#RM7x7S5L7
+ https://w3id.org/dpv/risk#RM7x7S5L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
- + - + @@ -19006,7 +20701,7 @@

Moderate Risk (RM7x7 S:5 L:3)

- + @@ -19036,25 +20731,25 @@

Moderate Risk (RM7x7 S:5 L:3)

-
-

High Risk (RM7x7 S:5 L:4)

+
+

Moderate Risk (RM7x7 S:6 L:2)

TermRM7x7S5L3RM7x7S6L1 Prefix risk-owl
LabelModerate Risk (RM7x7 S:5 L:3)Very Low Risk (RM7x7 S:6 L:1)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S5L3
- https://w3id.org/dpv/risk#RM7x7S5L3 + https://w3id.org/dpv/risk/owl/#RM7x7S6L1
+ https://w3id.org/dpv/risk#RM7x7S6L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
- + - + @@ -19085,7 +20780,7 @@

High Risk (RM7x7 S:5 L:4)

- + @@ -19114,26 +20809,26 @@

High Risk (RM7x7 S:5 L:4)

- -
-

Very High Risk (RM7x7 S:5 L:5)

+ +
+

High Risk (RM7x7 S:6 L:3)

TermRM7x7S5L4RM7x7S6L2 Prefix risk-owl
LabelHigh Risk (RM7x7 S:5 L:4)Moderate Risk (RM7x7 S:6 L:2)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S5L4
- https://w3id.org/dpv/risk#RM7x7S5L4 + https://w3id.org/dpv/risk/owl/#RM7x7S6L2
+ https://w3id.org/dpv/risk#RM7x7S6L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
- + - + @@ -19164,7 +20859,7 @@

Very High Risk (RM7x7 S:5 L:5)

- + @@ -19194,25 +20889,25 @@

Very High Risk (RM7x7 S:5 L:5)

-
-

Extremely High Risk (RM7x7 S:5 L:6)

+
+

Very High Risk (RM7x7 S:6 L:4)

TermRM7x7S5L5RM7x7S6L3 Prefix risk-owl
LabelVery High Risk (RM7x7 S:5 L:5)High Risk (RM7x7 S:6 L:3)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S5L5
- https://w3id.org/dpv/risk#RM7x7S5L5 + https://w3id.org/dpv/risk/owl/#RM7x7S6L3
+ https://w3id.org/dpv/risk#RM7x7S6L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
- + - + @@ -19243,7 +20938,7 @@

Extremely High Risk (RM7x7 S:5 L:6)

- + @@ -19273,25 +20968,25 @@

Extremely High Risk (RM7x7 S:5 L:6)

-
-

Extremely High Risk (RM7x7 S:5 L:7)

+
+

Very High Risk (RM7x7 S:6 L:5)

TermRM7x7S5L6RM7x7S6L4 Prefix risk-owl
LabelExtremely High Risk (RM7x7 S:5 L:6)Very High Risk (RM7x7 S:6 L:4)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S5L6
- https://w3id.org/dpv/risk#RM7x7S5L6 + https://w3id.org/dpv/risk/owl/#RM7x7S6L4
+ https://w3id.org/dpv/risk#RM7x7S6L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
- + - + @@ -19322,7 +21017,7 @@

Extremely High Risk (RM7x7 S:5 L:7)

- + @@ -19352,25 +21047,25 @@

Extremely High Risk (RM7x7 S:5 L:7)

-
-

Very Low Risk (RM7x7 S:6 L:1)

+
+

Extremely High Risk (RM7x7 S:6 L:6)

TermRM7x7S5L7RM7x7S6L5 Prefix risk-owl
LabelExtremely High Risk (RM7x7 S:5 L:7)Very High Risk (RM7x7 S:6 L:5)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S5L7
- https://w3id.org/dpv/risk#RM7x7S5L7 + https://w3id.org/dpv/risk/owl/#RM7x7S6L5
+ https://w3id.org/dpv/risk#RM7x7S6L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
- + - + @@ -19401,7 +21096,7 @@

Very Low Risk (RM7x7 S:6 L:1)

- + @@ -19431,25 +21126,25 @@

Very Low Risk (RM7x7 S:6 L:1)

-
-

Moderate Risk (RM7x7 S:6 L:2)

+
+

Extremely High Risk (RM7x7 S:6 L:7)

TermRM7x7S6L1RM7x7S6L6 Prefix risk-owl
LabelVery Low Risk (RM7x7 S:6 L:1)Extremely High Risk (RM7x7 S:6 L:6)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S6L1
- https://w3id.org/dpv/risk#RM7x7S6L1 + https://w3id.org/dpv/risk/owl/#RM7x7S6L6
+ https://w3id.org/dpv/risk#RM7x7S6L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
- + - + @@ -19480,7 +21175,7 @@

Moderate Risk (RM7x7 S:6 L:2)

- + @@ -19510,25 +21205,25 @@

Moderate Risk (RM7x7 S:6 L:2)

-
-

High Risk (RM7x7 S:6 L:3)

+
+

Low Risk (RM7x7 S:7 L:1)

TermRM7x7S6L2RM7x7S6L7 Prefix risk-owl
LabelModerate Risk (RM7x7 S:6 L:2)Extremely High Risk (RM7x7 S:6 L:7)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S6L2
- https://w3id.org/dpv/risk#RM7x7S6L2 + https://w3id.org/dpv/risk/owl/#RM7x7S6L7
+ https://w3id.org/dpv/risk#RM7x7S6L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
- + - + @@ -19559,7 +21254,7 @@

High Risk (RM7x7 S:6 L:3)

- + @@ -19589,25 +21284,25 @@

High Risk (RM7x7 S:6 L:3)

-
-

Very High Risk (RM7x7 S:6 L:4)

+
+

Moderate Risk (RM7x7 S:7 L:2)

TermRM7x7S6L3RM7x7S7L1 Prefix risk-owl
LabelHigh Risk (RM7x7 S:6 L:3)Low Risk (RM7x7 S:7 L:1)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S6L3
- https://w3id.org/dpv/risk#RM7x7S6L3 + https://w3id.org/dpv/risk/owl/#RM7x7S7L1
+ https://w3id.org/dpv/risk#RM7x7S7L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
- + - + @@ -19638,7 +21333,7 @@

Very High Risk (RM7x7 S:6 L:4)

- + @@ -19668,25 +21363,25 @@

Very High Risk (RM7x7 S:6 L:4)

-
-

Very High Risk (RM7x7 S:6 L:5)

+
+

High Risk (RM7x7 S:7 L:3)

TermRM7x7S6L4RM7x7S7L2 Prefix risk-owl
LabelVery High Risk (RM7x7 S:6 L:4)Moderate Risk (RM7x7 S:7 L:2)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S6L4
- https://w3id.org/dpv/risk#RM7x7S6L4 + https://w3id.org/dpv/risk/owl/#RM7x7S7L2
+ https://w3id.org/dpv/risk#RM7x7S7L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
- + - + @@ -19717,7 +21412,7 @@

Very High Risk (RM7x7 S:6 L:5)

- + @@ -19747,25 +21442,25 @@

Very High Risk (RM7x7 S:6 L:5)

-
-

Extremely High Risk (RM7x7 S:6 L:6)

+
+

Very High Risk (RM7x7 S:7 L:4)

TermRM7x7S6L5RM7x7S7L3 Prefix risk-owl
LabelVery High Risk (RM7x7 S:6 L:5)High Risk (RM7x7 S:7 L:3)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S6L5
- https://w3id.org/dpv/risk#RM7x7S6L5 + https://w3id.org/dpv/risk/owl/#RM7x7S7L3
+ https://w3id.org/dpv/risk#RM7x7S7L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
- + - + @@ -19796,7 +21491,7 @@

Extremely High Risk (RM7x7 S:6 L:6)

- + @@ -19826,25 +21521,25 @@

Extremely High Risk (RM7x7 S:6 L:6)

-
-

Extremely High Risk (RM7x7 S:6 L:7)

+
+

Extremely High Risk (RM7x7 S:7 L:5)

TermRM7x7S6L6RM7x7S7L4 Prefix risk-owl
LabelExtremely High Risk (RM7x7 S:6 L:6)Very High Risk (RM7x7 S:7 L:4)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S6L6
- https://w3id.org/dpv/risk#RM7x7S6L6 + https://w3id.org/dpv/risk/owl/#RM7x7S7L4
+ https://w3id.org/dpv/risk#RM7x7S7L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
- + - + @@ -19875,7 +21570,7 @@

Extremely High Risk (RM7x7 S:6 L:7)

- + @@ -19905,25 +21600,25 @@

Extremely High Risk (RM7x7 S:6 L:7)

-
-

Low Risk (RM7x7 S:7 L:1)

+
+

Extremely High Risk (RM7x7 S:7 L:6)

TermRM7x7S6L7RM7x7S7L5 Prefix risk-owl
LabelExtremely High Risk (RM7x7 S:6 L:7)Extremely High Risk (RM7x7 S:7 L:5)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S6L7
- https://w3id.org/dpv/risk#RM7x7S6L7 + https://w3id.org/dpv/risk/owl/#RM7x7S7L5
+ https://w3id.org/dpv/risk#RM7x7S7L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
- + - + @@ -19954,7 +21649,7 @@

Low Risk (RM7x7 S:7 L:1)

- + @@ -19984,25 +21679,25 @@

Low Risk (RM7x7 S:7 L:1)

-
-

Moderate Risk (RM7x7 S:7 L:2)

+
+

Extremely High Risk (RM7x7 S:7 L:7)

TermRM7x7S7L1RM7x7S7L6 Prefix risk-owl
LabelLow Risk (RM7x7 S:7 L:1)Extremely High Risk (RM7x7 S:7 L:6)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S7L1
- https://w3id.org/dpv/risk#RM7x7S7L1 + https://w3id.org/dpv/risk/owl/#RM7x7S7L6
+ https://w3id.org/dpv/risk#RM7x7S7L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
- + - + @@ -20033,7 +21728,7 @@

Moderate Risk (RM7x7 S:7 L:2)

- + @@ -20063,25 +21758,25 @@

Moderate Risk (RM7x7 S:7 L:2)

-
-

High Risk (RM7x7 S:7 L:3)

+
+

Rule-Based System Design

TermRM7x7S7L2RM7x7S7L7 Prefix risk-owl
LabelModerate Risk (RM7x7 S:7 L:2)Extremely High Risk (RM7x7 S:7 L:7)
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S7L2
- https://w3id.org/dpv/risk#RM7x7S7L2 + https://w3id.org/dpv/risk/owl/#RM7x7S7L7
+ https://w3id.org/dpv/risk#RM7x7S7L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
- + - + @@ -20090,16 +21785,15 @@

High Risk (RM7x7 S:7 L:3)

- @@ -20112,29 +21806,35 @@

High Risk (RM7x7 S:7 L:3)

- + - + + + + - + + + + - + - + - +
TermRM7x7S7L3RuleBasedSystemDesign Prefix risk-owl
LabelHigh Risk (RM7x7 S:7 L:3)Rule-Based System Design
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S7L3
- https://w3id.org/dpv/risk#RM7x7S7L3 + https://w3id.org/dpv/risk/owl/#RuleBasedSystemDesign
+ https://w3id.org/dpv/risk#RuleBasedSystemDesign
Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , risk-owl:RiskConcept
Sub-class of risk-owl:RiskMatrix7x7 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:RiskConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighBias that occurs due to developer experience and expert advice having a significant influence on rule-based system design
Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
Source
Date Created2022-08-172024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
Documented inRisk Risk-matrixRisk Bias
@@ -20142,25 +21842,25 @@

High Risk (RM7x7 S:7 L:3)

-
-

Very High Risk (RM7x7 S:7 L:4)

+
+

Sabotage

- + - + @@ -20169,16 +21869,20 @@

Very High Risk (RM7x7 S:7 L:4)

- + + + + @@ -20191,14 +21895,17 @@

Very High Risk (RM7x7 S:7 L:4)

- + - + + + + @@ -20206,14 +21913,17 @@

Very High Risk (RM7x7 S:7 L:4)

- + + + + - +
TermRM7x7S7L4Sabotage Prefix risk-owl
LabelVery High Risk (RM7x7 S:7 L:4)Sabotage
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S7L4
- https://w3id.org/dpv/risk#RM7x7S7L4 + https://w3id.org/dpv/risk/owl/#Sabotage
+ https://w3id.org/dpv/risk#Sabotage
Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept
Sub-class of risk-owl:RiskMatrix7x7 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:AvailabilityConcept +
Sub-class of risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept +
Sub-class of risk-owl:IntegrityConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighSomething that acts as or causes Sabotage
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created 2022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-matrixRisk Risk-consequences
@@ -20221,25 +21931,25 @@

Very High Risk (RM7x7 S:7 L:4)

-
-

Extremely High Risk (RM7x7 S:7 L:5)

+
+

Sampling Bias

- + - + @@ -20248,16 +21958,17 @@

Extremely High Risk (RM7x7 S:7 L:5)

- @@ -20270,29 +21981,32 @@

Extremely High Risk (RM7x7 S:7 L:5)

- + - + + + + - + - + - +
TermRM7x7S7L5SamplingBias Prefix risk-owl
LabelExtremely High Risk (RM7x7 S:7 L:5)Sampling Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S7L5
- https://w3id.org/dpv/risk#RM7x7S7L5 + https://w3id.org/dpv/risk/owl/#SamplingBias
+ https://w3id.org/dpv/risk#SamplingBias
Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , risk-owl:RiskConcept
Sub-class of risk-owl:RiskMatrix7x7 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:SelectionBias + → risk-owl:StatisticalBias + → risk-owl:DataBias + → risk-owl:Bias + → risk-owl:RiskConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighBias that occurs when data records are not collected randomly from the intended population
Source
Date Created2022-08-172024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
Documented inRisk Risk-matrixRisk Bias
@@ -20300,25 +22014,25 @@

Extremely High Risk (RM7x7 S:7 L:5)

-
-

Extremely High Risk (RM7x7 S:7 L:6)

+
+

Scam

- + - + @@ -20327,16 +22041,17 @@

Extremely High Risk (RM7x7 S:7 L:6)

- + + @@ -20349,14 +22064,17 @@

Extremely High Risk (RM7x7 S:7 L:6)

- + - + + + + @@ -20364,14 +22082,17 @@

Extremely High Risk (RM7x7 S:7 L:6)

- + + + + - +
TermRM7x7S7L6Scam Prefix risk-owl
LabelExtremely High Risk (RM7x7 S:7 L:6)Scam
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S7L6
- https://w3id.org/dpv/risk#RM7x7S7L6 + https://w3id.org/dpv/risk/owl/#Scam
+ https://w3id.org/dpv/risk#Scam
Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept
Sub-class of risk-owl:RiskMatrix7x7 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:ConfidentialityConcept +
Sub-class of risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighSomething that acts as or causes Scam
SourceISO/IEC 27005:2018
Date Created 2022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-matrixRisk Risk-consequences
@@ -20379,25 +22100,25 @@

Extremely High Risk (RM7x7 S:7 L:6)

-
-

Extremely High Risk (RM7x7 S:7 L:7)

+
+

Security Attack

- + - + @@ -20406,16 +22127,23 @@

Extremely High Risk (RM7x7 S:7 L:7)

- + + + + + + @@ -20428,7 +22156,7 @@

Extremely High Risk (RM7x7 S:7 L:7)

- + @@ -20439,18 +22167,12 @@

Extremely High Risk (RM7x7 S:7 L:7)

- - - - + + - - - - - +
TermRM7x7S7L7SecurityAttack Prefix risk-owl
LabelExtremely High Risk (RM7x7 S:7 L:7)Security Attack
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#RM7x7S7L7
- https://w3id.org/dpv/risk#RM7x7S7L7 + https://w3id.org/dpv/risk/owl/#SecurityAttack
+ https://w3id.org/dpv/risk#SecurityAttack
Type rdfs:Class , owl:Class - , risk-owl:RiskAnalysis + , dpv-owl:RiskConcept
Sub-class of risk-owl:RiskMatrix7x7 - → risk-owl:RiskMatrix - → risk-owl:RiskAssessment - → risk-owl:RiskManagement + risk-owl:AvailabilityConcept +
Sub-class of risk-owl:ConfidentialityConcept +
Sub-class of risk-owl:ExternalSecurityThreat + → dpv-owl:RiskConcept +
Sub-class of risk-owl:IntegrityConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighSomething that acts as or causes an attack on security with the aim of undermining it
Date Created2022-08-17
ContributorsHarshvardhan J. Pandit
Documented inRisk Risk-matrixRisk Risk-consequences
@@ -20458,25 +22180,25 @@

Extremely High Risk (RM7x7 S:7 L:7)

-
-

Sabotage

+
+

Security Breach

- + - + @@ -20494,11 +22216,14 @@

Sabotage

- + + @@ -20511,7 +22236,7 @@

Sabotage

- + @@ -20520,7 +22245,7 @@

Sabotage

- + @@ -20547,25 +22272,25 @@

Sabotage

-
-

Scam

+
+

Selection Bias

TermSabotageSecurityBreach Prefix risk-owl
LabelSabotageSecurity Breach
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Sabotage
- https://w3id.org/dpv/risk#Sabotage + https://w3id.org/dpv/risk/owl/#SecurityBreach
+ https://w3id.org/dpv/risk#SecurityBreach
risk-owl:AvailabilityConcept
Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept + risk-owl:ConfidentialityConcept
Sub-class of risk-owl:IntegrityConcept +
Sub-class of risk-owl:OperationalSecurityRisk + → dpv-owl:RiskConcept
DefinitionSomething that acts as or causes SabotageSomething that acts as or causes Security Breach
SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
- + - + @@ -20574,17 +22299,16 @@

Scam

- - - @@ -20597,7 +22321,7 @@

Scam

- + @@ -20606,26 +22330,23 @@

Scam

- + - + - - - - + - + - +
TermScamSelectionBias Prefix risk-owl
LabelScamSelection Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#Scam
- https://w3id.org/dpv/risk#Scam + https://w3id.org/dpv/risk/owl/#SelectionBias
+ https://w3id.org/dpv/risk#SelectionBias
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskConcept
Sub-class of risk-owl:ConfidentialityConcept -
Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept + risk-owl:StatisticalBias + → risk-owl:DataBias + → risk-owl:Bias + → risk-owl:RiskConcept
DefinitionSomething that acts as or causes ScamBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
Documented inRisk Risk-consequencesRisk Bias
@@ -20633,25 +22354,30 @@

Scam

-
-

Security Attack

+ + + + + +
+

Sexual Violence

- + - + @@ -20666,17 +22392,7 @@

Security Attack

- - - - - - - @@ -20689,20 +22405,32 @@

Security Attack

- + - + + + + - - - + + + + + + + + + + + + @@ -20713,25 +22441,25 @@

Security Attack

-
-

Security Breach

+
+

Share Risk

TermSecurityAttackSexualViolence Prefix risk-owl
LabelSecurity AttackSexual Violence
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#SecurityAttack
- https://w3id.org/dpv/risk#SecurityAttack + https://w3id.org/dpv/risk/owl/#SexualViolence
+ https://w3id.org/dpv/risk#SexualViolence
Sub-class of risk-owl:AvailabilityConcept -
Sub-class of risk-owl:ConfidentialityConcept -
Sub-class of risk-owl:ExternalSecurityThreat - → dpv-owl:RiskConcept -
Sub-class of risk-owl:IntegrityConcept + risk-owl:IndividualRisk
DefinitionSomething that acts as or causes an attack on security with the aim of undermining itSomething that acts as or causes Sexual Violence
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
Documented in Risk Risk-consequences
- + - + @@ -20740,27 +22468,25 @@

Security Breach

- - - - - - - - + + + + @@ -20769,35 +22495,29 @@

Security Breach

- + - - - - + - + - - - - + - +
TermSecurityBreachShareRisk Prefix risk-owl
LabelSecurity BreachShare Risk
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#SecurityBreach
- https://w3id.org/dpv/risk#SecurityBreach + https://w3id.org/dpv/risk/owl/#ShareRisk
+ https://w3id.org/dpv/risk#ShareRisk
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskControl
Sub-class of risk-owl:AvailabilityConcept -
Sub-class of risk-owl:ConfidentialityConcept -
Sub-class of risk-owl:IntegrityConcept -
Sub-class of risk-owl:OperationalSecurityRisk - → dpv-owl:RiskConcept + risk-owl:RiskControl + → dpv-owl:RiskMitigationMeasure + → dpv-owl:TechnicalOrganisationalMeasure
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, + dpv-owl:isMitigatedByMeasure, + risk-owl:hasControl +
DefinitionSomething that acts as or causes Security BreachRisk Mitigation Measure that shares Risk e.g. amongst stakeholders
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
Documented inRisk Risk-consequencesRisk Risk-controls
@@ -20805,30 +22525,25 @@

Security Breach

- - - - - -
-

Sexual Violence

+
+

Simpson'S Paradox Bias

- + - + @@ -20837,13 +22552,15 @@

Sexual Violence

- @@ -20856,7 +22573,7 @@

Sexual Violence

- + @@ -20865,26 +22582,23 @@

Sexual Violence

- + - + - - - - + - + - +
TermSexualViolenceSimpsonsParadoxBias Prefix risk-owl
LabelSexual ViolenceSimpson'S Paradox Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#SexualViolence
- https://w3id.org/dpv/risk#SexualViolence + https://w3id.org/dpv/risk/owl/#SimpsonsParadoxBias
+ https://w3id.org/dpv/risk#SimpsonsParadoxBias
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskConcept
Sub-class of risk-owl:IndividualRisk + risk-owl:DataBias + → risk-owl:Bias + → risk-owl:RiskConcept
DefinitionSomething that acts as or causes Sexual ViolenceBias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
Documented inRisk Risk-consequencesRisk Bias
@@ -20892,25 +22606,25 @@

Sexual Violence

-
-

Share Risk

+
+

Social Disadvantage

- + - + @@ -20919,25 +22633,18 @@

Share Risk

- - - - - + @@ -20946,7 +22653,7 @@

Share Risk

- + @@ -20959,16 +22666,19 @@

Share Risk

- + - + + + + - + - +
TermShareRiskSocialDisadvantage Prefix risk-owl
LabelShare RiskSocial Disadvantage
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#ShareRisk
- https://w3id.org/dpv/risk#ShareRisk + https://w3id.org/dpv/risk/owl/#SocialDisadvantage
+ https://w3id.org/dpv/risk#SocialDisadvantage
Type rdfs:Class , owl:Class - , risk-owl:RiskControl + , dpv-owl:RiskConcept
Sub-class of risk-owl:RiskControl - → dpv-owl:RiskMitigationMeasure - → dpv-owl:TechnicalOrganisationalMeasure + risk-owl:SocietalRisk + → dpv-owl:RiskConcept
in Range of dpv-owl:hasTechnicalOrganisationalMeasure, - dpv-owl:isMitigatedByMeasure, - risk-owl:hasControl -
DefinitionRisk Mitigation Measure that shares Risk e.g. amongst stakeholdersSomething that acts as or causes Social Disadvantage
Date Created2024-05-192022-08-19
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog
Documented inRisk Risk-controlsRisk Risk-consequences
@@ -20976,25 +22686,25 @@

Share Risk

-
-

Social Disadvantage

+
+

Societal Bias

- + - + @@ -21003,14 +22713,15 @@

Social Disadvantage

- @@ -21023,32 +22734,32 @@

Social Disadvantage

- + - + + + + - + - - - - + - + - +
TermSocialDisadvantageSocietalBias Prefix risk-owl
LabelSocial DisadvantageSocietal Bias
IRI (owl)
IRI (canonical)
- https://w3id.org/dpv/risk/owl/#SocialDisadvantage
- https://w3id.org/dpv/risk#SocialDisadvantage + https://w3id.org/dpv/risk/owl/#SocietalBias
+ https://w3id.org/dpv/risk#SocietalBias
Type rdfs:Class , owl:Class - , dpv-owl:RiskConcept + , risk-owl:RiskConcept
Sub-class of risk-owl:SocietalRisk - → dpv-owl:RiskConcept + risk-owl:CognitiveBias + → risk-owl:Bias + → risk-owl:RiskConcept
DefinitionSomething that acts as or causes Social DisadvantageBias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society
Source
Date Created2022-08-192024-09-13
Date Modified2024-08-16
ContributorsGeorg P. KrogDaniel Doherty
Documented inRisk Risk-consequencesRisk Bias
@@ -21371,6 +23082,87 @@

Spoofing

+
+

Statistical Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermStatisticalBiasPrefixrisk-owl
LabelStatistical Bias
IRI (owl)
IRI (canonical)
+ https://w3id.org/dpv/risk/owl/#StatisticalBias
+ https://w3id.org/dpv/risk#StatisticalBias +
Type rdfs:Class + , owl:Class + , risk-owl:RiskConcept +
Sub-class of risk-owl:DataBias + → risk-owl:Bias + → risk-owl:RiskConcept +
DefinitionBias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates
Source
Date Created2024-09-13
ContributorsDaniel Doherty
Documented inRisk Bias
+
+ + +

System Failure

@@ -24651,6 +26443,10 @@

Properties

+ + + + @@ -24837,6 +26633,15 @@

caused by vulnerability

+ + + + + + + + + @@ -24873,6 +26678,18 @@

caused by vulnerability

+ + + + + + + + + + + + @@ -25002,6 +26819,9 @@

exploits vulnerability

+ + + @@ -25400,6 +27220,9 @@

has vulnerability

+ + + @@ -25468,6 +27291,12 @@

has vulnerability

+ + + + + + @@ -25734,6 +27563,15 @@

is vulnerability of

+ + + + + + + + + @@ -25857,6 +27695,9 @@

refers to risk

+ + + @@ -26259,6 +28100,24 @@

refers to risk

+ + + + + + + + + + + + + + + + + + @@ -26409,13 +28268,23 @@

External

+ + + + + + + + + + @@ -26442,9 +28311,12 @@

External

+ + + @@ -26458,6 +28330,18 @@

External

+ + + + + + + + + + + + @@ -26550,6 +28434,11 @@

External

+ + + + + @@ -26558,6 +28447,7 @@

External

+ @@ -26654,16 +28544,31 @@

External

+ + + + + + + + + + + + + + + @@ -26825,6 +28730,9 @@

External

+ + + @@ -27113,10 +29021,28 @@

External

+ + + + + + + + + + + + + + + + + + diff --git a/2.1-dev/risk/risk-owl.jsonld b/2.1-dev/risk/risk-owl.jsonld index e246f3c3a..87120786b 100644 --- a/2.1-dev/risk/risk-owl.jsonld +++ b/2.1-dev/risk/risk-owl.jsonld @@ -1,25 +1,26 @@ [ { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L5", + "@id": "https://w3id.org/dpv/risk/owl#Compensation", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.51,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -29,7 +30,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -41,21 +42,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:5 L:5)" + "@value": "Compensation" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L1", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -69,15 +70,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N45ea789360bf45b583e4ec132c599510" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -87,7 +82,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -99,37 +94,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" - } - ] - }, - { - "@id": "_:N45ea789360bf45b583e4ec132c599510", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very Low Risk (RM7x7 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorConsequence", + "@id": "https://w3id.org/dpv/risk/owl#IncidentImpactAssessment", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -150,7 +128,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/owl#ImpactAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -162,21 +140,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Consequence" + "@value": "An impact assessment associated with a incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Consequence" + "@value": "Incident Impact Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentConcluded", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L3", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -187,7 +165,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -197,7 +180,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -209,18 +192,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluded" + "@value": "Very Low Risk (RM7x7 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -234,7 +217,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -243,11 +226,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1b737c42d90a432cad3eff4cc5cb68da" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -255,16 +233,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -276,61 +245,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "Something that acts as or causes Non-Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" - } - ] - }, - { - "@id": "_:N1b737c42d90a432cad3eff4cc5cb68da", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Non-Material Damage" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N27a5c73a4a0b4a5f83c54631af64cfa4" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -338,13 +275,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -356,36 +287,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" - } - ] - }, - { - "@id": "_:N27a5c73a4a0b4a5f83c54631af64cfa4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Scam", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L4", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -400,15 +315,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ned9bbb8f8f3644bc86e6dad333a72f19" + "@value": "0.64,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -418,10 +327,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -433,37 +339,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" - } - ] - }, - { - "@id": "_:Ned9bbb8f8f3644bc86e6dad333a72f19", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very High Risk (RM5x5 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -477,15 +367,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nee4d48a7cebf4f2cb9b08674eaaf0129" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -495,7 +379,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -507,59 +391,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Nee4d48a7cebf4f2cb9b08674eaaf0129", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Very Low Risk (RM7x7 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L1", + "@id": "https://w3id.org/dpv/risk/owl#GroupAttributionBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.06,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -569,7 +432,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -581,20 +444,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" + "@value": "Group Attribution Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L5", + "@id": "https://w3id.org/dpv/risk/owl#HighSeverity", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -606,12 +469,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.71,xsd:decimal" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -621,7 +484,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -633,45 +502,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" + "@value": "Level where Severity is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:5)" + "@value": "High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", + "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6fa4299dcf03460280724c2e94188882" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -682,55 +535,80 @@ "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + "@value": "Security Attack" } ] }, { - "@id": "_:N6fa4299dcf03460280724c2e94188882", + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Documented information about an incident, its handling, assessments,and notifications" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Harm", + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -741,13 +619,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -757,7 +629,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -769,27 +641,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Risk Mitigation Measure that controls Impacts" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "Impact Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk/owl#MonitorRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -800,18 +666,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ncc2da5ee1cff4c0eb963b9cb65d28234" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -821,13 +676,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -839,37 +688,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "Control that monitors a Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" - } - ] - }, - { - "@id": "_:Ncc2da5ee1cff4c0eb963b9cb65d28234", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Monitor Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L7", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L3", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -885,7 +718,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.14,xsd:decimal" + "@value": "0.18,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -907,18 +740,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:1 L:7)" + "@value": "Low Risk (RM7x7 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -943,7 +776,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N88bef5f8213d4c23913c18635bfa944c" + "@id": "_:N9a05f8103f334714ae1d17fd74ba0730" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -953,10 +786,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -968,18 +801,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Something that acts as or causes Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N88bef5f8213d4c23913c18635bfa944c", + "@id": "_:N9a05f8103f334714ae1d17fd74ba0730", "@type": [ "https://schema.org/WebPage" ], @@ -995,10 +834,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L4", + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1009,12 +848,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.64,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1024,7 +858,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1036,21 +870,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Risk Mitigation Measure that uses controls to monitor events" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:4)" + "@value": "Monitor Control" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L2", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1064,9 +904,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.08,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N23726cdea0d14630a4ffe4716dcd4526" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1076,7 +922,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1088,38 +937,84 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Something that acts as or causes Unauthorised Resource Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" + "@value": "Unauthorised Resource Use" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", + "@id": "_:N23726cdea0d14630a4ffe4716dcd4526", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Health & Safety" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1129,7 +1024,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1141,44 +1036,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Rights" + "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" + "@value": "Societal Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Renumeration", + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1188,7 +1077,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#Bias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1200,26 +1089,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "Bias that occurs when humans are processing and interpreting information" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Cognitive Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", + "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N04c587cd11ad4a1396432371d68b3776" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1229,7 +1135,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1241,21 +1156,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability" + "@value": "Malware Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowSeverity", + "@id": "_:N04c587cd11ad4a1396432371d68b3776", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1266,12 +1197,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.1,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd42bbf88bc3c4a50bd0d7b206c79060e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1281,10 +1218,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1296,33 +1230,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very Low" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Severity" + "@value": "Financial Loss" } + ] + }, + { + "@id": "_:Nd42bbf88bc3c4a50bd0d7b206c79060e", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ContainmentControl", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighLikelihood", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1332,7 +1286,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1344,21 +1301,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to contain event" + "@value": "Level where Likelihood is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Containment Control" + "@value": "Very High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L2", + "@id": "https://w3id.org/dpv/risk/owl#Reidentification", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1369,12 +1332,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.67,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1384,7 +1348,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1396,21 +1363,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes Re-identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:2)" + "@value": "Re-identification" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", + "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1432,7 +1405,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N64ad592beac14296a8c1a10b74e6b130" + "@id": "_:N012ac588a7e54adeb3318a3bcf249184" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1442,7 +1415,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1454,18 +1430,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Something that acts as or causes System Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" + "@value": "System Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N64ad592beac14296a8c1a10b74e6b130", + "@id": "_:N012ac588a7e54adeb3318a3bcf249184", "@type": [ "https://schema.org/WebPage" ], @@ -1481,10 +1463,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentTerminated", + "@id": "https://w3id.org/dpv/risk/owl#ReduceLikelihood", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1495,7 +1477,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1505,7 +1487,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1517,35 +1499,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" + "@value": "Control that reduces the likelihood of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Terminated" + "@value": "Reduce Likelihood" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Incident", + "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - }, - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -1554,12 +1533,9 @@ "@value": "2024-08-16" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - }, + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0070" + "@id": "_:N6526b82722164e0ba82d77115e7cee0f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1569,10 +1545,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" }, { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1584,80 +1566,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An actual or occured event" + "@value": "Something that acts as or causes Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Incident is realised or materialised risk" + "@value": "Malicious Code Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Payment", + "@id": "_:N6526b82722164e0ba82d77115e7cee0f", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Payment" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L3", + "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -1671,9 +1610,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N1a900148ee964d84bdb0f1dbecd9c525" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1683,7 +1628,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1695,73 +1640,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:4 L:3)" + "@value": "Human Errors" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", + "@id": "_:N1a900148ee964d84bdb0f1dbecd9c525", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#RiskConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Environmental Risk" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L3", + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.48,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1771,7 +1685,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1783,18 +1697,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:4 L:3)" + "@value": "Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -1819,7 +1733,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0038d7d16b3c40cab05b307669151fd9" + "@id": "_:Nca552bddc5ac4825af27bacd7089da63" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1829,13 +1743,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" }, { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1847,39 +1758,50 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Authorisation Failure" + "@value": "System Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } ] }, { - "@id": "_:N0038d7d16b3c40cab05b307669151fd9", + "@id": "_:Nca552bddc5ac4825af27bacd7089da63", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISa Trust Services Security Incidents 2021" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -1887,7 +1809,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1899,37 +1821,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@value": "Incident where the availability of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputational Risk" + "@value": "Availability Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L3", + "@id": "https://w3id.org/dpv/risk/owl#CoverageBias", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.43,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1939,7 +1862,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1951,37 +1874,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" + "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:7 L:3)" + "@value": "Coverage Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#Bias", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.99,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1991,7 +1915,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2003,24 +1927,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely High" + "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L7", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L3", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -2039,7 +1957,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.29,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2049,7 +1967,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2061,18 +1979,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:7)" + "@value": "Moderate Risk (RM5x5 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialLoss", + "@id": "https://w3id.org/dpv/risk/owl#Sabotage", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -2097,7 +2015,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0d61726294a941cbbddda5bb7085a37c" + "@id": "_:N42dd6eab89e5476c8ce82ee556bb8a47" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2107,7 +2025,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2119,59 +2043,100 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Sabotage" } ] }, { - "@id": "_:N0d61726294a941cbbddda5bb7085a37c", + "@id": "_:N42dd6eab89e5476c8ce82ee556bb8a47", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-12" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Management" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L7", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N11267ca2734e4dc7a63139ac1d11565e" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2181,7 +2146,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2193,34 +2158,102 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Extremely High Risk (RM7x7 S:7 L:7)" } ] }, { - "@id": "_:N11267ca2734e4dc7a63139ac1d11565e", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://www.w3.org/TR/json-ld11/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HumanErrors", + "@id": "https://w3id.org/dpv/risk/owl#ImplicitBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Implicit Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -2245,7 +2278,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N175c7a502e7f4e91bae180a2093d115e" + "@id": "_:N9017bb64e79f426e9b3be47b09cd93ea" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2255,7 +2288,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2267,18 +2303,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "_:N175c7a502e7f4e91bae180a2093d115e", + "@id": "_:N9017bb64e79f426e9b3be47b09cd93ea", "@type": [ "https://schema.org/WebPage" ], @@ -2294,10 +2330,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L4", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2311,15 +2347,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N922c5ae818414586ac107059bd5a8394" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2329,72 +2359,49 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N922c5ae818414586ac107059bd5a8394", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very High Risk (RM5x5 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reward", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L2", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2404,7 +2411,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2416,21 +2423,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "Moderate Risk (RM5x5 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2440,7 +2447,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2452,21 +2459,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Costs" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2488,7 +2495,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N84cbe552be064fab92740d469954da17" + "@id": "_:N96a4e2b7a71b485fae480316787e987b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2498,36 +2505,39 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "_:N84cbe552be064fab92740d469954da17", + "@id": "_:N96a4e2b7a71b485fae480316787e987b", "@type": [ "https://schema.org/WebPage" ], @@ -2543,26 +2553,27 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L5", + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.40,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2572,7 +2583,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2584,46 +2595,31 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:2 L:5)" + "@value": "Selection Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N8c7d07a332384427aa20629b184e287b" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2635,34 +2631,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" + "@value": "Concepts associated with security threats that are likely to originate externally" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Analysis" - } - ] - }, - { - "@id": "_:N8c7d07a332384427aa20629b184e287b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/72140.html" + "@value": "External Security Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L7", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L3", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2681,7 +2661,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.43,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2703,41 +2683,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:3 L:7)" + "@value": "Moderate Risk (RM7x7 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L2", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Incident" - } + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0069" + "@value": "0.44,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2745,6 +2721,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -2754,28 +2735,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "refers to risk" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Incident" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/owl#Risk" + "@value": "Moderate Risk (RM3x3 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl", + "@id": "https://w3id.org/dpv/risk/owl#RemoveConsequence", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", @@ -2799,7 +2770,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2811,32 +2782,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls Impacts" + "@value": "Control that removes Consequence i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact Control" + "@value": "Remove Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Misuse", + "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -2845,6 +2816,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6dd3fbc8f83f432bac55bbdc7b5f2fcc" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2852,7 +2828,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2864,21 +2840,68 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Physical Assault" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowLikelihood", + "@id": "_:N6dd3fbc8f83f432bac55bbdc7b5f2fcc", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TeamSubmission/n3/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/n3" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - N3 serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L1", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -2889,12 +2912,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.11,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2904,10 +2927,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2919,29 +2939,40 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Low Risk (RM3x3 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", + "@id": "https://w3id.org/dpv/risk/owl#NonNormalityBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -2949,7 +2980,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2958,37 +2989,50 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Health & Safety" + "@value": "Non-Normality Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L5", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, + "@value": "0.10,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3000,238 +3044,152 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Very Low Risk (RM7x7 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#", + "@id": "https://w3id.org/dpv/risk/owl#RiskControl", "@type": [ - "http://www.w3.org/ns/dx/prof/Profile", - "http://www.w3.org/2002/07/owl#Ontology" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://purl.org/dc/terms/created": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, + "http://purl.org/vocab/vann/example": [ { - "@value": "http://www.w3.org/2004/02/skos/core" - }, - { - "@id": "http://www.w3.org/2002/07/owl" + "@id": "https://w3id.org/dpv/examples/owl#E0071" } ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Rob Brennan" - }, - { - "@value": "Axel Polleres" - }, - { - "@value": "Delaram Golpayegani" - }, - { - "@value": "Julian Flake" - }, - { - "@value": "Fajar Ekaputra" - }, - { - "@value": "Harshvardhan J. Pandit" - }, - { - "@value": "Georg P. Krog" - }, - { - "@value": "Julio Fernandez" - }, + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Beatriz Esteves" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "2022-08-14" + "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" } ], - "http://purl.org/dc/terms/creator": [ - { - "@language": "en", - "@value": "Beatriz Esteves" - }, - { - "@language": "en", - "@value": "Georg P. Krog" - }, - { - "@language": "en", - "@value": "Paul Ryan" - }, - { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, - { - "@language": "en", - "@value": "Julian Flake" - }, - { - "@language": "en", - "@value": "Delaram Golpayegani" - }, + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Rob Brennan" + "@value": "accepted" } ], - "http://purl.org/dc/terms/description": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@value": "Control that modifies risk" } ], - "http://purl.org/dc/terms/hasVersion": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@language": "en", + "@value": "Risk Control" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityIncident", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/identifier": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://w3id.org/dpv/risk" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "2022-08-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2024-08-18" - } - ], - "http://purl.org/dc/terms/publisher": [ - { - "@id": "https://www.w3.org/" + "@value": "accepted" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@language": "en", + "@value": "Incident where the integrity of information or system has been affected" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Concepts" + "@value": "Integrity Incident" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SourceControl", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/ontology/bibo/doi": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "10.5281/zenodo.12505841" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/ontology/bibo/status": [ + "http://purl.org/dc/terms/created": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "risk" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "RISK" - } - ], - "http://www.w3.org/2002/07/owl#versionIRI": [ - { - "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" - } - ], - "http://www.w3.org/2002/07/owl#versionInfo": [ - { - "@value": "2.1-dev" - } - ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - } - ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2002/07/owl" - }, - { - "@id": "https://w3id.org/dpv/owl" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "accepted" } ], - "http://xmlns.com/foaf/0.1/logo": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@language": "en", + "@value": "Risk Mitigation Measure that controls the Source" } ], - "https://schema.org/version": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "Source Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fraud", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -3256,7 +3214,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N28e03fcc1da04ba6b6f8244dc6e99aa3" + "@id": "_:N6dc4efe43a844bbe94810084460a3ca2" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3266,10 +3224,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3281,39 +3239,50 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "_:N28e03fcc1da04ba6b6f8244dc6e99aa3", + "@id": "_:N6dc4efe43a844bbe94810084460a3ca2", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", + "@id": "https://w3id.org/dpv/risk/owl#AvoidSource", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3321,7 +3290,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3333,18 +3302,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@value": "Control that avoids the risk source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Penalty" + "@value": "Avoid Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Benefit", + "@id": "https://w3id.org/dpv/risk/owl#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -3352,13 +3321,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -3367,6 +3336,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N656bab82b34a40c7be08764bd11edd1d" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -3374,7 +3348,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3386,52 +3360,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@id": "_:N656bab82b34a40c7be08764bd11edd1d", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/conformsTo": [ + "https://schema.org/name": [ { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - RDF/XML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L4", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3447,7 +3406,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3469,20 +3428,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:4 L:2)" + "@value": "Very Low Risk (RM7x7 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L2", + "@id": "https://w3id.org/dpv/risk/owl#LowLikelihood", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -3494,12 +3453,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3509,7 +3468,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3521,18 +3486,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Level where Likelihood is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:3 L:2)" + "@value": "Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -3557,7 +3528,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6f228adb05c443d496bdac1d6538a994" + "@id": "_:N2272c3af1d7c4f35878b97cbb8cca1c6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3567,80 +3538,65 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" + "@value": "Violation of Legal Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N6f228adb05c443d496bdac1d6538a994", + "@id": "_:N2272c3af1d7c4f35878b97cbb8cca1c6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#causedByThreat", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0047c87eef06445d9cdf9d7d8ebfd324" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3648,14 +3604,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -3665,48 +3613,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" - } - ] - }, - { - "@id": "_:N0047c87eef06445d9cdf9d7d8ebfd324", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "caused by threat" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveConsequence", + "@id": "https://w3id.org/dpv/risk/owl#Detriment", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-03-23" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3716,7 +3659,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3728,21 +3671,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Consequence i.e. prevents it from materialising" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Consequence" + "@value": "Detriment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowRisk", + "@id": "https://w3id.org/dpv/risk/owl#MonitorConsequence", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3753,12 +3696,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.25,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3768,13 +3706,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3786,58 +3718,73 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Low" + "@value": "Control that monitors a Risk Consequence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Monitor Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L2", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TR/html/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "Risk Concepts - HTML serialiation" + "@value": "0.22,xsd:decimal" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.html" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Low Risk (RM3x3 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -3848,12 +3795,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.75,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na5624c595653415e824cac1cae35b841" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3863,13 +3816,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3881,119 +3828,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is High" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", - "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Intentional Misuse" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Intentional Misuse" + "@value": "Sexual Violence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentHalted", + "@id": "_:Na5624c595653415e824cac1cae35b841", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Incident Halted" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", + "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2002/07/owl#ObjectProperty" ], "http://purl.org/dc/dcam/domainIncludes": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], "http://purl.org/dc/terms/created": [ @@ -4016,28 +3890,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the risk (subject) has the indicated risk source (object)" + "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has risk source" + "@value": "is exploited by" } ], "https://schema.org/domainIncludes": [ { - "@id": "https://w3id.org/dpv/owl#Risk" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalIncident", + "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoingReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -4055,54 +3929,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Accidental Incident" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3", - "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4114,18 +3941,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" + "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 3x3" + "@value": "Incident Ongoing Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Sabotage", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -4150,7 +3977,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5cd200693b5a4690bc1b18c36bb0a451" + "@id": "_:N7c1ceabcaad149f28fb40302094cf3a4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4160,13 +3987,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" }, { "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4178,37 +4005,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "_:N5cd200693b5a4690bc1b18c36bb0a451", + "@id": "_:N7c1ceabcaad149f28fb40302094cf3a4", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeAccess", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4230,7 +4057,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N27dce26f51994fea8988e93027e5ddfd" + "@id": "_:Nf44facc76ca548efac72ec065d8591cd" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4240,7 +4067,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4252,37 +4085,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "_:N27dce26f51994fea8988e93027e5ddfd", + "@id": "_:Nf44facc76ca548efac72ec065d8591cd", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L5", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4298,7 +4131,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.22,xsd:decimal" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4308,7 +4141,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4320,32 +4153,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:2 L:1)" + "@value": "High Risk (RM7x7 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Damage", + "@id": "https://w3id.org/dpv/risk/owl#RiskSource", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2024-02-14" } ], "http://purl.org/dc/terms/modified": [ @@ -4361,7 +4188,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4373,21 +4200,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorVulnerabilities", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L4", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4398,7 +4225,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4408,7 +4240,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4420,93 +4252,67 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Vulnerability" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Vulnerabilities" + "@value": "High Risk (RM5x5 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "https://w3id.org/dpv/risk/owl#causedByVulnerability", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://www.w3.org/TR/html/" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/primer" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspectedReport", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "accepted" + "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "A report describing the suspicion of an incident in the past or occuring" + "@value": "caused by vulnerability" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/rangeIncludes": [ { - "@language": "en", - "@value": "Incident Suspected Report" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowSeverity", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4520,6 +4326,11 @@ "@value": "2022-08-18" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.1,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4527,7 +4338,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4539,21 +4353,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" + "@value": "Level where Severity is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Risk Levels" + "@value": "Very Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L1", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4567,9 +4387,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.04,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nce763ffd88464838a749b691f0ba814e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4579,7 +4405,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4591,21 +4420,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels", + "@id": "_:Nce763ffd88464838a749b691f0ba814e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentHalted", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4616,7 +4461,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4626,7 +4471,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4638,23 +4483,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" + "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Likelihood Levels" + "@value": "Incident Halted" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Privacy", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -4662,7 +4512,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4671,17 +4521,23 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Incident where the confidentiality of information or system has been affected" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Privacy" + "@value": "Confidentiality Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L5", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -4696,15 +4552,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nd57e4c70c13c4e6ca8deb7d8c72e0ab0" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4714,7 +4564,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4726,34 +4576,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" - } - ] - }, - { - "@id": "_:Nd57e4c70c13c4e6ca8deb7d8c72e0ab0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very High Risk (RM5x5 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L1", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L1", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4772,7 +4606,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.02,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4782,7 +4616,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4794,31 +4628,44 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" + "@value": "Very Low Risk (RM5x5 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", + "@id": "https://w3id.org/dpv/risk/owl#Fee", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "DGA 2.10" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4826,35 +4673,35 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + "@value": "Something that acts as or provides fees e.g. for using a service" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is vulnerability of" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Fee" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L3", + "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -4868,9 +4715,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.36,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ncd20b2bc13904da294945c80012f45d5" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4880,7 +4733,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4892,18 +4745,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:3)" + "@value": "Psychological Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L5", + "@id": "_:Ncd20b2bc13904da294945c80012f45d5", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -4922,7 +4791,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.02,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4932,7 +4801,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -4944,43 +4813,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:5)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", + "@id": "https://w3id.org/dpv/risk/owl#IncidentAssessmentReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ncf23547c9a484637bcc93168e91c5691" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4990,10 +4842,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5005,37 +4854,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "A report describing the assessment of an incident in terms of its effects or impacts" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" - } - ] - }, - { - "@id": "_:Ncf23547c9a484637bcc93168e91c5691", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "Incident Assessment Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DetectionControl", + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ @@ -5063,26 +4896,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to detect event" + "@value": "Control that reduces the likelihood or severity of an event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detection Control" + "@value": "Reduction Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentHandlingReport", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L2", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5092,7 +4936,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5104,40 +4948,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Handling Report" + "@value": "Low Risk (RM5x5 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Georg P. Krog" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/title": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "Risk Concepts - Turtle serialiation" } ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#JudicialPenalty", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5145,10 +5003,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5160,38 +5015,36 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Re-Identification" + "@value": "Judicial Penalty" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5199,11 +5052,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -5213,49 +5061,46 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" + "@value": "exploits vulnerability" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/domainIncludes": [ { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk/owl#hasRiskSource", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/owl#Risk" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N48b854e63ef14c98a8ab82b4ad5581d1" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5263,14 +5108,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -5280,40 +5117,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" + "@value": "Indicates the risk (subject) has the indicated risk source (object)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "has risk source" } - ] - }, - { - "@id": "_:N48b854e63ef14c98a8ab82b4ad5581d1", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "https://schema.org/domainIncludes": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/owl#Risk" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L1", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5330,11 +5155,6 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5342,7 +5162,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5354,39 +5174,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" + "@value": "Risk Matrix 5x5" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L2", + "@id": "https://w3id.org/dpv/risk/owl#UserRisks", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.40,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -5394,7 +5198,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5406,36 +5210,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Concepts associated with risks that arise due to User or Human use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:2)" + "@value": "User Risks" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", + "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N341572353447495784d70c873b300d32" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5443,6 +5254,14 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -5452,28 +5271,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has threat source" + "@value": "Distributed Denial of Service Attack (DDoS)" } + ] + }, + { + "@id": "_:N341572353447495784d70c873b300d32", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/domainIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk/owl#LoseCredibility", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -5498,7 +5323,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6622757ba5c74cc185fbe71d83337e6b" + "@id": "_:Nc56cc965e12d4f8a86473ed790bd98d0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5508,16 +5333,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5529,48 +5345,65 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" + "@value": "Lose of Credibility" } ] }, { - "@id": "_:N6622757ba5c74cc185fbe71d83337e6b", + "@id": "_:Nc56cc965e12d4f8a86473ed790bd98d0", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", + "@id": "https://w3id.org/dpv/risk/owl#Incident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", "@value": "2024-02-14" + }, + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0070" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5580,7 +5413,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" + "@id": "https://w3id.org/dpv/owl#RiskConcept" + }, + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5592,74 +5428,85 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@value": "An actual or occured event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Assessment" + "@value": "Incident" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Incident is realised or materialised risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld", + "@id": "https://w3id.org/dpv/risk/owl#IncidentHandlingReport", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/TR/json-ld11/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/format": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "Risk Concepts - JSON-LD serialiation" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.jsonld" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@language": "en", + "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Handling Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", + "@id": "https://w3id.org/dpv/risk/owl#SamplingBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nee1e1ea5436e45f49bbc543deaaa2881" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5669,10 +5516,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5684,37 +5528,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Bias that occurs when data records are not collected randomly from the intended population" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" - } - ] - }, - { - "@id": "_:Nee1e1ea5436e45f49bbc543deaaa2881", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Sampling Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Blackmail", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5725,18 +5553,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N9366f8ffe19f4903ba26fd616cf61ec5" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5746,10 +5568,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5761,37 +5583,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "Level where Risk is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" - } - ] - }, - { - "@id": "_:N9366f8ffe19f4903ba26fd616cf61ec5", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Very High Risk" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5802,7 +5613,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5812,7 +5628,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/owl#Status" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5824,21 +5640,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Likelihood Levels from High to Low" + "@value": "Status associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Likelihood Levels" + "@value": "Incident Status" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L1", + "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspected", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5849,12 +5665,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5864,7 +5675,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5876,21 +5687,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:4 L:1)" + "@value": "Incident Suspected" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -5904,15 +5715,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N892cb8aa9dad44ccbe9e88a74e1576d1" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5922,10 +5727,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5937,53 +5739,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" - } - ] - }, - { - "@id": "_:N892cb8aa9dad44ccbe9e88a74e1576d1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "High Risk (RM5x5 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#DataProcessingBias", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.25,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5993,13 +5780,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6011,29 +5792,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Low" + "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Data Processing Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L4", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.49,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6041,7 +5832,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6053,72 +5844,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Societal Risk" + "@value": "Very High Risk (RM7x7 S:6 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasControl", + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0071" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Indicates the use of specified control" + "@value": "Risk Concepts - HTML serialiation" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "has control" + "@id": "https://w3id.org/dpv/risk/risk-owl.html" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#MaterialDamage", "@type": [ - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6129,12 +5900,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-03-30" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6144,13 +5916,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6162,27 +5928,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Moderate" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Likelihood" + "@value": "Material Damage" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L4", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6196,15 +5962,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N9db39f807c10412abc51d201d124e759" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6214,7 +5974,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6226,52 +5986,47 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" + "@value": "Low Risk (RM5x5 S:1 L:4)" } ] }, { - "@id": "_:N9db39f807c10412abc51d201d124e759", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L4", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#hasIncident", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@value": "0.16,xsd:decimal" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6283,26 +6038,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates an incident is associated with the specified context" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has incident" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@value": "Low Risk (RM7x7 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6316,15 +6066,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N3415c4ca116d4f3a915110e560d5a364" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6334,10 +6078,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6349,37 +6090,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" - } - ] - }, - { - "@id": "_:N3415c4ca116d4f3a915110e560d5a364", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Moderate Risk (RM7x7 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighRisk", + "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoing", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6390,12 +6115,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6405,7 +6125,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6417,24 +6137,70 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely High" + "@value": "The incident is ongoing i.e. still active" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk" + "@value": "Incident Ongoing" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L7", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.71,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely High Risk (RM7x7 S:5 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk/owl#DataBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -6459,7 +6225,15 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nbfd3027ac8ad4b9d9258659777a2e3c6" + "@id": "_:Nab5c54b7fa1f4b298dba1eea5aac93db" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" + }, + { + "@id": "https://w3id.org/dpv/examples/owl#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6468,11 +6242,17 @@ } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6484,18 +6264,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" + "@value": "Data Breach" } ] }, { - "@id": "_:Nbfd3027ac8ad4b9d9258659777a2e3c6", + "@id": "_:Nab5c54b7fa1f4b298dba1eea5aac93db", "@type": [ "https://schema.org/WebPage" ], @@ -6511,21 +6291,27 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskManagement", + "@id": "https://w3id.org/dpv/risk/owl#InGroupBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6535,7 +6321,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6547,39 +6333,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" + "@value": "In-Group Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAssessment", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N5faf38fbf04547d78ccaa2b8c1043b41" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6587,7 +6357,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6599,57 +6369,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix" + "@value": "Reputational Risk" } ] }, { - "@id": "_:N5faf38fbf04547d78ccaa2b8c1043b41", + "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "IEC 31010:2019" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#isExploitedBy", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@id": "_:N9f3682987581455e985c74cb431bb163" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6661,33 +6427,56 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is exploited by" + "@value": "Illegal Data Processing" } ], - "https://schema.org/domainIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@language": "en", + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } + ] + }, + { + "@id": "_:N9f3682987581455e985c74cb431bb163", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", + "@id": "https://w3id.org/dpv/risk/owl#ShareRisk", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6695,7 +6484,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6707,21 +6496,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" + "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Legal Risk" + "@value": "Share Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L5", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6732,12 +6521,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.9,xsd:decimal" + "@value": "0.51,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6747,10 +6536,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6762,27 +6548,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Very High Risk (RM7x7 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L7", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L3", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -6798,7 +6578,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.86,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6808,7 +6588,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6820,31 +6600,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:7)" + "@value": "Very Low Risk (RM5x5 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#causedByVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#CrossBorderIncident", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6852,6 +6627,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -6861,31 +6641,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + "@value": "Incident involving cross-border or multiple jurisdictions" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Cross-Border Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CrossBorderIncident", + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6895,7 +6676,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6907,23 +6688,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident involving cross-border or multiple jurisdictions" + "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cross-Border Incident" + "@value": "7 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualHealthSafety", + "@id": "https://w3id.org/dpv/risk/owl#MonitorImpact", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -6931,7 +6723,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6940,40 +6732,29 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that monitors a Risk Impact" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Health & Safety" + "@value": "Monitor Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Extorsion", + "@id": "https://w3id.org/dpv/risk/owl#DeliberateIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N71dc264e6f594f138f1ef30a701d2c4c" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6983,10 +6764,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6998,38 +6776,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "Incident caused due to deliberate actions of a human" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Deliberate Incident" } ] }, { - "@id": "_:N71dc264e6f594f138f1ef30a701d2c4c", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L5", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.40,xsd:decimal" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -7038,10 +6816,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7049,12 +6824,24 @@ "@language": "en", "@value": "accepted" } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "High Risk (RM5x5 S:2 L:5)" + } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L6", + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -7066,12 +6853,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.49,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7081,7 +6863,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#Likelihood" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7093,20 +6875,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Scale with 3 Likelihood Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:6)" + "@value": "3 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L3", "@type": [ - "https://w3id.org/dpv/owl#Severity", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -7118,7 +6900,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7128,7 +6915,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7140,21 +6927,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Severity Levels from High to Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Severity Levels" + "@value": "High Risk (RM7x7 S:7 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#IncidentNearMiss", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7165,12 +6952,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7180,7 +6962,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7192,24 +6974,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely Low" + "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Incident Near Miss" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DeliberateIncident", + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalIncident", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -7239,21 +7015,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to deliberate actions of a human" + "@value": "Incident caused due to environmental factors outside human controls" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Deliberate Incident" + "@value": "Environmental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L4", + "@id": "https://w3id.org/dpv/risk/owl#RemoveSource", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7264,12 +7040,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.32,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7279,7 +7050,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7291,21 +7062,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Control that removes the risk source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:4)" + "@value": "Remove Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MalwareAttack", + "@id": "https://w3id.org/dpv/risk/owl#ModerateRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7316,18 +7087,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N03874414264842fc8cc46cf8f23f6b61" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7337,16 +7102,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7358,50 +7120,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Level where Risk is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" - } - ] - }, - { - "@id": "_:N03874414264842fc8cc46cf8f23f6b61", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "Moderate Risk" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ChangeImpact", + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7409,7 +7150,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7421,21 +7162,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Impact" + "@value": "Things that cause or have the potential to impact financial resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Impact" + "@value": "Financial Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedCodeDeletion", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L5", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7449,15 +7190,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Na99643aeefed4bbaad265b5261f04adf" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7467,13 +7202,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7485,37 +7214,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" - } - ] - }, - { - "@id": "_:Na99643aeefed4bbaad265b5261f04adf", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "Extremely High Risk (RM7x7 S:7 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7526,18 +7239,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Necd21215d3724524b55f6804c7b1ff4e" + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7547,10 +7254,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7562,44 +7269,29 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Level where Risk is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" - } - ] - }, - { - "@id": "_:Necd21215d3724524b55f6804c7b1ff4e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Very Low Risk" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentIdentifier", + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7607,7 +7299,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7619,21 +7311,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identifier associated with an incident" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Identifier" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7644,12 +7336,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7659,7 +7351,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7671,27 +7363,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowSeverity", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7717,7 +7403,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7729,13 +7415,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely Low" + "@value": "Level where Severity is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Likelihood" + "@value": "Extremely Low Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -7746,23 +7432,12 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRisk", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedActivity", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7770,7 +7445,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7782,39 +7466,23 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk" + "@value": "Something that acts as or causes Unauthorised Activity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk" + "@value": "Unauthorised Activity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L5", + "@id": "https://w3id.org/dpv/risk/owl#JudicialCosts", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.61,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -7822,7 +7490,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7834,20 +7502,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Something that involves or causes judicial costs to be paid" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:5)" + "@value": "Judicial Costs" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigated", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L1", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -7859,7 +7527,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7869,7 +7542,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7881,21 +7554,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigated" + "@value": "Very Low Risk (RM5x5 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowRisk", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -7906,18 +7579,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Ncf0b963177f841d1b3face4fc3ba47e1" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7927,10 +7594,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -7942,48 +7606,44 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Level where Risk is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" - } - ] - }, - { - "@id": "_:Ncf0b963177f841d1b3face4fc3ba47e1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Landscape 2021" + "@value": "Extremely Low Risk" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReduceSeverity", + "@id": "https://w3id.org/dpv/risk/owl#NonResponseBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7993,7 +7653,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + "@id": "https://w3id.org/dpv/risk/owl#SelectionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8005,66 +7665,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the severity of an event" + "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Severity" + "@value": "Non-Response Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RecoveryControl", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L7", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Control to recover from event" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Recovery Control" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ModerateSeverity", - "@type": [ - "https://w3id.org/dpv/owl#Severity", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/contributor": [ { "@value": "Harshvardhan J. Pandit" } @@ -8072,12 +7690,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.5,xsd:decimal" + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8087,13 +7705,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8105,27 +7717,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Moderate Risk (RM7x7 S:2 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#AuthorisationFailure", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8147,7 +7753,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0dc4e9d552fa49a791201e58b8357c78" + "@id": "_:Nf54ab9e109634d149cb207471dd2ffc5" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8157,10 +7763,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" }, { "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8172,40 +7781,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "Authorisation Failure" } ] }, { - "@id": "_:N0dc4e9d552fa49a791201e58b8357c78", + "@id": "_:Nf54ab9e109634d149cb207471dd2ffc5", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISa Trust Services Security Incidents 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L3", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -8224,7 +7827,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8246,26 +7849,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:3)" + "@value": "High Risk (RM5x5 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentPreliminaryReport", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L1", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8275,7 +7889,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8287,20 +7901,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Preliminary Report" + "@value": "Moderate Risk (RM3x3 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityIncident", + "@id": "https://w3id.org/dpv/risk/owl#DetectionControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ @@ -8316,7 +7931,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8328,37 +7943,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the availability of information or system has been affected" + "@value": "Control to detect event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Availability Incident" + "@value": "Detection Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L1", + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.12,xsd:decimal" + "@language": "en", + "@value": "ISO 20501:2019" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8368,7 +7984,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8380,21 +7996,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:6 L:1)" + "@value": "Statistical Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ChangeConsequence", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8405,7 +8021,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8415,7 +8036,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8427,23 +8048,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Consequence" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Consequence" + "@value": "High Risk (RM3x3 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", + "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspectedReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8451,10 +8077,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8466,27 +8089,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "A report describing the suspicion of an incident in the past or occuring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "Incident Suspected Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L1", + "@id": "https://w3id.org/dpv/risk/owl#Blackmail", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8500,9 +8117,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.10,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8bc9357378f0418c87e2c89b8f5a58b6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8512,7 +8135,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8524,52 +8150,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:5 L:1)" + "@value": "Blackmail" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "_:N8bc9357378f0418c87e2c89b8f5a58b6", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Guides for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/guides" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L1", + "@id": "https://w3id.org/dpv/risk/owl#Damage", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8580,12 +8191,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8595,7 +8207,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8607,18 +8219,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:3 L:1)" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", + "@id": "https://w3id.org/dpv/risk/owl#BruteForceAuthorisations", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -8626,13 +8238,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -8641,6 +8253,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc28ea8a295b445aca739a464f287a77a" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8648,10 +8265,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" @@ -8660,27 +8283,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Limitation of Rights" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" + "@value": "Brute Force Authorisations" + } + ] + }, + { + "@id": "_:Nc28ea8a295b445aca739a464f287a77a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L6", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L1", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8696,7 +8329,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.73,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8706,7 +8339,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8718,21 +8351,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:6)" + "@value": "Low Risk (RM5x5 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L7", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8743,7 +8376,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8753,7 +8391,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8765,20 +8403,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Source" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Source Control" + "@value": "Very High Risk (RM7x7 S:4 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveImpact", + "@id": "https://w3id.org/dpv/risk/owl#ModerateSeverity", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -8790,7 +8428,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8800,7 +8443,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8812,32 +8461,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Impact i.e. prevents it from materialising" + "@value": "Level where Severity is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Impact" + "@value": "Moderate Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://purl.org/dc/terms/modified": [ @@ -8846,11 +8501,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N5ee0d7c3985247d790e452d1e55314af" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8858,7 +8508,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8870,37 +8520,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Something that acts as or causes Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" - } - ] - }, - { - "@id": "_:N5ee0d7c3985247d790e452d1e55314af", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Prevent Exercising of Rights" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L6", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -8916,7 +8556,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8938,23 +8578,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:2 L:3)" + "@value": "Very High Risk (RM7x7 S:4 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.37,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -8962,7 +8618,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -8974,18 +8630,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "User Risks" + "@value": "High Risk (RM7x7 S:6 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PsychologicalHarm", + "@id": "https://w3id.org/dpv/risk/owl#Reward", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -8993,13 +8649,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -9008,11 +8664,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0c2266c1ab8c4a7cb0fa518b03d31135" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -9020,7 +8671,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9032,42 +8683,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" + "@value": "Reward" } ] }, { - "@id": "_:N0c2266c1ab8c4a7cb0fa518b03d31135", + "@id": "https://w3id.org/dpv/risk/owl#PhishingScam", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#Threat", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2efc2f4438a54dda98fe4b524a7e2ec9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9077,7 +8729,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9089,21 +8744,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk source event which causes Risk" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat" + "@value": "Phishing Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L2", + "@id": "_:N2efc2f4438a54dda98fe4b524a7e2ec9", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L3", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9119,7 +8790,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9129,7 +8800,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9141,44 +8812,78 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:5 L:2)" + "@value": "High Risk (RM5x5 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk/owl#hasThreatSource", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Threat" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the threat (subject) has the indicated source (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "has threat source" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Threat" + } + ], + "https://schema.org/rangeIncludes": [ { - "@id": "_:Nf6cd2565fc384042b628c5975a2b07c1" + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -9202,40 +8907,116 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Something that acts as or causes Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" + "@value": "Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "_:Nf6cd2565fc384042b628c5975a2b07c1", + "@id": "https://w3id.org/dpv/risk/owl#ReduceSeverity", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that reduces the severity of an event" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Reduce Severity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk/owl#ComponentFailure", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", "@type": [ "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9260,7 +9041,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ndedca3b0c6384342a3aa4083c53dcf74" + "@id": "_:N1c8ddcb560fa424ca1fe76db29a31820" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9270,10 +9051,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9285,18 +9063,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "_:Ndedca3b0c6384342a3aa4083c53dcf74", + "@id": "_:N1c8ddcb560fa424ca1fe76db29a31820", "@type": [ "https://schema.org/WebPage" ], @@ -9312,26 +9090,27 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L4", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedReidentification", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.08,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9341,7 +9120,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9353,38 +9135,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Something that acts as or causes Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:4)" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Detriment", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighSeverity", "@type": [ + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9394,7 +9175,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9406,21 +9187,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Level where Severity is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Extremely High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#ModerateLikelihood", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#Likelihood", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9436,7 +9223,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.9,xsd:decimal" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9446,10 +9233,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" }, { "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9461,24 +9251,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very High" + "@value": "Level where Likelihood is Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Likelihood" + "@value": "Moderate Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Coercion", + "@id": "https://w3id.org/dpv/risk/owl#SystemIntrusion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -9503,7 +9293,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3bc2fdc2ddce4051bfcb2a546f54f552" + "@id": "_:Na8ee3a054aaf49f89103a7f1af68d1c7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9515,6 +9305,12 @@ { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" } @@ -9528,37 +9324,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" + "@value": "System Intrusion" } ] }, { - "@id": "_:N3bc2fdc2ddce4051bfcb2a546f54f552", + "@id": "_:Na8ee3a054aaf49f89103a7f1af68d1c7", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L1", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9574,7 +9370,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9584,7 +9380,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9596,21 +9392,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:5)" + "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl", + "@id": "https://w3id.org/dpv/risk/owl#Extorsion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9621,43 +9417,73 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "_:Nb72f9b0d54644d6ab338feaa339c1f40" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Consequences" + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Consequence Control" + "@value": "Extorsion" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L1", + "@id": "_:Nb72f9b0d54644d6ab338feaa339c1f40", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ViolatingContractualObligation", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9671,9 +9497,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.04,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nd579b76a185748d39a9c8fd295a32c6b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9683,51 +9515,56 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:1)" + "@value": "Violation of Contractual Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", + "@id": "_:Nd579b76a185748d39a9c8fd295a32c6b", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -9736,7 +9573,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9745,21 +9582,15 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Physical Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -9784,7 +9615,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N52bb23017ca543f68135684c023c7974" + "@id": "_:N25ef844a62984a848306d378b71152be" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9794,36 +9625,30 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" + "@value": "Lose of Reputation" } ] }, { - "@id": "_:N52bb23017ca543f68135684c023c7974", + "@id": "_:N25ef844a62984a848306d378b71152be", "@type": [ "https://schema.org/WebPage" ], @@ -9839,26 +9664,27 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L1", + "@id": "https://w3id.org/dpv/risk/owl#ConfirmationBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.11,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9868,7 +9694,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9880,21 +9706,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:1)" + "@value": "Confirmation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Reidentification", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L2", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9905,13 +9731,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9921,10 +9746,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9936,27 +9758,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Re-identification" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Re-identification" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + "@value": "Moderate Risk (RM7x7 S:6 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoing", + "@id": "https://w3id.org/dpv/risk/owl#HighLikelihood", "@type": [ - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -9967,7 +9783,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9977,7 +9798,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#3LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9989,37 +9816,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident is ongoing i.e. still active" + "@value": "Level where Likelihood is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing" + "@value": "High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryLowRisk", + "@id": "https://w3id.org/dpv/risk/owl#IncidentDetectionReport", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.1,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10029,10 +9851,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10044,24 +9863,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very Low" + "@value": "A report describing the detection of a Incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "Incident Detection Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -10080,7 +9893,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.33,xsd:decimal" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10090,7 +9903,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10102,21 +9915,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:3 L:1)" + "@value": "Low Risk (RM7x7 S:7 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L5", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10127,7 +9940,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10137,7 +9955,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10149,21 +9967,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Severity Levels from Very High to Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Severity Levels" + "@value": "Low Risk (RM5x5 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L4", + "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10177,9 +9995,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.48,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf35def6f3fcb44a2820a83d08bc67c28" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10189,7 +10013,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10201,21 +10028,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:3 L:4)" + "@value": "Identity Theft" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentSuspected", + "@id": "_:Nf35def6f3fcb44a2820a83d08bc67c28", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Harm", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10226,7 +10069,13 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-13" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10236,7 +10085,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10248,37 +10097,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected" + "@value": "Harm" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighRisk", + "@id": "https://w3id.org/dpv/risk/owl#hasIncident", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.75,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10286,17 +10135,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -10306,33 +10144,49 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is High" + "@value": "Indicates an incident is associated with the specified context" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk" + "@value": "has incident" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/rangeIncludes": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@id": "https://w3id.org/dpv/risk/owl#Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#Likelihood" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -10342,21 +10196,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" + "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Risk" + "@value": "7 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L2", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataDisclosure", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10370,9 +10224,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N67d2f9f89fab439b8d5965d26bb49159" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10382,7 +10242,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10394,63 +10257,65 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:2)" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ComponentMalfunction", + "@id": "_:N67d2f9f89fab439b8d5965d26bb49159", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "https://schema.org/url": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/primer", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "accepted" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@value": "Primer for Data Privacy Vocabulary" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@language": "en", - "@value": "Component Malfunction" + "@id": "https://w3id.org/dpv/primer" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -10475,7 +10340,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7f82aff987014e1ea5c58f22175420d4" + "@id": "_:N39150275e13e448ba6b444f5156835f5" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10485,7 +10350,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10497,18 +10365,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" + "@value": "Confidentiality Breach" } ] }, { - "@id": "_:N7f82aff987014e1ea5c58f22175420d4", + "@id": "_:N39150275e13e448ba6b444f5156835f5", "@type": [ "https://schema.org/WebPage" ], @@ -10524,10 +10392,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L4", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10541,9 +10409,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.16,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb78ad830eb9c4d65a06a2a0dac398849" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10553,32 +10427,54 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:4)" + "@value": "Violation of Statutory Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L3", + "@id": "_:Nb78ad830eb9c4d65a06a2a0dac398849", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatusUnknown", + "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -10590,12 +10486,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10605,7 +10496,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10617,163 +10508,99 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "The status of a incident is unknown" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:3)" + "@value": "Incident Status Unknown" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Fee", + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "DGA 2.10" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides fees e.g. for using a service" + "@value": "Scale with 3 Risk Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "3 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SystemFailure", + "@id": "https://w3id.org/dpv/examples", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nb9e5507b40ed49e8b865a65f8fdb49f6" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@id": "https://www.w3.org/TR/html/" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/format": [ { - "@language": "en", - "@value": "System Failure" + "@id": "https://www.iana.org/assignments/media-types/text/html" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "Examples for Data Privacy Vocabulary" } - ] - }, - { - "@id": "_:Nb9e5507b40ed49e8b865a65f8fdb49f6", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@id": "https://w3id.org/dpv/examples" } ], - "https://schema.org/url": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ModerateRisk", + "@id": "https://w3id.org/dpv/risk/owl#ChangeConsequence", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10784,12 +10611,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.5,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10799,13 +10621,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10817,27 +10633,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Moderate" + "@value": "Control that changes Consequence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Change Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L6", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10853,7 +10663,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.73,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10863,7 +10673,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10875,26 +10685,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:2)" + "@value": "Extremely High Risk (RM7x7 S:6 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalIncident", + "@id": "https://w3id.org/dpv/risk/owl#IncidentConcluded", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10904,7 +10720,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10916,21 +10732,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to environmental factors outside human controls" + "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Incident" + "@value": "Incident Concluded" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L5", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -10944,15 +10760,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nf99c4629935348c3ab720d412cc821d6" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10962,10 +10772,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Impact" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10977,43 +10784,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Nf99c4629935348c3ab720d412cc821d6", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Very High Risk (RM5x5 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L7", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11024,7 +10809,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11034,7 +10824,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Likelihood" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11046,21 +10836,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Likelihood Levels" + "@value": "Extremely High Risk (RM7x7 S:6 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L5", + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11071,12 +10861,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.60,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11086,7 +10871,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/owl#RiskLevel" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11098,18 +10883,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Scale with 5 Risk Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:3 L:5)" + "@value": "5 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -11134,7 +10919,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N4ad558cee41543b9a32f4383ffa13ff1" + "@id": "_:Nef4bef8d59b941d3948be26790d5a59f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11144,13 +10929,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11162,34 +10944,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Unauthorised Code Disclosure" } ] }, { - "@id": "_:N4ad558cee41543b9a32f4383ffa13ff1", + "@id": "_:Nef4bef8d59b941d3948be26790d5a59f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigationMeasure", + "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -11197,7 +10979,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11207,7 +10989,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11219,21 +11001,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" + "@value": "Source of threat event, including both agent and non-agent sources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigation Measure" + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L3", + "@id": "https://w3id.org/dpv/risk/owl#HighRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11244,12 +11026,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11259,110 +11041,42 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:3)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingLegalObligation", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc1edbcb00b7d4eb2a3a0901453f81dd2" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + }, { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + }, { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Level where Risk is High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" + "@value": "High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Nc1edbcb00b7d4eb2a3a0901453f81dd2", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemedyControl", + "@id": "https://w3id.org/dpv/risk/owl#ContainmentControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", @@ -11393,21 +11107,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to remedy consequences of event" + "@value": "Control to contain event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remedy Control" + "@value": "Containment Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L3", + "@id": "https://w3id.org/dpv/risk/owl#LoseGoodwill", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11421,9 +11135,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.06,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N20794ebbd2e449b2942f8e678d291698" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11433,7 +11153,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11445,37 +11165,42 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" + "@value": "Lose of Goodwill" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L4", + "@id": "_:N20794ebbd2e449b2942f8e678d291698", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigationMeasure", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.57,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11485,7 +11210,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11497,37 +11222,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:7 L:4)" + "@value": "Incident Mitigation Measure" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L7", + "@id": "https://w3id.org/dpv/risk/owl#RuleBasedSystemDesign", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.57,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11537,7 +11263,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11549,20 +11275,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:7)" + "@value": "Rule-Based System Design" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RemoveSource", + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -11574,7 +11306,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11584,7 +11316,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11596,23 +11328,28 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes the risk source" + "@value": "Scale with 5 Severity Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Source" + "@value": "5 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityAttack", + "@id": "https://w3id.org/dpv/risk/owl#IncidentNotice", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -11620,16 +11357,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/owl#Notice" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11641,21 +11369,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "Notice associated with an Incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Incident Notice" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L1", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L4", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11671,7 +11399,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11681,7 +11409,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11693,18 +11421,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:2 L:1)" + "@value": "Very High Risk (RM7x7 S:7 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -11729,7 +11457,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd9cbf002fd5a43f29d232510925095c4" + "@id": "_:Nb1e4985890f24fbab83393e2ff718b69" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11739,16 +11467,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11760,18 +11485,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "_:Nd9cbf002fd5a43f29d232510925095c4", + "@id": "_:Nb1e4985890f24fbab83393e2ff718b69", "@type": [ "https://schema.org/WebPage" ], @@ -11787,7 +11512,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseReputation", + "@id": "https://w3id.org/dpv/risk/owl#CopyrightViolation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -11812,7 +11537,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Naab93be2fe814b5494d7706349d86ffa" + "@id": "_:N127f18629c20469393a6ea549f6434c3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11822,7 +11547,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11834,42 +11559,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" + "@value": "Copyright Violation" } ] }, { - "@id": "_:Naab93be2fe814b5494d7706349d86ffa", + "@id": "_:N127f18629c20469393a6ea549f6434c3", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentDetectionReport", + "@id": "https://w3id.org/dpv/risk/owl#VeryLowLikelihood", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.1,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11879,7 +11615,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11891,21 +11630,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the detection of a Incident" + "@value": "Level where Likelihood is Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Detection Report" + "@value": "Very Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HighSeverity", + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#LowSeverity", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11921,7 +11693,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.75,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11931,13 +11703,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11949,27 +11721,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is High" + "@value": "Level where Severity is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Severity" + "@value": "Low Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L4", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L4", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -11985,7 +11757,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.49,xsd:decimal" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11995,7 +11767,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12007,21 +11779,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:4)" + "@value": "Moderate Risk (RM5x5 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L3", + "@id": "https://w3id.org/dpv/risk/owl#Cryptojacking", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12035,9 +11807,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.67,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N37489c12dfc848018493bc0b4ca8a3a2" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12047,7 +11825,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12059,37 +11840,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:2 L:3)" + "@value": "Cryptojacking" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L5", + "@id": "_:N37489c12dfc848018493bc0b4ca8a3a2", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Landscape 2021" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RightsLimitation", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.20,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12099,7 +11897,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12111,37 +11909,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Something that acts as or causes Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:5)" + "@value": "Limitation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L4", + "@id": "https://w3id.org/dpv/risk/owl#IncidentIdentifier", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.33,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12151,7 +11944,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12163,23 +11956,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" + "@value": "Identifier associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:4)" + "@value": "Incident Identifier" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L4", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.24,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -12187,7 +11996,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12199,21 +12008,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Impact" + "@value": "Moderate Risk (RM7x7 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowRisk", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L6", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12224,12 +12033,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.01,xsd:decimal" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12239,7 +12048,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12251,27 +12060,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "High Risk (RM7x7 S:3 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L5", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12285,15 +12088,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N913a7208f24c44bda9e7b088de9284a6" + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12303,7 +12100,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12315,37 +12112,51 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "High Risk (RM7x7 S:4 L:5)" } ] }, { - "@id": "_:N913a7208f24c44bda9e7b088de9284a6", + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that affect or have the potential to affect specific individuals" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskSource", + "@id": "https://w3id.org/dpv/risk/owl#LoseTrust", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12356,20 +12167,31 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "_:N12b3cae72c654fbba38a4121d80d0971" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" @@ -12378,43 +12200,48 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Source" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk Source" + "@value": "Lose of Trust" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#DistributedDenialServiceAttack", + "@id": "_:N12b3cae72c654fbba38a4121d80d0971", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels", + "@type": [ + "https://w3id.org/dpv/owl#Severity", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/contributor": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "_:N5c7b07cae062490cae46d699caf36ed7" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12424,10 +12251,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12439,37 +12263,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Scale with 3 Severity Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" - } - ] - }, - { - "@id": "_:N5c7b07cae062490cae46d699caf36ed7", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "3 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskControl", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12480,18 +12288,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N46071c56632d48699e134320440c38d8" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12501,10 +12298,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12516,37 +12310,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Control that monitors another Control" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" - } - ] - }, - { - "@id": "_:N46071c56632d48699e134320440c38d8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Monitor Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L3", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12557,13 +12335,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12573,7 +12350,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12585,27 +12362,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "Moderate Risk (RM3x3 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L1", + "@id": "https://w3id.org/dpv/risk/owl#LowRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12616,12 +12387,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.20,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12631,7 +12402,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12643,21 +12420,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Level where Risk is Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:5 L:1)" + "@value": "Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyLowLikelihood", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12671,6 +12454,11 @@ "@value": "2022-08-18" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.01,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -12678,7 +12466,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12690,32 +12478,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Risk Levels from Very High to Very Low" + "@value": "Level where Likelihood is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Risk Levels" + "@value": "Extremely Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels", + "@id": "https://w3id.org/dpv/risk/owl#IncidentPreliminaryReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12725,7 +12513,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#Severity" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12737,18 +12525,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" + "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Severity Levels" + "@value": "Incident Preliminary Report" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RightsExercisePrevention", + "@id": "https://w3id.org/dpv/risk/owl#Misuse", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -12756,13 +12544,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-06-11" } ], "http://purl.org/dc/terms/modified": [ @@ -12778,7 +12566,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12790,44 +12578,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Prevent Exercising of Rights" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + "@value": "Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Discrimination", + "@id": "https://w3id.org/dpv/risk/owl#ChangeImpact", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12837,7 +12613,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12849,21 +12625,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Discrimination" + "@value": "Control that changes Impact" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Change Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L7", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighRisk", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12874,7 +12650,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ @@ -12889,7 +12665,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12901,31 +12677,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Level where Risk is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:7)" + "@value": "Extremely High Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L4", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.33,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12937,21 +12735,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "External Security Threat" + "@value": "High Risk (RM7x7 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LowSeverity", + "@id": "https://w3id.org/dpv/risk/owl#Scam", "@type": [ - "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -12962,12 +12760,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.25,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N755a8b0a576543d3877fe747628c7919" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12977,13 +12781,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12995,27 +12796,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Low" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Severity" + "@value": "Scam" } + ] + }, + { + "@id": "_:N755a8b0a576543d3877fe747628c7919", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L2", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L1", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13031,7 +12842,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.22,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13041,7 +12852,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13053,19 +12864,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:2)" + "@value": "Low Risk (RM5x5 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentImpactAssessment", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L2", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -13077,7 +12889,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13087,7 +12904,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#ImpactAssessment" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13099,21 +12916,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An impact assessment associated with a incident" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Impact Assessment" + "@value": "Moderate Risk (RM7x7 S:7 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L6", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13127,6 +12944,11 @@ "@value": "2022-08-17" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.61,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -13134,7 +12956,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13146,18 +12968,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 5x5" + "@value": "Extremely High Risk (RM7x7 S:5 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Spoofing", + "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -13182,10 +13004,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncde3f9ef14924e6eb724e4ba1ac0ba22" - }, - { - "@id": "_:N05fc65d1c1bd409d867c9c4d2a8ae1de" + "@id": "_:N122614f9d61546d49ba0e04b92558751" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13195,16 +13014,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13216,34 +13026,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" - } - ] - }, - { - "@id": "_:Ncde3f9ef14924e6eb724e4ba1ac0ba22", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "_:N05fc65d1c1bd409d867c9c4d2a8ae1de", + "@id": "_:N122614f9d61546d49ba0e04b92558751", "@type": [ "https://schema.org/WebPage" ], @@ -13259,10 +13053,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L4", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L7", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13278,7 +13072,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13300,21 +13094,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:4)" + "@value": "Low Risk (RM7x7 S:1 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#SexualViolence", + "@id": "https://w3id.org/dpv/risk/owl#ExtremelyHighLikelihood", "@type": [ + "https://w3id.org/dpv/owl#Likelihood", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13325,18 +13119,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N2c2797b2d2814ac4b88d4fe007d95c73" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13346,7 +13134,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#7LikelihoodLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13358,53 +13146,44 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Level where Likelihood is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" - } - ] - }, - { - "@id": "_:N2c2797b2d2814ac4b88d4fe007d95c73", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Extremely High Likelihood" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S1L3", + "@id": "https://w3id.org/dpv/risk/owl#Payment", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.33,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13414,7 +13193,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13426,21 +13205,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:1 L:3)" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/risk/owl#EquipmentMalfunction", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13462,7 +13241,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N30989a8f2dde48dca1fdb1fce2fde24a" + "@id": "_:N95637668b675461d9d1c70e1c8be8586" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13472,7 +13251,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13484,18 +13266,24 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" + "@value": "Equipment Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N30989a8f2dde48dca1fdb1fce2fde24a", + "@id": "_:N95637668b675461d9d1c70e1c8be8586", "@type": [ "https://schema.org/WebPage" ], @@ -13511,7 +13299,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk/owl#Benefit", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -13519,13 +13307,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], "http://purl.org/dc/terms/modified": [ @@ -13534,11 +13322,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N120896e83e7a494baca35f01fd1497ac" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -13546,13 +13329,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13564,68 +13341,101 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Benefit" } ] }, { - "@id": "_:N120896e83e7a494baca35f01fd1497ac", + "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } - ] - }, - { - "@id": "https://w3id.org/dpv/examples", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://www.w3.org/TR/html/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://www.iana.org/assignments/media-types/text/html" + "@id": "_:Nbad0a27eb07e4428a3a5c2e24515e416" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Examples for Data Privacy Vocabulary" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/examples" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Exposure to Harmful Speech" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L6", + "@id": "_:Nbad0a27eb07e4428a3a5c2e24515e416", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13639,9 +13449,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.86,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N62b691f43380412c8a12872ca763719c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13651,7 +13467,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13663,26 +13479,59 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + "@value": "Erroneous System Use" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentConcludingReport", + "@id": "_:N62b691f43380412c8a12872ca763719c", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataCorruption", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb67e1cacb9d546a69a306d5c1e8456d9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13692,39 +13541,80 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluding Report" + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl", + "@id": "_:Nb67e1cacb9d546a69a306d5c1e8456d9", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N27860d33acdb4a848f2b279c6f777606" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13734,49 +13624,64 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood or severity of an event" + "@value": "Something that acts as or causes Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduction Control" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L6", + "@id": "_:N27860d33acdb4a848f2b279c6f777606", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RecoveryControl", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.61,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13786,7 +13691,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13798,32 +13703,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Control to recover from event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:6)" + "@value": "Recovery Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl", + "@id": "https://w3id.org/dpv/risk/owl#RequirementsBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13833,7 +13744,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13845,27 +13756,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that uses controls to monitor events" + "@value": "Bias that occurs in or during requirements creation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Requirements Bias" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." + "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L2", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L2", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13881,7 +13792,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13903,21 +13814,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:2 L:2)" + "@value": "Moderate Risk (RM5x5 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatusUnknown", + "@id": "https://w3id.org/dpv/risk/owl#RiskAnalysis", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13928,7 +13838,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na877a19c74e2458baac027fd4dcf4457" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13938,7 +13853,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13950,21 +13865,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The status of a incident is unknown" + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status Unknown" + "@value": "Risk Analysis" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L6", + "@id": "_:Na877a19c74e2458baac027fd4dcf4457", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L1", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -13980,7 +13911,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14002,20 +13933,20 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:6)" + "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L5", + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -14027,12 +13958,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14042,7 +13968,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/owl#Severity" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14054,26 +13980,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" + "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:5)" + "@value": "7 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskSource", + "@id": "https://w3id.org/dpv/risk/owl#Spoofing", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -14082,6 +14014,14 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2cdfbe07952b4ea9847ac6e4cc259d4e" + }, + { + "@id": "_:N0050e9c8fb8e444391c01a99db38961a" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -14089,7 +14029,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14101,69 +14050,50 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "Spoofing" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus", + "@id": "_:N2cdfbe07952b4ea9847ac6e4cc259d4e", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/owl#Status" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "_:N0050e9c8fb8e444391c01a99db38961a", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Status associated with an incident" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Incident Status" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#Fraud", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -14188,7 +14118,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7d02088c4d08486489d3d220523edc6a" + "@id": "_:Na49aef6e701446fe912e1e7c19c0f7f0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14198,10 +14128,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14213,54 +14143,54 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" + "@value": "Fraud" } ] }, { - "@id": "_:N7d02088c4d08486489d3d220523edc6a", + "@id": "_:Na49aef6e701446fe912e1e7c19c0f7f0", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Compensation", + "@id": "https://w3id.org/dpv/risk/owl#DataBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14270,7 +14200,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + "@id": "https://w3id.org/dpv/risk/owl#Bias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14282,43 +14212,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "Data Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Injury", + "@id": "https://w3id.org/dpv/risk/owl#OutGroupHomogeneityBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N11ef6111bd434368998efddbfabd98b2" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14328,7 +14253,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#CognitiveBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14340,37 +14265,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" - } - ] - }, - { - "@id": "_:N11ef6111bd434368998efddbfabd98b2", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Out-Group Homogeneity Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedSystemAccess", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14392,7 +14301,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5d034c9d7907485f93dfa97a87822b46" + "@id": "_:N66f90f2dfdfb46e087830f6c7a2c3ad0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14402,16 +14311,13 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14423,18 +14329,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Something that acts as or causes Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" + "@value": "Unauthorised System Access" } ] }, { - "@id": "_:N5d034c9d7907485f93dfa97a87822b46", + "@id": "_:N66f90f2dfdfb46e087830f6c7a2c3ad0", "@type": [ "https://schema.org/WebPage" ], @@ -14450,28 +14356,12 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L4", + "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -14479,7 +14369,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14491,21 +14381,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:3 L:4)" + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L5", + "@id": "https://w3id.org/dpv/risk/owl#MonitorVulnerabilities", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14516,12 +14406,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.31,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14531,7 +14416,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14543,37 +14428,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" + "@value": "Control that monitors a Risk Vulnerability" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:5)" + "@value": "Monitor Vulnerabilities" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L4", + "@id": "https://w3id.org/dpv/risk/owl#ConfoundingVariablesBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.41,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14583,7 +14469,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#StatisticalBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14595,68 +14481,32 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:5 L:4)" + "@value": "Confounding Variables Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AccidentalMisuse", + "@id": "https://w3id.org/dpv/risk/owl#Discrimination", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Accidental Misuse" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Accidental Misuse" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -14665,19 +14515,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2cc7410ebfac4616a57622b7f5c57fba" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples/owl#E0069" - }, - { - "@id": "https://w3id.org/dpv/examples/owl#E0071" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -14685,16 +14522,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14706,36 +14534,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Something that acts as or causes Discrimination" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" - } - ] - }, - { - "@id": "_:N2cc7410ebfac4616a57622b7f5c57fba", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityIncident", + "@id": "https://w3id.org/dpv/risk/owl#IdentificationControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ @@ -14751,7 +14564,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14763,26 +14576,38 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the integrity of information or system has been affected" + "@value": "Control to identify characteristics of event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Integrity Incident" + "@value": "Identification Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentAssessmentReport", + "@id": "https://w3id.org/dpv/risk/owl#InformativenessBias", "@type": [ + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14792,7 +14617,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#EngineeringDecisionBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14804,18 +14629,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the assessment of an incident in terms of its effects or impacts" + "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Assessment Report" + "@value": "Informativeness Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ThreatSource", + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -14826,6 +14651,12 @@ "@value": "2024-02-14" } ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -14833,7 +14664,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk/owl#RiskManagement" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14845,18 +14676,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" + "@value": "Assessment of risk involving its identification, analysis, and evaluation" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat Source" + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk", + "@id": "https://w3id.org/dpv/risk/owl#Privacy", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -14869,7 +14700,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskConcept" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14878,24 +14709,17 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that arise during operational processes" - } - ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Operational Security Risk" + "@value": "Privacy" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L1", + "@id": "https://w3id.org/dpv/risk/owl#IncidentRegister", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14906,12 +14730,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.14,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14921,7 +14740,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14933,21 +14752,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" + "@value": "A register recording incidentes, their reports, notifications, and other related activities" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:7 L:1)" + "@value": "Incident Register" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskControl", + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccount", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -14958,7 +14777,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2b8d3c26b0564a5aa45b8e322c1f789d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14968,7 +14798,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14980,18 +14819,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors another Control" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Compromise Account" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IllegalDataProcessing", + "@id": "_:N2b8d3c26b0564a5aa45b8e322c1f789d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnwantedDisclosureData", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -15016,7 +14871,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na0b38a74d16144e59f544ac1d985df89" + "@id": "_:N942a7e9ba5ea4c138c2a2501ac4c3868" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15026,7 +14881,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15038,24 +14896,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "_:Na0b38a74d16144e59f544ac1d985df89", + "@id": "_:N942a7e9ba5ea4c138c2a2501ac4c3868", "@type": [ "https://schema.org/WebPage" ], @@ -15071,17 +14923,12 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvoidSource", + "@id": "https://w3id.org/dpv/risk/owl#RemedyControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -15095,7 +14942,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15107,21 +14954,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that avoids the risk source" + "@value": "Control to remedy consequences of event" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Avoid Source" + "@value": "Remedy Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk/owl#DenialServiceAttack", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15143,7 +14990,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N137f5be6462a45b986df12e19ae9cc05" + "@id": "_:N8894f1e1a7aa41ba9422beb0723f99a2" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15153,7 +15000,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" }, { "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" @@ -15168,34 +15015,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "_:N137f5be6462a45b986df12e19ae9cc05", + "@id": "_:N8894f1e1a7aa41ba9422beb0723f99a2", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L6", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L6", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -15214,7 +15061,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15236,54 +15083,97 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:6)" + "@value": "Very Low Risk (RM7x7 S:1 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L5", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/conformsTo": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/TeamSubmission/n3/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/format": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.iana.org/assignments/media-types/text/n3" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/title": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "Risk Concepts - N3 serialiation" + "@value": "0.20,xsd:decimal" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.n3" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Low Risk (RM7x7 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#PhysicalHarm", + "@id": "https://w3id.org/dpv/risk/owl#Terrorism", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ndf05e8ac43fb44f994f8ab3ba8f8b7b6" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -15291,7 +15181,59 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Terrorism" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Terrorism" + } + ] + }, + { + "@id": "_:Ndf05e8ac43fb44f994f8ab3ba8f8b7b6", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntentionalMisuse", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#UserRisks" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15300,23 +15242,40 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Intentional Misuse" + } + ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Harm" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityIncident", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S3L2", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15326,7 +15285,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#Incident" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15338,18 +15297,131 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the confidentiality of information or system has been affected" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Incident" + "@value": "High Risk (RM3x3 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L6", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.86,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#refersToRisk", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Incident" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Risk" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples/owl#E0069" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "refers to risk" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/owl#Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedDataAccess", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -15363,18 +15435,1128 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2aaba50c99e946a2befb05c464900a11" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6d8138abcff943f68df0ab565a04a650" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised Data Access" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Data Access" + } + ] + }, + { + "@id": "_:N6d8138abcff943f68df0ab565a04a650", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L2", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.04,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#EnvironmentalRisk", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#RiskConcept" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Environmental Risk" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#Renumeration", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog, Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-04-14" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#FinancialImpact" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Remuneration" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#SocialDisadvantage", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Social Disadvantage" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Social Disadvantage" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#5LikelihoodLevels", + "@type": [ + "https://w3id.org/dpv/owl#Likelihood", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/owl#Likelihood" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "5 Likelihood Levels" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#CompromiseAccountCredentials", + "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N50b49b49a3fe4b1ea591c004b74b4453" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Account Credentials to be compromised" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Compromise Account Credentials" + } + ] + }, + { + "@id": "_:N50b49b49a3fe4b1ea591c004b74b4453", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L2", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Low Risk (RM7x7 S:5 L:2)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#AccidentalIncident", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Incident" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Accidental Incident" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#HaltSource", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that halts the risk source or prevents it from materialising" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Halt Source" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L4", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.41,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "High Risk (RM7x7 S:5 L:4)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L2", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.16,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Low Risk (RM7x7 S:4 L:2)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#isVulnerabilityOf", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "is vulnerability of" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataAggregationBias", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#DataBias" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Aggregation Bias" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S1L2", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very Low Risk (RM5x5 S:1 L:2)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#", + "@type": [ + "http://www.w3.org/ns/dx/prof/Profile", + "http://www.w3.org/2002/07/owl#Ontology" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" + } + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Daniel Doherty" + }, + { + "@value": "Rob Brennan" + }, + { + "@value": "Harshvardhan J. Pandit" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Julio Fernandez" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Delaram Golpayegani" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/creator": [ + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Rob Brennan" + } + ], + "http://purl.org/dc/terms/description": [ + { + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + } + ], + "http://purl.org/dc/terms/hasVersion": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/risk" + } + ], + "http://purl.org/dc/terms/issued": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/license": [ + { + "@id": "https://www.w3.org/copyright/document-license-2023/" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@language": "en", + "@value": "2024-08-18" + } + ], + "http://purl.org/dc/terms/publisher": [ + { + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@language": "en", + "@value": "Risk Concepts" + } + ], + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/published" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "risk" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ + { + "@language": "en", + "@value": "RISK" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/risk/owl#" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-jsonld" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "https://w3id.org/dpv/owl" + }, + { + "@id": "http://www.w3.org/2002/07/owl" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeModification", + "@type": [ + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nbef628fe676e4c9cba3d4a0a1f5c38f0" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk/owl#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised Code Modification" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Code Modification" + } + ] + }, + { + "@id": "_:Nbef628fe676e4c9cba3d4a0a1f5c38f0", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#MonitorRiskSource", + "@type": [ + "https://w3id.org/dpv/risk/owl#RiskControl", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15384,10 +16566,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15399,47 +16578,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Control that monitors a Risk Source" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" + "@value": "Monitor Risk Source" } ] }, { - "@id": "_:N2aaba50c99e946a2befb05c464900a11", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L5", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Threat Taxonomy 2016" - } + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples/owl#E0071" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15449,7 +16618,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15461,21 +16630,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that modifies risk" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Control" + "@value": "Very High Risk (RM5x5 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#VeryHighRisk", + "@id": "https://w3id.org/dpv/risk/owl#VeryHighSeverity", "@type": [ - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#Severity", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15501,10 +16670,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#5RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#5SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk/owl#7RiskLevels" + "@id": "https://w3id.org/dpv/risk/owl#7SeverityLevels" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15516,13 +16685,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very High" + "@value": "Level where Severity is Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk" + "@value": "Very High Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -15533,10 +16702,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ShareRisk", + "@id": "https://w3id.org/dpv/risk/owl#LoseOpportunity", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15547,7 +16716,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc55af031139a488e867f0d2fc7f4752c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15557,7 +16737,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#ReputationalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15569,18 +16749,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Share Risk" + "@value": "Lose of Opportunity" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L3", + "@id": "_:Nc55af031139a488e867f0d2fc7f4752c", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", @@ -15599,7 +16795,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.60,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15609,7 +16805,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15621,26 +16817,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:3)" + "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport", + "@id": "https://w3id.org/dpv/risk/owl#RightsImpact", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8e471129d82f468fbaa272011c8a10f7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15650,7 +16863,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + }, + { + "@id": "https://w3id.org/dpv/owl#Impact" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15662,21 +16878,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Documented information about an incident, its handling, assessments,and notifications" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Report" + "@value": "Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L3", + "@id": "_:N8e471129d82f468fbaa272011c8a10f7", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15690,11 +16928,6 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.18,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -15702,7 +16935,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15714,18 +16947,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:3 L:3)" + "@value": "Risk Matrix 3x3" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentOngoingReport", + "@id": "https://w3id.org/dpv/risk/owl#Threat", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" @@ -15733,7 +16966,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15743,7 +16976,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" + "@id": "https://w3id.org/dpv/risk/owl#RiskSource" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15755,36 +16988,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" + "@value": "Risk source event which causes Risk" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing Report" + "@value": "Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#exploitsVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L1", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15792,6 +17026,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15801,31 +17040,52 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "exploits vulnerability" + "@value": "Low Risk (RM3x3 S:2 L:1)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#serialisation-rdf", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], - "https://schema.org/domainIncludes": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], - "https://schema.org/rangeIncludes": [ + "http://purl.org/dc/terms/title": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Risk Concepts - RDF/XML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk-owl.rdf" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S4L5", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingCodeOfConduct", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -15839,9 +17099,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ { - "@value": "0.41,xsd:decimal" + "@id": "_:N6e579543453b456ab0c95e8740b1351e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15851,77 +17117,57 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:5)" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#serialisation-ttl", + "@id": "_:N6e579543453b456ab0c95e8740b1351e", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/turtle/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/risk-owl.ttl" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#HaltSource", + "@id": "https://w3id.org/dpv/risk/owl#IntegrityBreach", "@type": [ + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -15929,7 +17175,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SourceControl" + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#DataBreach" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15937,22 +17186,10 @@ "@language": "en", "@value": "accepted" } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Control that halts the risk source or prevents it from materialising" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Halt Source" - } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk/owl#Injury", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -15977,7 +17214,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc3f8a288471847e5ab6093affab89a5d" + "@id": "_:Nb08320fce6334ebaa9882de0de363138" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15987,7 +17224,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#UserRisks" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15999,18 +17236,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" + "@value": "Injury" } ] }, { - "@id": "_:Nc3f8a288471847e5ab6093affab89a5d", + "@id": "_:Nb08320fce6334ebaa9882de0de363138", "@type": [ "https://schema.org/WebPage" ], @@ -16026,10 +17263,10 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L3", + "@id": "https://w3id.org/dpv/risk/owl#ConsequenceControl", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16040,12 +17277,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.31,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16055,7 +17287,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16067,21 +17299,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Risk Mitigation Measure that controls the Consequences" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:5 L:3)" + "@value": "Consequence Control" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S7L2", + "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L3", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16097,7 +17329,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.29,xsd:decimal" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16107,7 +17339,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16119,18 +17351,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:7 L:2)" + "@value": "High Risk (RM3x3 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L5", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S3L3", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16149,7 +17381,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.10,xsd:decimal" + "@value": "0.36,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16159,7 +17391,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16171,21 +17403,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:5)" + "@value": "Moderate Risk (RM5x5 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ReduceLikelihood", + "@id": "https://w3id.org/dpv/risk/owl#SecurityBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16196,44 +17428,19 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#ReductionControl" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Control that reduces the likelihood of an event" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Reduce Likelihood" + "@id": "_:Neaf661678b58453aa79ac68fa97e26ba" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingPolicy", - "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -16242,7 +17449,16 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16254,72 +17470,53 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Policy" + "@value": "Security Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentNotice", + "@id": "_:Neaf661678b58453aa79ac68fa97e26ba", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } - ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/owl#Notice" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Notice associated with an Incident" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Incident Notice" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L7", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16327,6 +17524,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -16336,26 +17538,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" + "@value": "Very High Risk (RM7x7 S:3 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L2", + "@id": "https://w3id.org/dpv/risk/owl#ViolenceAgainstChildren", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16363,15 +17560,21 @@ "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-08-16" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.04,xsd:decimal" + "@id": "_:N7b4acd3bba614ee3a2824e835f2e662d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16381,7 +17584,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IndividualRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16393,21 +17596,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" + "@value": "Violence against children" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentityTheft", + "@id": "_:N7b4acd3bba614ee3a2824e835f2e662d", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L5", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16421,15 +17646,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N54d655554a614ff6add6877cf0d8972e" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16439,10 +17658,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16454,53 +17670,68 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Theft" + "@value": "Very High Risk (RM7x7 S:6 L:5)" } ] }, { - "@id": "_:N54d655554a614ff6add6877cf0d8972e", + "@id": "https://w3id.org/dpv/risk/owl#SocietalHealthSafety", "@type": [ - "https://schema.org/WebPage" + "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@id": "https://w3id.org/dpv/risk/owl#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Societal Health & Safety" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S3L6", + "@id": "https://w3id.org/dpv/risk/owl#SimpsonsParadoxBias", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.37,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16510,7 +17741,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#DataBias" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16522,37 +17753,41 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:6)" + "@value": "Simpson'S Paradox Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IdentificationControl", + "@id": "https://w3id.org/dpv/risk/owl#hasControl", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/vocab/vann/example": [ { - "@id": "https://w3id.org/dpv/risk/owl#" + "@id": "https://w3id.org/dpv/examples/owl#E0071" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskControl" + "@id": "https://w3id.org/dpv/risk/owl#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16564,32 +17799,43 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to identify characteristics of event" + "@value": "Indicates the use of specified control" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identification Control" + "@value": "has control" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskControl" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7", + "@id": "https://w3id.org/dpv/risk/owl#RightsViolation", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16599,7 +17845,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" + "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16611,21 +17857,27 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" + "@value": "Something that acts as or causes Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 7x7" + "@value": "Violation of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk/owl#IdentityFraud", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16647,7 +17899,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nd02dc641aff04e49a09a2ef6666d05e0" + "@id": "_:N27e59086791f4c86980cec9fada4a055" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16657,54 +17909,52 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk/owl#OperationalSecurityRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" + "@value": "Identity Fraud" } ] }, { - "@id": "_:Nd02dc641aff04e49a09a2ef6666d05e0", + "@id": "_:N27e59086791f4c86980cec9fada4a055", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentRegister", + "@id": "https://w3id.org/dpv/risk/owl#RM5x5S2L1", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16715,7 +17965,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16725,7 +17980,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16737,21 +17992,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A register recording incidentes, their reports, notifications, and other related activities" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Register" + "@value": "Very Low Risk (RM5x5 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S5L4", + "@id": "https://w3id.org/dpv/risk/owl#RemoveImpact", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk/owl#RiskControl", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16762,12 +18017,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.80,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16777,7 +18027,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#ImpactControl" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16789,21 +18039,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Control that removes Impact i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:4)" + "@value": "Remove Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM5x5S4L2", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L1", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16819,7 +18069,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.32,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16829,7 +18079,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16841,18 +18091,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:4 L:2)" + "@value": "Very Low Risk (RM7x7 S:6 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S5L7", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16869,11 +18119,6 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.71,xsd:decimal" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -16881,7 +18126,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16893,26 +18138,25 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:7)" + "@value": "Risk Matrix 7x7" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#IncidentNearMiss", + "@id": "https://w3id.org/dpv/risk/owl#hasVulnerability", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#IncidentStatus", - "http://www.w3.org/2002/07/owl#Class" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2002/07/owl#ObjectProperty" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ], "http://purl.org/dc/terms/created": [ @@ -16926,11 +18170,6 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -16940,21 +18179,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "has vulnerability" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/rangeIncludes": [ { - "@language": "en", - "@value": "Incident Near Miss" + "@id": "https://w3id.org/dpv/risk/owl#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", + "https://w3id.org/dpv/risk/owl#RiskAssessment", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -16965,18 +18209,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-02-14" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N03dc75f8e29a4749b1e898749ee78d6f" + "@id": "_:N07141469efbe4cf08bef9803f87f84f2" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16986,7 +18224,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#RiskAssessment" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16998,43 +18236,37 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Exposure to Harmful Speech" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" + "@value": "Risk Matrix" } ] }, { - "@id": "_:N03dc75f8e29a4749b1e898749ee78d6f", + "@id": "_:N07141469efbe4cf08bef9803f87f84f2", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "IEC 31010:2019" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#MonitorImpact", + "@id": "https://w3id.org/dpv/risk/owl#PublicOrderBreach", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskControl", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17045,7 +18277,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6e1595afe0144aeea2b1f55d8136d0cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17055,7 +18298,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#MonitorControl" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17067,45 +18310,34 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Impact" + "@value": "Something that acts as or causes Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Impact" + "@value": "Public Order Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityBreach", + "@id": "_:N6e1595afe0144aeea2b1f55d8136d0cc", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskConcept", - "http://www.w3.org/2002/07/owl#Class" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk/owl#" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk/owl#DataBreach" - }, + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/owl#AvailabilityConcept" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L3", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S2L6", "@type": [ "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17124,7 +18356,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.37,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17146,21 +18378,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:6 L:3)" + "@value": "Moderate Risk (RM7x7 S:2 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#Terrorism", + "@id": "https://w3id.org/dpv/risk/owl#ViolatingEthicsCode", "@type": [ - "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", + "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17182,7 +18414,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N69ff5198a3ca43fb9593ddca17b43801" + "@id": "_:N793f312abfaf4de08ee115cf262f3de4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17192,30 +18424,36 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#SocietalRisk" + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Violating Ethics Code" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "_:N69ff5198a3ca43fb9593ddca17b43801", + "@id": "_:N793f312abfaf4de08ee115cf262f3de4", "@type": [ "https://schema.org/WebPage" ], @@ -17231,20 +18469,26 @@ ] }, { - "@id": "https://w3id.org/dpv/risk/owl#causedByThreat", + "@id": "https://w3id.org/dpv/risk/owl#RM7x7S1L3", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2002/07/owl#ObjectProperty" + "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "http://www.w3.org/2000/01/rdf-schema#Class", + "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17252,6 +18496,11 @@ "@id": "https://w3id.org/dpv/risk/owl#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -17261,26 +18510,21 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk/owl#Threat" + "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#3RiskLevels", + "@id": "https://w3id.org/dpv/risk/owl#IncidentMitigated", "@type": [ + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/owl#RiskLevel", "http://www.w3.org/2002/07/owl#Class" ], "http://purl.org/dc/terms/contributor": [ @@ -17291,7 +18535,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17301,7 +18545,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/owl#RiskLevel" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17313,18 +18557,18 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Risk Levels from High to Low" + "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Risk Levels" + "@value": "Incident Mitigated" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#UnauthorisedCodeDisclosure", + "@id": "https://w3id.org/dpv/risk/owl#Coercion", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/owl#RiskConcept", @@ -17349,7 +18593,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N91650f68341a48cb89b35d3cc20bba11" + "@id": "_:Ncae32b67116f4739be7418755cf32050" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17359,10 +18603,10 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17374,61 +18618,39 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "Coercion" } ] }, { - "@id": "_:N91650f68341a48cb89b35d3cc20bba11", + "@id": "_:Ncae32b67116f4739be7418755cf32050", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#InterceptCommunications", + "@id": "https://w3id.org/dpv/risk/owl#LegalRisk", "@type": [ - "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/owl#RiskConcept", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3755806b712d4625aee915fe4dd1c3dd" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk/owl#" @@ -17436,57 +18658,32 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk/owl#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/owl#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N3755806b712d4625aee915fe4dd1c3dd", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM7x7S6L2", + "@id": "https://w3id.org/dpv/risk/owl#IncidentTerminated", "@type": [ - "https://w3id.org/dpv/risk/owl#RiskAnalysis", + "https://w3id.org/dpv/risk/owl#IncidentStatus", "http://www.w3.org/2000/01/rdf-schema#Class", "http://www.w3.org/2002/07/owl#Class" ], @@ -17498,12 +18695,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17513,7 +18705,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk/owl#IncidentStatus" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17525,37 +18717,26 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:6 L:2)" + "@value": "Incident Terminated" } ] }, { - "@id": "https://w3id.org/dpv/risk/owl#RM3x3S2L2", + "@id": "https://w3id.org/dpv/risk/owl#IncidentConcludingReport", "@type": [ "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk/owl#RiskAnalysis", "http://www.w3.org/2002/07/owl#Class" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.44,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17565,7 +18746,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk/owl#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk/owl#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17577,13 +18758,13 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:2 L:2)" + "@value": "Incident Concluding Report" } ] } diff --git a/2.1-dev/risk/risk-owl.n3 b/2.1-dev/risk/risk-owl.n3 index f47d70a7a..93c712a51 100644 --- a/2.1-dev/risk/risk-owl.n3 +++ b/2.1-dev/risk/risk-owl.n3 @@ -190,6 +190,18 @@ risk-owl:Benefit a rdfs:Class, skos:definition "Something that acts as or causes benefits"@en ; skos:prefLabel "Benefit"@en . +risk-owl:Bias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; + skos:prefLabel "Bias"@en . + risk-owl:Blackmail a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -261,6 +273,18 @@ risk-owl:Coercion a rdfs:Class, skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . +risk-owl:CognitiveBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; + skos:prefLabel "Cognitive Bias"@en . + risk-owl:Compensation a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -354,6 +378,30 @@ risk-owl:ConfidentialityIncident a rdfs:Class, skos:definition "Incident where the confidentiality of information or system has been affected"@en ; skos:prefLabel "Confidentiality Incident"@en . +risk-owl:ConfirmationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; + skos:prefLabel "Confirmation Bias"@en . + +risk-owl:ConfoundingVariablesBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; + skos:prefLabel "Confounding Variables Bias"@en . + risk-owl:ConsequenceControl a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -390,6 +438,18 @@ risk-owl:CopyrightViolation a rdfs:Class, skos:definition "Something that acts as or causes Copyright Violation"@en ; skos:prefLabel "Copyright Violation"@en . +risk-owl:CoverageBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; + skos:prefLabel "Coverage Bias"@en . + risk-owl:CrossBorderIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -427,6 +487,30 @@ risk-owl:Damage a rdfs:Class, skos:definition "Something that acts as or causes Damage"@en ; skos:prefLabel "Damage"@en . +risk-owl:DataAggregationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; + skos:prefLabel "Data Aggregation Bias"@en . + +risk-owl:DataBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; + skos:prefLabel "Data Bias"@en . + risk-owl:DataBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -464,6 +548,18 @@ risk-owl:DataCorruption a rdfs:Class, skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . +risk-owl:DataProcessingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; + skos:prefLabel "Data Processing Bias"@en . + risk-owl:DeliberateIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -778,6 +874,18 @@ risk-owl:Fraud a rdfs:Class, skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . +risk-owl:GroupAttributionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; + skos:prefLabel "Group Attribution Bias"@en . + risk-owl:HaltSource a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -931,6 +1039,30 @@ risk-owl:ImpactControl a rdfs:Class, skos:definition "Risk Mitigation Measure that controls Impacts"@en ; skos:prefLabel "Impact Control"@en . +risk-owl:ImplicitBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; + skos:prefLabel "Implicit Bias"@en . + +risk-owl:InGroupBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; + skos:prefLabel "In-Group Bias"@en . + risk-owl:Incident a rdfs:Class, owl:Class ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; @@ -1180,6 +1312,18 @@ risk-owl:IndividualRisk a rdfs:Class, skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:prefLabel "Individual Risk"@en . +risk-owl:InformativenessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; + skos:prefLabel "Informativeness Bias"@en . + risk-owl:Injury a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -1612,6 +1756,30 @@ risk-owl:NonMaterialDamage a rdfs:Class, skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk-owl:NonNormalityBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; + skos:prefLabel "Non-Normality Bias"@en . + +risk-owl:NonResponseBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; + skos:prefLabel "Non-Response Bias"@en . + risk-owl:OperationalSecurityRisk a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -1621,6 +1789,18 @@ risk-owl:OperationalSecurityRisk a rdfs:Class, skos:definition "Risks and issues that arise during operational processes"@en ; skos:prefLabel "Operational Security Risk"@en . +risk-owl:OutGroupHomogeneityBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; + skos:prefLabel "Out-Group Homogeneity Bias"@en . + risk-owl:Payment a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -2841,6 +3021,19 @@ risk-owl:ReputationalRisk a rdfs:Class, skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:prefLabel "Reputational Risk"@en . +risk-owl:RequirementsBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs in or during requirements creation"@en ; + skos:prefLabel "Requirements Bias"@en ; + skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . + risk-owl:Reward a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -3009,6 +3202,19 @@ risk-owl:RiskSource a rdfs:Class, skos:definition "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk"@en ; skos:prefLabel "Risk Source"@en . +risk-owl:RuleBasedSystemDesign a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; + skos:prefLabel "Rule-Based System Design"@en ; + skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . + risk-owl:Sabotage a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -3026,6 +3232,18 @@ risk-owl:Sabotage a rdfs:Class, skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . +risk-owl:SamplingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; + skos:prefLabel "Sampling Bias"@en . + risk-owl:Scam a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -3072,6 +3290,18 @@ risk-owl:SecurityBreach a rdfs:Class, skos:definition "Something that acts as or causes Security Breach"@en ; skos:prefLabel "Security Breach"@en . +risk-owl:SelectionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; + skos:prefLabel "Selection Bias"@en . + risk-owl:SexualViolence a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -3098,6 +3328,18 @@ risk-owl:ShareRisk a rdfs:Class, skos:definition "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders"@en ; skos:prefLabel "Share Risk"@en . +risk-owl:SimpsonsParadoxBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; + skos:prefLabel "Simpson'S Paradox Bias"@en . + risk-owl:SocialDisadvantage a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -3110,6 +3352,18 @@ risk-owl:SocialDisadvantage a rdfs:Class, skos:definition "Something that acts as or causes Social Disadvantage"@en ; skos:prefLabel "Social Disadvantage"@en . +risk-owl:SocietalBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; + skos:prefLabel "Societal Bias"@en . + risk-owl:SocietalHealthSafety a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -3159,6 +3413,18 @@ risk-owl:Spoofing a rdfs:Class, skos:definition "Something that acts as or causes Spoofing"@en ; skos:prefLabel "Spoofing"@en . +risk-owl:StatisticalBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO 20501:2019"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; + skos:prefLabel "Statistical Bias"@en . + risk-owl:SystemFailure a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -3892,6 +4158,7 @@ risk-owl: a owl:Ontology, "http://www.w3.org/2004/02/skos/core" ; dct:contributor "Axel Polleres", "Beatriz Esteves", + "Daniel Doherty", "Delaram Golpayegani", "Fajar Ekaputra", "Georg P. Krog", diff --git a/2.1-dev/risk/risk-owl.rdf b/2.1-dev/risk/risk-owl.rdf index 9ae4f8bbe..63760dcaa 100644 --- a/2.1-dev/risk/risk-owl.rdf +++ b/2.1-dev/risk/risk-owl.rdf @@ -13,4458 +13,4747 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - Very High Risk + + + + + Harshvardhan J. Pandit - 2022-08-18 + 2022-08-17 + Very Low Risk (RM5x5 S:1 L:2) accepted - + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + 0.08,xsd:decimal + + + + - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - Level where Risk is Very High + + 2024-08-16 + Something that acts as or causes Interception of Communications + Intercept Communications Harshvardhan J. Pandit - 0.9,xsd:decimal - - + This concept was called "InterceptionCommunications" in DPV 2.0 + + 2022-08-17 + modified + + - - Harshvardhan J. Pandit - 2022-08-13 - Something that acts as or causes Harm to humans + - + 2022-08-17 + accepted + - accepted + Something that acts as or causes Denial of Service Attack (DoS) + Denial of Service Attack (DoS) 2024-08-16 - This concept refers to the general abstract notion of harm - Harm - + + Harshvardhan J. Pandit + + - - + + + 2024-08-16 + Harshvardhan J. Pandit + 2022-08-17 + Something that acts as or causes Sexual Violence + accepted - - + Sexual Violence + - + + Something that acts as or causes Loss of Goodwill 2022-08-17 - - System Failure - Something that acts as or causes System Failure - Here system refers to both hardware and software systems - Harshvardhan J. Pandit + accepted + Lose of Goodwill 2024-08-16 - - + Harshvardhan J. Pandit + - - Something that acts as or causes Identity Theft - + + - 2024-08-16 - Identity Theft - 2022-08-17 - - + 0.99,xsd:decimal Harshvardhan J. Pandit - accepted - - - - - - - 2024-02-14 - - - - Indicates the vulnerability (subject) is exploited by the indicated threat (object) - - - is exploited by - accepted - - - - - Indicates the incident (subject) is a materialisation of the indicated risk (object) - + 2022-08-18 - refers to risk - - accepted - 2024-02-14 - - + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + Extremely High Likelihood + Level where Likelihood is Extremely High + - - 2024-04-14 - modified - + + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - + - DGA 2.10 - Georg P. Krog, Harshvardhan J. Pandit - 2024-08-16 - Something that acts as or provides fees e.g. for using a service - Fee - - - Harshvardhan J. Pandit - modified - This concept was called "ViolationCodeConduct" in DPV 2.0 - - - - Violating Code of Conduct - 2024-08-16 - 2022-08-17 - Something that acts as or causes Violation of Code of Conduct - - + Moderate Risk + accepted + 2022-08-18 + 0.5,xsd:decimal + Level where Risk is Moderate + + + - + + 0.99,xsd:decimal - + - 2022-08-17 - Moderate Risk (RM7x7 S:2 L:6) + Level where Risk is Extremely High Harshvardhan J. Pandit - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - 0.24,xsd:decimal - + accepted + Extremely High Risk + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 + - - Something that acts as or causes Prevent Exercising of Rights + + 2024-05-19 - - This concept was called "PreventExercisingOfRights" in DPV 2.0 - 2022-08-18 + Incident Handling Report + - Prevent Exercising of Rights accepted - Georg P. Krog, Harshvardhan J. Pandit - 2024-08-16 - + A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence - - + + Control that reduces the severity of an event + Reduce Severity + - 2022-08-18 - accepted - Harshvardhan J. Pandit - Scale with 5 Risk Levels from Very High to Very Low - 5 Risk Levels - - - - 2024-05-19 - Incident Handling Report - - - - A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence + 2024-05-19 accepted + - - 2022-08-17 - - + + + + 2024-02-14 + 2024-05-19 - Lose of Goodwill - Something that acts as or causes Loss of Goodwill accepted - 2024-08-16 + + - Harshvardhan J. Pandit - + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + Incident + 2024-08-16 + Incident is realised or materialised risk + An actual or occured event - - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - Low Risk (RM5x5 S:5 L:1) - + + ISO 31073:2022 Risk management vocabulary + + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk - 0.20,xsd:decimal - 2022-08-17 - Harshvardhan J. Pandit accepted - + 2024-06-12 + Risk Management - + + Something that acts as or causes Scam 2024-08-16 + Harshvardhan J. Pandit - - Unwanted Data Deletion 2022-08-17 - Something that acts as or causes Unwanted Data Deletion - Harshvardhan J. Pandit accepted - + + Scam + - - - Scale with 5 Severity Levels from Very High to Very Low - + + + + 2024-05-19 accepted + Control that monitors a Risk Consequence Harshvardhan J. Pandit - 2022-08-18 - 5 Severity Levels - - + Monitor Consequence + - - - - - accepted + 2024-08-16 - Unauthorised Access to Premises + Something that acts as or causes Erroneous System Use + + Erroneous System Use Harshvardhan J. Pandit - 2022-08-17 + + + - Something that acts as or causes Unauthorised Access to Premises - - - - + accepted + - - 2022-08-17 + + + Fajar Ekaputra + Beatriz Esteves + Axel Polleres + Daniel Doherty + Rob Brennan Harshvardhan J. Pandit - + Georg P. Krog + Julio Fernandez + Julian Flake + Delaram Golpayegani + + + + + + + + + http://www.w3.org/2000/01/rdf-schema + + http://www.w3.org/2004/02/skos/core + 10.5281/zenodo.12505841 + 2.1-dev + + + + https://w3id.org/dpv/risk + 2.1-dev + RISK + + Beatriz Esteves + Julian Flake + Paul Ryan + Delaram Golpayegani + Harshvardhan J. Pandit + Georg P. Krog + Rob Brennan + + https://w3id.org/dpv/risk# + + + + 2022-08-14 + Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 + Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management + Risk Concepts + + 2024-08-18 + risk + + http://purl.org/ontology/bibo/status/published + 2022-08-14 + + - + - 0.18,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - Low Risk (RM7x7 S:3 L:3) + ISO/IEC 24027:2021 + + 2024-09-13 accepted - + Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + Non-Normality Bias + Daniel Doherty + - - 2022-08-17 - Unauthorised Data Disclosure - accepted - + + - 2024-08-16 - Something that acts as or causes Unauthorised Data Disclosure - + Something that acts as or causes Unauthorised Code Access Harshvardhan J. Pandit - + 2022-08-17 + Unauthorised Code Access + + + accepted + + - + + Scale with 5 Likelihood Levels from Very High to Very Low + - - 2024-08-16 - 2022-08-17 - - modified - Something that acts as or causes Violation of Ethics Code - - Violating Ethics Code Harshvardhan J. Pandit - This concept was called "ViolationEthicalCode" in DPV 2.0 - + + accepted + 2022-08-18 + 5 Likelihood Levels + - - + + 2022-08-17 + - 2024-02-14 - Harshvardhan J. Pandit - Incident Mitigated + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + High Risk (RM3x3 S:3 L:2) + 0.67,xsd:decimal accepted - The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring - + Harshvardhan J. Pandit + - - - - Data Corruption - Something that acts as or causes Corruption of Data + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + Something that acts as or causes Violation of Code of Conduct modified - This concept was called "Corruption Data" in DPV 2.0 + + 2024-08-16 + This concept was called "ViolationCodeConduct" in DPV 2.0 + Violating Code of Conduct Harshvardhan J. Pandit 2022-08-17 - - + - + - Harshvardhan J. Pandit + accepted - - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - Moderate Risk (RM3x3 S:3 L:1) - accepted - 0.33,xsd:decimal - 2022-08-17 - + 2024-05-19 + Incident Detection Report + + A report describing the detection of a Incident - - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - 0.22,xsd:decimal + + 0.10,xsd:decimal - Low Risk (RM3x3 S:2 L:1) + Harshvardhan J. Pandit + Very Low Risk (RM7x7 S:5 L:1) 2022-08-17 - Harshvardhan J. Pandit accepted - + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low + - - Spoofing - - Harshvardhan J. Pandit - accepted - 2022-08-17 - - - Something that acts as or causes Spoofing + + - - 2024-08-16 - - - - + Harshvardhan J. Pandit + 2024-02-14 + + accepted + The incident is ongoing i.e. still active + Incident Ongoing + - - + + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + - 0.64,xsd:decimal + Harshvardhan J. Pandit 2022-08-17 - accepted - Very High Risk (RM5x5 S:4 L:4) - Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - + High Risk (RM7x7 S:4 L:4) + 0.33,xsd:decimal + accepted + - - High Risk (RM7x7 S:4 L:5) - 0.41,xsd:decimal + + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - Harshvardhan J. Pandit accepted + 0.71,xsd:decimal + Extremely High Risk (RM7x7 S:7 L:5) - - + + Harshvardhan J. Pandit + Consequence Control + - Harshvardhan J. Pandit + 2024-05-19 + Risk Mitigation Measure that controls the Consequences accepted - 2024-02-14 - Incident Concluded - The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring - + - - + + This concept was called "ImpactToRights" in DPV 2.0 + - Incident Ongoing - The incident is ongoing i.e. still active - Harshvardhan J. Pandit - accepted - 2024-02-14 - - - - Something that acts as or causes Scam - 2022-08-17 - Scam - - - + Impact to Rights + accepted + Something that acts as or causes Impact to Rights 2024-08-16 - Harshvardhan J. Pandit - - - + 2022-08-17 + + - - Harshvardhan J. Pandit - accepted + + + accepted + Very Low Risk (RM7x7 S:1 L:4) + 0.08,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low + Harshvardhan J. Pandit 2022-08-17 - - Very Low Risk (RM5x5 S:1 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - 0.04,xsd:decimal - + - - Very High Risk (RM5x5 S:5 L:5) - + + - accepted - 0.99,xsd:decimal + 0.12,xsd:decimal Harshvardhan J. Pandit + Very Low Risk (RM5x5 S:1 L:3) 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low + accepted - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High - - Moderate Risk (RM5x5 S:2 L:4) - + Harshvardhan J. Pandit - accepted - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - - - - 2022-08-17 - 0.32,xsd:decimal - - - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - - - - accepted - 0.61,xsd:decimal - Extremely High Risk (RM7x7 S:5 L:6) - - Harshvardhan J. Pandit - - - - 2024-08-16 - Illegal Data Processing + - 2022-08-17 - Harshvardhan J. Pandit + Sabotage accepted - - Something that acts as or causes Illegal Processing of Data - This concept was called "IllegalProcessingData" in DPV 2.0 - + Something that acts as or causes Sabotage + 2024-08-16 + + + - + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + 2022-08-17 - 0.14,xsd:decimal - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low - 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low accepted - Low Risk (RM7x7 S:1 L:7) + Very Low Risk (RM7x7 S:2 L:3) + 0.12,xsd:decimal + Harshvardhan J. Pandit - + Harshvardhan J. Pandit - accepted - - Something that acts as or causes a compromised account that is then used by the compromiser - - - - - 2024-08-16 - 2022-08-17 - Compromise Account - - - - - - + Confidentiality Breach 2022-08-17 + Something that acts as or causes Confidentiality Breach - - Something that acts as or causes Distributed Denial of Service Attack (DDoS) - Harshvardhan J. Pandit accepted + 2024-08-16 - Distributed Denial of Service Attack (DDoS) - - + + - - Something that acts as or causes Security Breach - Security Breach - + + Harshvardhan J. Pandit + Something that acts as or causes Public Order Breach 2022-08-17 - - Harshvardhan J. Pandit - accepted - 2024-08-16 - - - - - - + accepted - Indicates the associated context (subject) has indicated vulnerability (object) - - - 2024-02-14 - - - has vulnerability + Public Order Breach + 2024-08-16 + - + + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + High Risk (RM5x5 S:3 L:4) + 0.48,xsd:decimal + - - accepted - High Risk - Level where Risk is High - 2022-08-18 + 2022-08-17 Harshvardhan J. Pandit - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 0.75,xsd:decimal - - - - - - - - accepted - Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - Harshvardhan J. Pandit - Risk Matrix - - - 2024-02-14 - + - - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High - 2022-08-17 + + + Incident Status Harshvardhan J. Pandit - accepted + - - 0.31,xsd:decimal - - High Risk (RM7x7 S:3 L:5) - - - - 2022-08-17 - Low Risk (RM7x7 S:7 L:1) + 2024-02-14 - - - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low - 0.14,xsd:decimal + Status associated with an incident accepted - Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 - - High Risk (RM3x3 S:3 L:2) - - Harshvardhan J. Pandit + accepted 0.67,xsd:decimal - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + High Risk (RM3x3 S:2 L:3) + Harshvardhan J. Pandit 2022-08-17 + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + Harshvardhan J. Pandit - Level where Likelihood is Low - 0.25,xsd:decimal - Low Likelihood - accepted + accepted + 0.25,xsd:decimal 2022-08-18 - Harshvardhan J. Pandit + Level where Likelihood is Low + Low Likelihood The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - + - - - accepted - - - Control that modifies risk - 2024-05-19 - - - Risk Control - - + + - - Level where Likelihood is Extremely High - 0.99,xsd:decimal + + Something that acts as or causes a compromised account that is then used by the compromiser + 2024-08-16 + Compromise Account Harshvardhan J. Pandit - 2022-08-18 + 2022-08-17 accepted - Extremely High Likelihood - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - - - - 0.31,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + + + + + + Risk Matrix 5x5 + + + + Harshvardhan J. Pandit + 2022-08-17 + A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types + accepted + + + + Psychological Harm + + + + Harshvardhan J. Pandit + + 2022-08-17 + accepted + Something that acts as or causes Psychological Harm + 2024-08-16 + + + + + 0.73,xsd:decimal accepted - Moderate Risk (RM7x7 S:5 L:3) + Extremely High Risk (RM7x7 S:6 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High Harshvardhan J. Pandit 2022-08-17 + - + + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + + + Harshvardhan J. Pandit - + 2022-08-17 + 0.80,xsd:decimal accepted + + Very High Risk (RM5x5 S:5 L:4) + + + + - Status associated with an incident + Harshvardhan J. Pandit - Incident Status - - 2024-02-14 + 2022-08-17 + accepted + 0.31,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + High Risk (RM7x7 S:3 L:5) + - + + Violating Policy - 2022-08-17 - - Harshvardhan J. Pandit accepted - 2024-08-16 - Authorisation Failure - Something that acts as or causes Authorisation Failure - - - + Something that acts as or causes violation of policy which can be either internal or external policy + - - Harshvardhan J. Pandit - Incident Impact Assessment - 2024-05-19 - + + - accepted - An impact assessment associated with a incident + Daniel Doherty + Data Aggregation Bias + Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + ISO/IEC 24027:2021 + 2024-09-13 + accepted + - - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - High Risk (RM5x5 S:4 L:3) + + accepted + Extremely Low Risk (RM7x7 S:3 L:1) + + + + Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + 0.06,xsd:decimal 2022-08-17 + + + + + + + + accepted + 5 Risk Levels + 2022-08-18 + Scale with 5 Risk Levels from Very High to Very Low + Harshvardhan J. Pandit + + + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + 0.37,xsd:decimal + Harshvardhan J. Pandit + High Risk (RM7x7 S:6 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + 2022-08-17 accepted - 0.48,xsd:decimal - + - - - Re-identification + + Something that acts as or causes Corruption of Data + Harshvardhan J. Pandit + + This concept was called "Corruption Data" in DPV 2.0 - accepted - 2022-08-19 + + Data Corruption + modified + 2022-08-17 2024-08-16 - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - Something that acts as or causes Re-identification - Harshvardhan J. Pandit - + - + + Indicates the vulnerability (subject) is exploited by the indicated threat (object) + + + + is exploited by + 2024-02-14 + + accepted + + + + 0.44,xsd:decimal + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + - - 2024-05-19 - Source Control - Risk Mitigation Measure that controls the Source Harshvardhan J. Pandit - + Moderate Risk (RM3x3 S:2 L:2) + 2022-08-17 + + accepted + - - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - High Risk (RM5x5 S:3 L:4) + Moderate Risk (RM7x7 S:7 L:2) + 0.29,xsd:decimal + Harshvardhan J. Pandit 2022-08-17 - 0.48,xsd:decimal - Harshvardhan J. Pandit + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate accepted - + - + + accepted + Unauthorised System Access + 2024-08-16 + + Harshvardhan J. Pandit + Something that acts as or causes Unauthorised System Access + 2022-08-17 - Malware Attack - 2024-08-16 - 2022-08-17 - accepted - Something that acts as or causes Malware Attack - Harshvardhan J. Pandit - - - - Level where Likelihood is Moderate - Moderate Likelihood - Harshvardhan J. Pandit - + + 2024-09-13 + ISO/IEC 24027:2021 + - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 2022-08-18 + Rule based system design also potentially introduces various forms of human cognitive bias + Rule-Based System Design accepted - 0.5,xsd:decimal - - - + Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + Daniel Doherty + - + + Daniel Doherty + Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + - accepted - 2024-05-19 + ISO/IEC 24027:2021 - - A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated - Incident Ongoing Report + 2024-09-13 + accepted + Confounding Variables Bias + - - - Something that acts as or causes Loss of Opportunity + + Harshvardhan J. Pandit 2022-08-17 - + accepted - 2024-08-16 - Harshvardhan J. Pandit - Lose of Opportunity - + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + 0.12,xsd:decimal + Very Low Risk (RM7x7 S:3 L:2) + - + + Harshvardhan J. Pandit + + + + Risk Mitigation Measure that controls Impacts + 2024-05-19 accepted + Impact Control + + + + 2022-08-17 - Societal Health & Safety - - - accepted - Low Risk (RM3x3 S:1 L:1) - - - - 0.11,xsd:decimal - 2022-08-17 + + 2024-08-16 Harshvardhan J. Pandit - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - + Something that acts as or causes Unwanted Disclosure of Data + Unwanted Disclosure of Data + + - - Very Low Risk (RM7x7 S:5 L:1) + + - - 0.10,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low - Harshvardhan J. Pandit - 2022-08-17 - + Availability Incident + + 2024-05-19 accepted - + Incident where the availability of information or system has been affected - + + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + - - 2024-05-19 Harshvardhan J. Pandit - Control that changes Consequence + 2022-08-17 + 0.16,xsd:decimal accepted - Change Consequence - + Low Risk (RM5x5 S:2 L:2) + - - - Harshvardhan J. Pandit - 2022-08-18 + accepted + + - - - Extremely Low Severity - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - Level where Severity is Extremely Low - 0.01,xsd:decimal - - - - - - Incident Suspected + Something that acts as or causes Malicious Code Attack + 2024-08-16 Harshvardhan J. Pandit - accepted - 2024-02-14 - The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + 2022-08-17 + Malicious Code Attack - + + + + - + + Something that acts as or causes Unwanted Data Deletion + 2024-08-16 + - Unwanted Code Deletion - - accepted - 2024-08-16 - Something that acts as or causes Unwanted Code Deletion - Harshvardhan J. Pandit + Unwanted Data Deletion + 2022-08-17 + accepted - + - - The state where an incident was almost successful in taking place i.e. "it came very close" + + + 2022-08-17 + accepted + - - 2024-02-14 - Incident Near Miss - + High Risk (RM7x7 S:5 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + 0.41,xsd:decimal Harshvardhan J. Pandit - accepted - + - - + + - 2024-08-16 - System Malfunction - 2022-08-17 - Here system refers to both hardware and software systems + 0.24,xsd:decimal + accepted + Moderate Risk (RM5x5 S:2 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate Harshvardhan J. Pandit + 2022-08-17 + + + + accepted - - Something that acts as or causes System Malfunction - - + 0.22,xsd:decimal + Harshvardhan J. Pandit + + + + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low + Low Risk (RM3x3 S:2 L:1) + 2022-08-17 + - + + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + Financial Loss + 2024-08-16 + - 2024-04-14 - Georg P. Krog, Harshvardhan J. Pandit - accepted - 2024-08-16 - Something that acts as or provides payment e.g. to access a service or purchase resources - Payment + Harshvardhan J. Pandit + 2022-08-17 + accepted - - + + - Something that involves or causes judicial costs to be paid + Harshvardhan J. Pandit + Risk Matrix 3x3 + 2022-08-17 accepted - Judicial Costs - + A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types + - + + Harshvardhan J. Pandit - 2024-08-16 - + 2022-08-17 + accepted + This concept was called "ChildViolence" in DPV 2.0 + + Something that acts as or causes Child Violence + Violence against children + 2024-08-16 + + + Harshvardhan J. Pandit - Something that acts as or causes Phishing Scam - Phishing Scam 2022-08-17 + + + accepted + + + + Spoofing + 2024-08-16 + Something that acts as or causes Spoofing + + - - + + + 2024-02-14 - accepted - has risk source - Indicates the risk (subject) has the indicated risk source (object) - - - 2024-02-14 - + accepted + + + has threat source + + Indicates the threat (subject) has the indicated source (object) - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + + + + Something that acts as or provides fees e.g. for using a service + + modified + 2024-04-14 + DGA 2.10 + 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit + Fee + - - The incident has halted or paused with a high likelihood of resuming or recurring + + Monitor Vulnerabilities Harshvardhan J. Pandit - + - - Incident Halted + 2024-05-19 accepted - 2024-02-14 - + + Control that monitors a Risk Vulnerability + - - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - High Risk (RM3x3 S:2 L:3) - 2022-08-17 - + + + 2024-08-16 + Something that acts as or causes Personal Safety Endangerment + Harshvardhan J. Pandit + + 2022-08-17 accepted - 0.67,xsd:decimal - Harshvardhan J. Pandit - + Personal Safety Endangerment + - - 0.49,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - Harshvardhan J. Pandit + + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + Moderate Risk (RM7x7 S:4 L:3) + Harshvardhan J. Pandit 2022-08-17 - Very High Risk (RM7x7 S:4 L:6) accepted + 0.24,xsd:decimal + - - 2022-08-17 + - Low Risk (RM7x7 S:2 L:4) - 0.16,xsd:decimal - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + accepted + Very High Risk (RM7x7 S:4 L:6) + 0.49,xsd:decimal Harshvardhan J. Pandit + 2022-08-17 - + + accepted + Something that acts as or causes Detriment - Georg P. Krog - Social Disadvantage - Something that acts as or causes Social Disadvantage + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + Detriment 2024-08-16 - 2022-08-19 - accepted + 2022-03-23 - + - + - + - Moderate Risk (RM7x7 S:7 L:2) - 0.29,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - 2022-08-17 - Harshvardhan J. Pandit accepted - + Risks and issues that have their basis in legal requirements and enforcement + Legal Risk + - - 2022-08-19 - Georg P. Krog + + The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring + 2024-02-14 + - - accepted - 2024-08-16 - Discrimination - Something that acts as or causes Discrimination - + accepted + Incident Mitigated + Harshvardhan J. Pandit + - - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low - Extremely Low Risk (RM7x7 S:4 L:1) - + + - accepted - 2022-08-17 - Harshvardhan J. Pandit - 0.08,xsd:decimal - + accepted + Things that cause or have the potential to impact financial resources + Financial Impact + - - Intentional Misuse - + + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + + Harshvardhan J. Pandit + Moderate Risk (RM3x3 S:1 L:3) + 2022-08-17 accepted - Intentional Misuse - + 0.33,xsd:decimal + - + accepted - Incident Suspected Report - + - 2024-05-19 - - A report describing the suspicion of an incident in the past or occuring - - - A register recording incidentes, their reports, notifications, and other related activities - + 0.64,xsd:decimal + Very High Risk (RM5x5 S:4 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High Harshvardhan J. Pandit + + 2022-08-17 + + + + + Documented information about an incident, its handling, assessments,and notifications + Incident Report + 2024-05-19 accepted - Incident Register - - 2024-05-19 + - + - - Something that acts as or causes Extorsion - 2024-08-16 - Harshvardhan J. Pandit - 2022-08-17 accepted - Extorsion - - - + Assessment of risk involving its identification, analysis, and evaluation + + ISO 31073:2022 Risk management vocabulary + 2024-02-14 + Risk Assessment - - Harshvardhan J. Pandit - + + + Risk source event which causes Risk + 2024-02-14 - 2022-08-17 - 0.08,xsd:decimal + Threat accepted - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low - Extremely Low Risk (RM7x7 S:2 L:2) - - + Harshvardhan J. Pandit - - - 2022-08-17 + Level where Severity is High + - - Something that acts as or causes Unauthorised Code Disclosure - 2024-08-16 - Unauthorised Code Disclosure - accepted - - - - - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 0.75,xsd:decimal + High Severity - 0.1,xsd:decimal - - - - Very Low Likelihood - Level where Likelihood is Very Low - 2022-08-18 accepted - Harshvardhan J. Pandit - - + 2022-08-18 + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + + + - + + 2022-08-18 + - + Harshvardhan J. Pandit + Scale with 7 Severity Levels from Extremely High to Extremely Low accepted - Limitation of Rights - Georg P. Krog, Harshvardhan J. Pandit - This concept was called "LimitationOfRights" in DPV 2.0 - 2022-08-18 - 2024-08-16 - Something that acts as or causes Limitation of Rights + 7 Severity Levels - - - - - - Risk Concepts - RDF/XML serialiation - - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + - - + + Change Impact + Control that changes Impact Harshvardhan J. Pandit + accepted - + - - 2024-08-16 - Something that acts as or causes Unwanted Disclosure of Data - accepted - 2022-08-17 - Unwanted Disclosure of Data - - + 2024-05-19 + + - - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 + + accepted + - - 0.01,xsd:decimal - + Moderate Risk (RM7x7 S:6 L:2) Harshvardhan J. Pandit - accepted - Extremely Low Likelihood - Level where Likelihood is Extremely Low - + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate + 0.24,xsd:decimal + + 2022-08-17 + - - Identification Control - Control to identify characteristics of event - 2024-05-19 + + - + Non-Response Bias accepted + Daniel Doherty + Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + ISO/IEC 24027:2021 + 2024-09-13 - + - - 2022-08-19 - - Georg P. Krog + + Incident Ongoing Report + A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated - - 2024-08-16 + + + 2024-05-19 accepted - Something that acts as or causes Unauthorised Re-Identification - Unauthorised Re-Identification - - - - - - - - - has control + + 2024-02-14 + + + + Harshvardhan J. Pandit + Incident Status Unknown + The status of a incident is unknown accepted - Indicates the use of specified control - 2024-02-14 + - + + Individual Risk + Risks and issues that affect or have the potential to affect specific individuals - - accepted - Risk Mitigation Measure that uses controls to monitor events - 2024-05-19 - Harshvardhan J. Pandit - Monitor Control - Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. - + accepted - + + 2022-08-17 + accepted - Something that acts as or causes Terrorism - Terrorism - 2022-08-17 - + Copyright Violation - Harshvardhan J. Pandit - accepted + Something that acts as or causes Copyright Violation + 2024-08-16 - - - - 0.99,xsd:decimal Harshvardhan J. Pandit - + + + + Control that removes Impact i.e. prevents it from materialising + - 2022-08-17 + Harshvardhan J. Pandit - High Risk (RM3x3 S:3 L:3) + Remove Impact accepted - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - + 2024-05-19 + - - Remove Impact - + + 0.71,xsd:decimal + - 2024-05-19 - + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High Harshvardhan J. Pandit + Extremely High Risk (RM7x7 S:5 L:7) + + 2022-08-17 accepted - Control that removes Impact i.e. prevents it from materialising - + - + - Something that acts as or causes Unauthorised System Modification - 2022-08-17 - Unauthorised System Modification - Harshvardhan J. Pandit accepted - + 2022-08-19 + Social Disadvantage + Georg P. Krog 2024-08-16 - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - + Something that acts as or causes Social Disadvantage + - + + A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types + - - Control to detect event + Harshvardhan J. Pandit + 2022-08-17 - 2024-05-19 + Risk Matrix 7x7 accepted - Detection Control - + - - Something that acts as or causes Loss of Customer Confidence - + + + + + Examples for Data Privacy Vocabulary + + + + + + + Harshvardhan J. Pandit - 2024-08-16 + Low Risk (RM7x7 S:4 L:2) 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low + 0.16,xsd:decimal accepted - - - - Lose of Customer Confidence - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + - - 2022-08-17 + - + - + Requirements Bias accepted - 2024-08-16 - Harshvardhan J. Pandit - Unauthorised Information Disclosure - Something that acts as or causes Unauthorised Information Disclosure + Daniel Doherty + 2024-09-13 - - + Requirements bias also represents occasions for the human cognitive biases to manifest + ISO/IEC 24027:2021 + Bias that occurs in or during requirements creation + - + - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - Low Risk (RM3x3 S:1 L:2) - 0.22,xsd:decimal + 2022-08-17 accepted - + Very Low Risk (RM7x7 S:1 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low + 0.10,xsd:decimal Harshvardhan J. Pandit - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + - - - - + + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + + + + Level where Severity is Very Low accepted - has incident - 2024-02-14 - Indicates an incident is associated with the specified context - + 2022-08-18 + 0.1,xsd:decimal + Very Low Severity + Harshvardhan J. Pandit + + - + + Harshvardhan J. Pandit - + Terrorism + 2022-08-17 accepted - + - Risk Mitigation Measure that controls the Consequences - 2024-05-19 - Consequence Control - + + 2024-08-16 + Something that acts as or causes Terrorism + - + + 2022-08-19 + Georg P. Krog + 2024-08-16 + Something that acts as or causes Discrimination + Discrimination - 2024-08-16 - Confidentiality Breach - - Something that acts as or causes Confidentiality Breach - 2022-08-17 - Harshvardhan J. Pandit accepted - - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + - - + + Accidental Misuse + Accidental Misuse + - Harshvardhan J. Pandit + accepted - Risk Mitigation Measure that shares Risk e.g. amongst stakeholders - 2024-05-19 + + + + Harshvardhan J. Pandit + Very Low Risk (RM5x5 S:3 L:1) + + + + 2022-08-17 - Share Risk - + accepted + 0.12,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low + - + 2022-08-17 + accepted - - Something that acts as or causes Personal Safety Endangerment - Personal Safety Endangerment + Something that acts as or causes Distributed Denial of Service Attack (DDoS) + + Distributed Denial of Service Attack (DDoS) 2024-08-16 Harshvardhan J. Pandit - - + + - - - 2.1-dev - - - - - - - - - http://www.w3.org/2000/01/rdf-schema - http://www.w3.org/2004/02/skos/core - - Rob Brennan - Axel Polleres - Delaram Golpayegani - Julian Flake - Fajar Ekaputra + + 2022-08-17 + + + + + accepted + Something that acts as or causes Loss of Reputation + + 2024-08-16 + Lose of Reputation + Harshvardhan J. Pandit + + + + ISO/IEC 24027:2021 + 2024-09-13 + + + + In-Group Bias + + accepted + Daniel Doherty + Bias that occurs when showing partiality to one's own group or own characteristics + + + + + + + + 2022-08-17 + 0.16,xsd:decimal + accepted + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + Low Risk (RM5x5 S:1 L:4) + Harshvardhan J. Pandit + + + + Recovery Control + + + + + accepted + 2024-05-19 + Control to recover from event + + + + Unauthorised Data Modification + 2024-08-16 + + Harshvardhan J. Pandit + 2022-08-17 + + + + + accepted + Something that acts as or causes Unauthorised Data Modification + + + + + + + + 2024-05-19 + accepted + + Remove Consequence + Control that removes Consequence i.e. prevents it from materialising + Harshvardhan J. Pandit + + + + Control that monitors a Risk + Harshvardhan J. Pandit + + + + + Monitor Risk + 2024-05-19 + accepted + + + + + + + 0.36,xsd:decimal + Moderate Risk (RM5x5 S:3 L:3) + Harshvardhan J. Pandit + 2022-08-17 + accepted + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + + + + + + + Moderate Risk (RM3x3 S:3 L:1) + Harshvardhan J. Pandit + + 0.33,xsd:decimal + 2022-08-17 + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + accepted + + + + Compensation + 2024-08-16 + 2024-04-14 + Georg P. Krog, Harshvardhan J. Pandit + + + + + accepted + Something that acts as or provides compensation - which can be monetary and financial or in other forms + + + + Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. + Risk Matrix + 2024-02-14 + + + + Harshvardhan J. Pandit + + accepted + + + + + + + + Control to remedy consequences of event + Remedy Control + 2024-05-19 + accepted + + + + + 0.04,xsd:decimal + + + + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + Harshvardhan J. Pandit + Extremely Low Risk (RM7x7 S:2 L:1) + + 2022-08-17 + accepted + + + + accepted + + + + Harm + 2024-08-16 + Something that acts as or causes Harm to humans + This concept refers to the general abstract notion of harm + Harshvardhan J. Pandit + 2022-08-13 + + + + + 2022-08-17 + + + + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low + accepted + 0.04,xsd:decimal + Extremely Low Risk (RM7x7 S:1 L:2) + Harshvardhan J. Pandit + + + + Moderate Risk (RM7x7 S:2 L:6) + + + + Harshvardhan J. Pandit + 2022-08-17 + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate + 0.24,xsd:decimal + + accepted + + + + + + + Risks and issues that affect the reputation of the organisation + accepted + Reputational Risk + + + + + modified + + + + Harshvardhan J. Pandit + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + + 2022-08-17 + Something that acts as or causes Violation of Statutory Obligations + 2024-08-16 + + Violation of Statutory Obligations + + + + + + + Extremely Low Risk (RM7x7 S:2 L:2) + Harshvardhan J. Pandit + + 2022-08-17 + accepted + 0.08,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + + + + High Risk (RM5x5 S:5 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High + + + + + accepted + 0.40,xsd:decimal + Harshvardhan J. Pandit + 2022-08-17 + + + + + + + Harshvardhan J. Pandit + + 2022-08-17 + accepted + Something that acts as or causes Loss of Negotiating Capacity + 2024-08-16 + + Lose of Negotiating Capacity + + + + + + 2024-02-14 + + Indicates the vulnerability (subject) is associated with indicated context (object) + accepted + + + is vulnerability of + + + Scale with 7 Likelihood Levels from Extremely High to Extremely Low + Harshvardhan J. Pandit + + + + 7 Likelihood Levels + 2022-08-18 + + accepted + + + + Something that acts as or causes Illegal Processing of Data + Illegal Data Processing + + + Harshvardhan J. Pandit - Georg P. Krog - Julio Fernandez - Beatriz Esteves - 10.5281/zenodo.12505841 - Beatriz Esteves - Georg P. Krog - Paul Ryan - Harshvardhan J. Pandit - Julian Flake - Delaram Golpayegani - Rob Brennan - risk - - https://w3id.org/dpv/risk# - - - - Risk Concepts - - 2022-08-14 - - - Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management - 2024-08-18 - - - Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - 2.1-dev - RISK - - http://purl.org/ontology/bibo/status/published - https://w3id.org/dpv/risk - 2022-08-14 + + 2022-08-17 + accepted + + This concept was called "IllegalProcessingData" in DPV 2.0 + 2024-08-16 + - - Something that acts as or causes Material Damage + + + + + 2022-08-18 + + accepted + 7 Risk Levels + Scale with 7 Risk Levels from Extremely High to Extremely Low + Harshvardhan J. Pandit + + + + Harshvardhan J. Pandit + 2022-08-17 + accepted + Unauthorised Resource Use + Something that acts as or causes Unauthorised Resource Use + + + + + 2024-08-16 + + + + + + + + + + Indicates the use of specified control + 2024-02-14 + + accepted + has control + + + + 2024-08-16 + Something that acts as or causes Injury + Harshvardhan J. Pandit + 2022-08-17 + + + + + + Injury + accepted + + + + Control to detect event + 2024-05-19 + + + + + Detection Control + accepted + + + + + 2022-08-17 + + + + Harshvardhan J. Pandit + + accepted + 2024-08-16 + System Intrusion + Something that acts as or causes System Intrusion + + + + + + + + + + Harshvardhan J. Pandit + 2022-08-17 + + 0.32,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + accepted + Moderate Risk (RM5x5 S:2 L:4) + + + + accepted + + + + Equipment Malfunction + Something that acts as or causes Equipment Malfunction + 2024-08-16 + + Here equipment refers to physical equipment + 2022-08-17 + Harshvardhan J. Pandit + + + + + + ISO 20501:2019 + Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + Daniel Doherty + 2024-09-13 + + + + + Statistical Bias + accepted + + + + + + + + Something that involves or causes judicial penalties to be paid + accepted + Judicial Penalty + + + + 2024-08-16 + Harshvardhan J. Pandit + 2022-08-17 + + + + + accepted + Something that acts as or causes Unauthorised System Modification + Unauthorised System Modification + + + + + + + + + + + + 2024-08-16 + Something that acts as or causes Data Breach + Data Breach + Harshvardhan J. Pandit + + 2022-08-17 + accepted + + + + + + + + + + ISO/IEC 24027:2021 + + 2024-09-13 + accepted + Sampling Bias + Bias that occurs when data records are not collected randomly from the intended population + Daniel Doherty + + + + 2024-08-16 + Security Breach + Harshvardhan J. Pandit + Something that acts as or causes Security Breach + 2022-08-17 + + + + + + accepted + + + + + + + + + + + 2024-05-19 + accepted + Monitor Impact + Control that monitors a Risk Impact + Harshvardhan J. Pandit + + + + + + + accepted + 2022-08-18 + + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + Extremely Low Likelihood + Harshvardhan J. Pandit + 0.01,xsd:decimal + Level where Likelihood is Extremely Low + + + + + + + + + accepted + Something that acts as or causes Loss of Trust + Lose of Trust + 2024-08-16 + Harshvardhan J. Pandit + 2022-08-17 + + + + Moderate Risk (RM5x5 S:3 L:2) + - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2024-08-16 Harshvardhan J. Pandit - Material Damage - 2022-03-30 + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + 2022-08-17 + 0.24,xsd:decimal accepted - + - - - + + - - Violence against children - This concept was called "ChildViolence" in DPV 2.0 - 2024-08-16 - Something that acts as or causes Child Violence - 2022-08-17 Harshvardhan J. Pandit + + Scale with 3 Likelihood Levels from High to Low + 3 Likelihood Levels accepted - + 2022-08-18 + - + + accepted - + - Harshvardhan J. Pandit - accepted - Incident Status Unknown - 2024-02-14 - The status of a incident is unknown - + The criteria for what is considered material damage is based in jurisdictional laws and norms + Something that acts as or causes Non-Material Damage + 2024-08-16 + Non-Material Damage + 2022-03-30 + Harshvardhan J. Pandit + - - 2022-08-17 - + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + Harshvardhan J. Pandit + 2022-08-17 + 0.61,xsd:decimal accepted - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate - 0.29,xsd:decimal - Moderate Risk (RM7x7 S:2 L:7) + + Very High Risk (RM7x7 S:6 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - - ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html - - + - - exploits vulnerability - - - Indicates the threat (subject) exploits the indicated vulnerability (object) + + + + 2024-02-14 - + Indicates the incident (subject) is a materialisation of the indicated risk (object) + refers to risk + accepted - - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - ENISa Trust Services Security Incidents 2021 - - - - 0.43,xsd:decimal - Very High Risk (RM7x7 S:3 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low 2022-08-17 - + Low Risk (RM7x7 S:1 L:7) Harshvardhan J. Pandit + accepted + 0.14,xsd:decimal - - accepted - + + + Harshvardhan J. Pandit + 2022-08-17 + - 2022-08-18 - Harshvardhan J. Pandit - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 0.75,xsd:decimal - Level where Severity is High - High Severity - - - + accepted + Fraud + Something that acts as or causes Fraud + 2024-08-16 + + - - 2024-06-11 - Delaram Golpayegani - Something that acts as or causes Misuse + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + caused by threat + Indicates the cause of associated context (subject) was the indicated threat (object) + + accepted + + + + 2024-02-14 + + + + 2024-02-14 + accepted + + + + Indicates the risk (subject) has the indicated risk source (object) + + + has risk source + + + + Unauthorised Code Disclosure - Misuse + Something that acts as or causes Unauthorised Code Disclosure + Harshvardhan J. Pandit + + 2022-08-17 + accepted + 2024-08-16 + + + + + Incident caused due to environmental factors outside human controls + accepted + + Environmental Incident + 2024-05-19 + + - - + + + + + Societal Risk + Risks and issues that affect or have the potential to affect society at large or specific groups in society + + accepted + + + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - - 0.24,xsd:decimal + + + + + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + Harshvardhan J. Pandit + Low Risk (RM5x5 S:4 L:1) + 2022-08-17 + 0.16,xsd:decimal accepted - Moderate Risk (RM7x7 S:4 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + + + - + - 2022-08-17 - Harshvardhan J. Pandit - + Out-Group Homogeneity Bias + Daniel Doherty + Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + ISO/IEC 24027:2021 + 2024-09-13 + + accepted + - + + 2024-08-16 + Harshvardhan J. Pandit 2022-08-17 + Something that acts as or causes Unauthorised Data Access + + + accepted - Something that acts as or causes Equipment Malfunction + + Unauthorised Data Access + + + + - + + accepted + 2024-04-14 + Reward 2024-08-16 - Here equipment refers to physical equipment + Georg P. Krog, Harshvardhan J. Pandit + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + + + + + Harshvardhan J. Pandit - Equipment Malfunction - - + Incident Terminated + 2024-02-14 + + The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring + accepted + - + + + + + Harshvardhan J. Pandit + 0.20,xsd:decimal + 2022-08-17 + + accepted + Low Risk (RM7x7 S:5 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + + + + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + Harshvardhan J. Pandit + 0.01,xsd:decimal + - Incident Assessment Report - A report describing the assessment of an incident in terms of its effects or impacts - - 2024-05-19 accepted + Level where Risk is Extremely Low + Extremely Low Risk + 2022-08-18 + - + - Harshvardhan J. Pandit + - - accepted + Daniel Doherty + Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + ISO/IEC 24027:2021 + 2024-09-13 + Data Bias + + + + Something that acts as or causes Harmful Speech 2024-08-16 - Something that acts as or causes Denial of Service Attack (DoS) - Denial of Service Attack (DoS) + + Harshvardhan J. Pandit 2022-08-17 - - - - - - Damage - Something that acts as or causes Damage + Exposure to Harmful Speech + accepted - 2024-08-16 - 2022-03-30 - Harshvardhan J. Pandit - + This concept was called "HarmfulSpeech" in DPV 2.0 + - - 2022-08-17 + + Bias that occurs when humans are processing and interpreting information + Daniel Doherty + 2024-09-13 + ISO/IEC 24027:2021 - + - accepted - High Risk (RM7x7 S:5 L:4) - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - 0.41,xsd:decimal - - - - 2024-05-19 + Cognitive Bias accepted + + + - + + accepted - Halt Source + 2022-08-18 + 0.25,xsd:decimal + Low Severity + Level where Severity is Low + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 Harshvardhan J. Pandit - Control that halts the risk source or prevents it from materialising - + + + - + + Daniel Doherty + + 2024-09-13 + Bias that occurs when a human makes an association or assumption based on their mental models and memories + ISO/IEC 24027:2021 accepted - Cross-Border Incident - Incident involving cross-border or multiple jurisdictions - 2024-05-19 - + Implicit Bias + - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + Harshvardhan J. Pandit + Re-identification - accepted - Data Breach - Harshvardhan J. Pandit - - - Something that acts as or causes Data Breach - 2022-08-17 - + accepted + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + Something that acts as or causes Re-identification + 2022-08-19 2024-08-16 - - - + - - + + - - Level where Severity is Extremely High - 2022-08-18 - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - accepted - Extremely High Severity - 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + Level where Likelihood is Very High Harshvardhan J. Pandit - - - - 2022-08-17 + Very High Likelihood - Harshvardhan J. Pandit - Risk Matrix 5x5 + 0.9,xsd:decimal accepted + 2022-08-18 + + + + + - - A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types - - - + Harshvardhan J. Pandit + The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + 2024-02-14 accepted - + Incident Suspected + + + + accepted + - Very Low Risk (RM5x5 S:3 L:1) - 0.12,xsd:decimal - 2022-08-17 + Low Risk (RM7x7 S:3 L:3) + 0.18,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - - - - Incident Concluding Report - A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + 2022-08-17 + + + + - + Harshvardhan J. Pandit + + Control that changes Consequence accepted 2024-05-19 + Change Consequence + - + + 2022-08-17 + Lose of Credibility - + - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + accepted - Very High Severity - 2022-08-18 + Something that acts as or causes Loss of Credibility + + 2024-08-16 Harshvardhan J. Pandit - 0.9,xsd:decimal - Level where Severity is Very High - - - + - + + Something that acts as or provides renumeration which is in monetary or financial form - - Harshvardhan J. Pandit - + accepted + Remuneration + - Human Errors + 2024-04-14 2024-08-16 - Something that acts as or causes Human Errors - accepted - 2022-08-17 - + Georg P. Krog, Harshvardhan J. Pandit + - - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - 2022-08-17 + + - + Monitor Control + Control that monitors another Control Harshvardhan J. Pandit - 0.16,xsd:decimal - Low Risk (RM5x5 S:1 L:4) + 2024-05-19 accepted - + - - + + - Reputational Risk - accepted - Risks and issues that affect the reputation of the organisation + 2024-08-16 + Harshvardhan J. Pandit + 2022-08-17 + Violating Ethics Code + modified + This concept was called "ViolationEthicalCode" in DPV 2.0 - + + Something that acts as or causes Violation of Ethics Code + - - - - Something that acts as or causes Psychological Harm + + Harshvardhan J. Pandit - + - Psychological Harm - Harshvardhan J. Pandit + 2022-08-18 + accepted - 2024-08-16 - 2022-08-17 - + 3 Risk Levels + Scale with 3 Risk Levels from High to Low + - - + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit + Limitation of Rights + - 2024-08-16 - Something that acts as or causes Public Order Breach - Public Order Breach - Harshvardhan J. Pandit - accepted - 2022-08-17 - - + This concept was called "LimitationOfRights" in DPV 2.0 + accepted + Something that acts as or causes Limitation of Rights + 2022-08-18 + - - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + - Moderate Risk (RM5x5 S:4 L:2) - 2022-08-17 - Harshvardhan J. Pandit + + 2022-08-17 accepted - 0.32,xsd:decimal + Low Risk (RM5x5 S:1 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low + 0.20,xsd:decimal - - ENISA Threat Landscape for Ransomware Attacks 2022 - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - - Risks and issues that affect or have the potential to affect society at large or specific groups in society - Societal Risk + - - accepted + 2024-05-19 + Notice associated with an Incident - + accepted + Incident Notice + - - Harshvardhan J. Pandit + + High Risk (RM7x7 S:7 L:3) + - - Unauthorised Data Modification + Harshvardhan J. Pandit 2022-08-17 - Something that acts as or causes Unauthorised Data Modification accepted + 0.43,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - - 2024-08-16 - - + - - + + A report describing the suspicion of an incident in the past or occuring + Incident Suspected Report + 2024-05-19 + accepted - accepted - 0.02,xsd:decimal - 2022-08-17 - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + - Extremely Low Risk (RM7x7 S:1 L:1) - - - Privacy + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + accepted - + Something that acts as or causes Component Malfunction + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + Component Malfunction + + - - Fraud - Something that acts as or causes Fraud - 2022-08-17 - accepted - Harshvardhan J. Pandit + - - 2024-08-16 - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - accepted - 2022-08-17 - - - - 0.24,xsd:decimal - Moderate Risk (RM5x5 S:2 L:3) - Harshvardhan J. Pandit - - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - + + - - accepted + + 2024-08-16 Harshvardhan J. Pandit - - - 2022-08-17 - - Moderate Risk (RM7x7 S:6 L:2) - 0.24,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - - - - Violation of Statutory Obligations - + Something that acts as or causes Unwanted Code Deletion + Unwanted Code Deletion + - Something that acts as or causes Violation of Statutory Obligations - modified - 2022-08-17 - Harshvardhan J. Pandit - This concept was called "ViolationStatutoryObligations" in DPV 2.0 - - 2024-08-16 - + accepted + + + + - - Very Low Risk (RM7x7 S:6 L:1) - + + + Containment Control + - 2022-08-17 + 2024-05-19 accepted - - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low - 0.12,xsd:decimal - + Control to contain event + - - 0.04,xsd:decimal - Extremely Low Risk (RM7x7 S:2 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + + 0.86,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + Harshvardhan J. Pandit 2022-08-17 + Extremely High Risk (RM7x7 S:7 L:6) - Harshvardhan J. Pandit accepted - - 2024-05-19 - - - - Environmental Incident + + + + 2024-02-14 accepted - - Incident caused due to environmental factors outside human controls - - - ENISA Reference Incident Classification Taxonomy 2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + Indicates the associated context (subject) is caused by the indicated vulnerability (object) + + caused by vulnerability - - Harshvardhan J. Pandit + + - - 5 Likelihood Levels - Scale with 5 Likelihood Levels from Very High to Very Low - 2022-08-18 + Extremely Low Severity + 0.01,xsd:decimal + Harshvardhan J. Pandit accepted + 2022-08-18 - + Level where Severity is Extremely Low + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + - - Low Risk (RM5x5 S:1 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low - 0.20,xsd:decimal - - Harshvardhan J. Pandit - accepted - - - - 2022-08-17 - + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - Control to remedy consequences of event + + accepted - + - accepted - Remedy Control - 2024-05-19 - + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + Component Failure + Something that acts as or causes Component Failure + + - - + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ ENISA Reference Incident Classification Taxonomy 2018 + - + + - Risks and issues that affect or have the potential to affect specific individuals + 2022-08-17 accepted - Individual Risk + High Risk (RM7x7 S:3 L:6) + 0.37,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + Harshvardhan J. Pandit + - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + Harshvardhan J. Pandit + + Phishing Scam + 2022-08-17 + + + + + accepted + Something that acts as or causes Phishing Scam + 2024-08-16 + + - + - Component Failure + Harshvardhan J. Pandit - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of + Something that acts as or causes Blackmail + 2022-08-17 accepted - Something that acts as or causes Component Failure - - + Blackmail + + 2024-08-16 + + - - accepted + + 0.29,xsd:decimal + - Risk Assessment + Harshvardhan J. Pandit + Moderate Risk (RM7x7 S:2 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate + 2022-08-17 - - ISO 31073:2022 Risk management vocabulary - Assessment of risk involving its identification, analysis, and evaluation - 2024-02-14 + accepted + - + + Deliberate Incident + + + 2024-05-19 accepted - - 2024-08-16 - Something that acts as or causes Sexual Violence - Harshvardhan J. Pandit - - 2022-08-17 - - Sexual Violence - + Incident caused due to deliberate actions of a human - - 2024-05-19 + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + 2024-02-14 - - - An actual or occured event - 2024-08-16 - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + accepted - Incident is realised or materialised risk - Incident - - + Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + Vulnerability - - Level where Likelihood is High - accepted - 2022-08-18 + Harshvardhan J. Pandit + 2022-08-17 - + - High Likelihood - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - - - - - - Harshvardhan J. Pandit accepted - - - - Control that monitors a Risk - 2024-05-19 - Monitor Risk - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High + Extremely High Risk (RM7x7 S:7 L:7) + 0.99,xsd:decimal + - - accepted - Harshvardhan J. Pandit + - Risk Mitigation Measure that controls Impacts + - - Impact Control - 2024-05-19 - + accepted + Coverage Bias + Daniel Doherty + Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + ISO/IEC 24027:2021 + 2024-09-13 + - + accepted - - - 2024-08-16 - Something that acts as or causes Unauthorised Code Access - Unauthorised Code Access - 2022-08-17 - - Harshvardhan J. Pandit - - - - - - - - Low Risk (RM5x5 S:2 L:2) - 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + Identity Fraud + + 2024-08-16 Harshvardhan J. Pandit + Something that acts as or causes Identity Fraud - accepted - 0.16,xsd:decimal - + 2022-08-17 + + - - accepted + + Here equipment refers to physical equipment + Something that acts as or causes Equipment Failure + 2024-08-16 + Equipment Failure - + - Change Impact - 2024-05-19 - Harshvardhan J. Pandit - Control that changes Impact - - - - - + 2022-08-17 accepted - Source of threat event, including both agent and non-agent sources - - Threat Source - 2024-02-14 + + + - - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + - accepted + 0.51,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + Harshvardhan J. Pandit + Very High Risk (RM7x7 S:5 L:5) 2022-08-17 - Very Low Risk (RM7x7 S:2 L:3) - Harshvardhan J. Pandit - 0.12,xsd:decimal + accepted - - + - - - - Something that acts as or causes Impact to Rights - 2024-08-16 - This concept was called "ImpactToRights" in DPV 2.0 - 2022-08-17 - Harshvardhan J. Pandit - accepted - Impact to Rights - - - - - - + Authorisation Failure + 2024-08-16 - accepted - Malicious Code Attack - Something that acts as or causes Malicious Code Attack - - 2022-08-17 Harshvardhan J. Pandit - - - - - - - - - - - - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - caused by vulnerability - accepted - 2024-02-14 - - - Financial Impact + Something that acts as or causes Authorisation Failure + 2022-08-17 accepted - - - - Things that cause or have the potential to impact financial resources - + + + - - Incident caused due to accidental actions arising from human or human-controlled situations + + Harshvardhan J. Pandit + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + Level where Risk is Low + - Accidental Incident - - 2024-05-19 accepted + 0.25,xsd:decimal + Low Risk + 2022-08-18 + + + - - - - - accepted - - Accidental Misuse - Accidental Misuse - + + + + Guides for Data Privacy Vocabulary + + + - - 2022-08-17 - - - Something that acts as or causes Physical Assault + + Harshvardhan J. Pandit - Physical Assault - accepted - 2024-08-16 - Harshvardhan J. Pandit - - - 2022-08-17 - Harshvardhan J. Pandit + Something that acts as or causes System Failure accepted + Here system refers to both hardware and software systems 2024-08-16 - - - - - Something that acts as or causes Blackmail - Blackmail - - + System Failure + + + - + + - - Risks and issues that arise during operational processes + Harshvardhan J. Pandit - Operational Security Risk + 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High accepted - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + 0.60,xsd:decimal + Very High Risk (RM5x5 S:3 L:5) + - - - + + Lose of Customer Confidence + Harshvardhan J. Pandit + 2022-08-17 - Something that acts as or causes Violation of Contractual Obligations - modified - This concept was called "ViolationContractualObligations" in DPV 2.0 + + Something that acts as or causes Loss of Customer Confidence + + accepted 2024-08-16 - Harshvardhan J. Pandit - 2022-08-17 - Violation of Contractual Obligation - + - + + Integrity Incident + - accepted - 2024-05-19 - Deliberate Incident - Incident caused due to deliberate actions of a human - - - Unauthorised Code Modification - + Incident where the integrity of information or system has been affected accepted - 2024-08-16 - Something that acts as or causes Unauthorised Code Modification + + + Unauthorised Access to Premises 2022-08-17 + accepted + 2024-08-16 + Something that acts as or causes Unauthorised Access to Premises + Harshvardhan J. Pandit + + - - 2024-05-19 - + Harshvardhan J. Pandit + High Likelihood - + - Monitor Vulnerabilities - Control that monitors a Risk Vulnerability + 0.75,xsd:decimal accepted - - - + 2022-08-18 - accepted - - - - Something that acts as or causes Coercion - 2024-08-16 - Coercion - 2022-08-17 - Harshvardhan J. Pandit - - - + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + Level where Likelihood is High + + + - - accepted - 2024-08-16 - 2024-02-14 + + - The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk - Risk Source - + accepted + Privacy + - - Something that acts as or provides renumeration which is in monetary or financial form + + Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + ISO/IEC 24027:2021 + 2024-09-13 - + accepted - 2024-04-14 - 2024-08-16 - Georg P. Krog, Harshvardhan J. Pandit - Remuneration - + Daniel Doherty + Group Attribution Bias + - + + A report describing the assessment of an incident in terms of its effects or impacts - - 2022-03-23 - accepted - 2024-08-16 - Detriment + Incident Assessment Report + 2024-05-19 - Something that acts as or causes Detriment - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - + + accepted - - Something that acts as or causes Loss of Trust - Harshvardhan J. Pandit - 2022-08-17 - - + + 5 Severity Levels + - - Lose of Trust - accepted - 2024-08-16 - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - Harshvardhan J. Pandit - 0.06,xsd:decimal + 2022-08-18 accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - - - - Extremely Low Risk (RM7x7 S:1 L:3) - 2022-08-17 - + Scale with 5 Severity Levels from Very High to Very Low + - - Something that acts as or causes Unauthorised System Access - Unauthorised System Access - 2022-08-17 - + + - + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low Harshvardhan J. Pandit - accepted - 2024-08-16 - - - + 2022-08-17 + accepted + 0.16,xsd:decimal + Low Risk (RM7x7 S:2 L:4) + - + + accepted + 0.31,xsd:decimal - Very Low Risk (RM7x7 S:1 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate Harshvardhan J. Pandit - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - 0.10,xsd:decimal - 2022-08-17 + Moderate Risk (RM7x7 S:5 L:3) + - - + + Level where Likelihood is Moderate + Harshvardhan J. Pandit + - Level where Severity is Low - 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - Low Severity - Harshvardhan J. Pandit - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + Moderate Likelihood 2022-08-18 accepted - - - + 0.5,xsd:decimal + + + - + + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High + High Risk (RM3x3 S:3 L:3) + Harshvardhan J. Pandit + 0.99,xsd:decimal - 0.04,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - Harshvardhan J. Pandit - accepted - Extremely Low Risk (RM7x7 S:1 L:2) 2022-08-17 + accepted - + - - + + + Harshvardhan J. Pandit - Incident Terminated + 2022-08-17 accepted - The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring - 2024-02-14 - + Something that acts as or causes Identity Theft + Identity Theft + 2024-08-16 + + - - 2022-08-17 - + + + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low + Extremely Low Risk (RM7x7 S:4 L:1) 0.08,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - Very Low Risk (RM5x5 S:1 L:2) - Harshvardhan J. Pandit - + 2022-08-17 + - - accepted - - - Incident where the availability of information or system has been affected + - - 2024-05-19 - Availability Incident - - - - Something that acts as or causes Unauthorised Resource Use + accepted + 2024-08-16 + Something that acts as or causes Extorsion Harshvardhan J. Pandit + Extorsion 2022-08-17 - Unauthorised Resource Use - - - + - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - + + - - 2024-05-19 - accepted - Control that monitors a Risk Consequence - Monitor Consequence - Harshvardhan J. Pandit - - - - - 2022-08-17 - Equipment Failure - Something that acts as or causes Equipment Failure - - - - 2024-08-16 - Here equipment refers to physical equipment - Harshvardhan J. Pandit accepted - - + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + 2022-08-18 + Extremely High Severity + 0.99,xsd:decimal + Level where Severity is Extremely High + - - Incident Mitigation Measure + + Risk Mitigation Measure that uses controls to monitor events + Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. + Monitor Control + Harshvardhan J. Pandit 2024-05-19 - A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again + accepted - + - - + + + This concept was called "ViolationOfRights" in DPV 2.0 accepted - User Risks - Concepts associated with risks that arise due to User or Human use + Something that acts as or causes Violation of Rights + 2022-08-18 + Violation of Rights + 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit - + - - 2022-08-17 - accepted - - Harshvardhan J. Pandit - - - - Low Risk (RM7x7 S:4 L:2) - 0.16,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low - + + ISO/IEC 27005:2018 + + https://www.iso.org/standard/75281.html - - Reduction Control + + Harshvardhan J. Pandit + - + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 2022-08-18 + accepted - 2024-05-19 + 0.5,xsd:decimal + Level where Severity is Moderate + Moderate Severity + + + + + + 2024-02-14 - Control that reduces the likelihood or severity of an event - + + + has incident + + accepted + Indicates an incident is associated with the specified context + - - - - + - 2022-08-18 - Harshvardhan J. Pandit - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 0.25,xsd:decimal - Low Risk - Level where Risk is Low + 2024-05-19 accepted - - - + A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + + + + Incident Concluding Report - - + + Very High Risk (RM5x5 S:4 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High + - - 2024-08-16 + Harshvardhan J. Pandit + 0.80,xsd:decimal 2022-08-17 - Something that acts as or causes System Intrusion - Harshvardhan J. Pandit accepted - System Intrusion - - - - + - - A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - - Harshvardhan J. Pandit + + 0.86,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High + Harshvardhan J. Pandit 2022-08-17 + + Extremely High Risk (RM7x7 S:6 L:7) accepted - Risk Matrix 3x3 - - - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments + - - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 2022-08-18 - + + 2022-08-17 + - 0.5,xsd:decimal - Level where Risk is Moderate accepted - Moderate Risk + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + Very Low Risk (RM7x7 S:1 L:6) + 0.12,xsd:decimal Harshvardhan J. Pandit - - - + - + - + - This concept was called "HarmfulSpeech" in DPV 2.0 - Something that acts as or causes Harmful Speech - Harshvardhan J. Pandit - - 2024-08-16 - 2022-08-17 - Exposure to Harmful Speech + + 2024-05-19 accepted - + Control that avoids the risk source + Avoid Source + - + + - - Something that acts as or causes Erroneous System Use - Erroneous System Use accepted - 2024-08-16 - + Monitor Risk Source + Control that monitors a Risk Source Harshvardhan J. Pandit - 2022-08-17 - + 2024-05-19 + - - 2022-08-18 - + + Physical Harm + - Level where Severity is Moderate - Harshvardhan J. Pandit - accepted - 0.5,xsd:decimal - Moderate Severity - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - - - - - - - - accepted - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - Moderate Risk (RM5x5 S:3 L:2) - - Harshvardhan J. Pandit - 2022-08-17 - 0.24,xsd:decimal - + - + - + - 0.36,xsd:decimal - Moderate Risk (RM5x5 S:3 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - Harshvardhan J. Pandit accepted + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + 0.11,xsd:decimal + Harshvardhan J. Pandit 2022-08-17 - + Low Risk (RM3x3 S:1 L:1) + - - A report describing the detection of a Incident - 2024-05-19 - - - - accepted + + Harshvardhan J. Pandit - Incident Detection Report - - + Very Low Risk + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 accepted - Scale with 3 Risk Levels from High to Low - 2022-08-18 - - Harshvardhan J. Pandit - 3 Risk Levels - + 0.1,xsd:decimal + 2022-08-18 + Level where Risk is Very Low + + - - + + + Harshvardhan J. Pandit - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - 2024-08-16 - Brute Force Authorisations 2022-08-17 - Harshvardhan J. Pandit + Unauthorised Code Modification accepted - - + Something that acts as or causes Unauthorised Code Modification + 2024-08-16 + - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - ENISA Reference Incident Classification Taxonomy 2018 - - - + + System Malfunction + - Very High Risk (RM7x7 S:7 L:4) - - Harshvardhan J. Pandit accepted + Something that acts as or causes System Malfunction + Here system refers to both hardware and software systems + 2024-08-16 + Harshvardhan J. Pandit + 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High - 0.57,xsd:decimal - + + + - - accepted - 2022-08-17 - + + Very Low Likelihood + 0.1,xsd:decimal + Level where Likelihood is Very Low + Harshvardhan J. Pandit + - High Risk (RM7x7 S:7 L:3) - Harshvardhan J. Pandit - 0.43,xsd:decimal - - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - - - - - + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 - - is vulnerability of - - 2024-02-14 - Indicates the vulnerability (subject) is associated with indicated context (object) accepted + + - - Extremely High Risk (RM7x7 S:7 L:5) + + + 2022-08-17 + Very Low Risk (RM7x7 S:6 L:1) - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - - Harshvardhan J. Pandit accepted - 0.71,xsd:decimal + 0.12,xsd:decimal + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low + Harshvardhan J. Pandit - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - + - accepted - 0.33,xsd:decimal + Harshvardhan J. Pandit 2022-08-17 - High Risk (RM7x7 S:4 L:4) + 0.49,xsd:decimal + Very High Risk (RM7x7 S:6 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + accepted - - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - High Risk (RM5x5 S:2 L:5) - + + + 2022-08-17 + accepted + - 0.40,xsd:decimal - 2022-08-17 - + Something that acts as or causes Account Credentials to be compromised + + Compromise Account Credentials + 2024-08-16 Harshvardhan J. Pandit - accepted - + + - + + + + Risk Concepts - RDF/XML serialiation + + + + + + Judicial Costs + Something that involves or causes judicial costs to be paid accepted - - + - - https://www.iso.org/standard/75281.html + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - + + Data Processing Bias + Daniel Doherty + 2024-09-13 + Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias - + - 2022-08-17 - Extremely Low Risk (RM7x7 S:3 L:1) - Harshvardhan J. Pandit - accepted - 0.06,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - - - + ISO/IEC 24027:2021 - - - - Compensation - 2024-04-14 - Georg P. Krog, Harshvardhan J. Pandit accepted - 2024-08-16 - Something that acts as or provides compensation - which can be monetary and financial or in other forms - + - + + Share Risk + Harshvardhan J. Pandit - Benefit - 2022-03-23 + 2024-05-19 + - - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - Something that acts as or causes benefits - 2024-08-16 accepted - + Risk Mitigation Measure that shares Risk e.g. amongst stakeholders + - - - - Confidentiality Incident - 2024-05-19 - Incident where the confidentiality of information or system has been affected - - - accepted + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + ENISA Reference Incident Classification Taxonomy 2018 - + + 2022-08-17 + 0.14,xsd:decimal + - accepted - A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known - 2024-05-19 - Incident Preliminary Report - + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low + Low Risk (RM7x7 S:7 L:1) + Harshvardhan J. Pandit + - - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + + Harshvardhan J. Pandit + Something that acts as or causes Malware Attack + 2022-08-17 - + - 2022-08-17 - High Risk (RM7x7 S:3 L:6) - Harshvardhan J. Pandit + Malware Attack accepted - 0.37,xsd:decimal - - - - ENISA Threat Taxonomy 2016 - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + 2024-08-16 + + + + - - Harshvardhan J. Pandit + + Daniel Doherty + Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + ISO/IEC 24027:2021 + + 2024-09-13 + Selection Bias accepted - + - - Very High Risk (RM5x5 S:3 L:5) - 0.60,xsd:decimal - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - 2022-08-17 - + - - 2022-08-17 - + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + - 0.08,xsd:decimal - Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low accepted - Very Low Risk (RM7x7 S:1 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High + 0.61,xsd:decimal + Harshvardhan J. Pandit + 2022-08-17 + Extremely High Risk (RM7x7 S:5 L:6) - - Risk Management + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + Harshvardhan J. Pandit + 2022-08-17 + accepted + - accepted - ISO 31073:2022 Risk management vocabulary - - 2024-06-12 - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk + Something that acts as or causes Unauthorised Information Disclosure + + Unauthorised Information Disclosure + 2024-08-16 + + - + + + + + + + Risk Concepts - JSON-LD serialiation + + + Harshvardhan J. Pandit + modified - Georg P. Krog, Harshvardhan J. Pandit - 2024-08-16 - 2024-04-14 - accepted - Reward - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - + 2022-08-17 + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + Something that acts as or causes Violation of Legal Obligations + Violation of Legal Obligations + 2024-08-16 + + - - Something that acts as or causes Loss of Reputation + - 2022-08-17 - Harshvardhan J. Pandit + 2022-08-17 accepted + Something that acts as or causes Cryptojacking + Cryptojacking 2024-08-16 - Lose of Reputation - - + + Harshvardhan J. Pandit + + - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 + + + + + Risk Concepts - N3 serialiation + + + + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments - - 2024-05-19 - + + Risks and issues that arise during operational processes + - Control that removes the risk source - Remove Source - Harshvardhan J. Pandit + Operational Security Risk accepted - - - - https://www.iso.org/standard/75281.html - - ISO/IEC 27005:2018 + - - 2022-08-18 - accepted - + + Low Risk (RM7x7 S:2 L:5) + - 3 Severity Levels + Harshvardhan J. Pandit + 0.20,xsd:decimal + 2022-08-17 + accepted - Scale with 3 Severity Levels from High to Low + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + + + + 0.20,xsd:decimal + + + Harshvardhan J. Pandit - + 2022-08-17 + + accepted + Low Risk (RM5x5 S:5 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low + - - Something that acts as or causes violation of policy which can be either internal or external policy + + Very High Risk + Harshvardhan J. Pandit + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + + + + 2022-08-18 + 0.9,xsd:decimal + accepted + Level where Risk is Very High + + + + + Something that acts as or causes Violation of Contractual Obligations + Violation of Contractual Obligation + Harshvardhan J. Pandit + This concept was called "ViolationContractualObligations" in DPV 2.0 + 2022-08-17 - Violating Policy - accepted + + modified + + 2024-08-16 - + - + - 2022-08-18 - Harshvardhan J. Pandit - Scale with 7 Likelihood Levels from Extremely High to Extremely Low - accepted - 7 Likelihood Levels + ISO/IEC 24027:2021 - + 2024-09-13 + accepted + Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + Bias + Daniel Doherty + - - Harshvardhan J. Pandit + + + High Risk (RM5x5 S:5 L:3) accepted - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + 0.60,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High 2022-08-17 - 0.24,xsd:decimal - - Moderate Risk (RM7x7 S:3 L:4) - + Harshvardhan J. Pandit + - - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - ENISA Threat Taxonomy 2016 + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + Payment - 2024-08-16 - Injury - 2022-08-17 - Something that acts as or causes Injury - - Harshvardhan J. Pandit accepted - + Something that acts as or provides payment e.g. to access a service or purchase resources + 2024-04-14 + 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + High Risk + Level where Risk is High - 7 Risk Levels - accepted + 0.75,xsd:decimal Harshvardhan J. Pandit - 2022-08-18 - - Scale with 7 Risk Levels from Extremely High to Extremely Low - - - - - - - Integrity Incident - 2024-05-19 - Incident where the integrity of information or system has been affected accepted + 2022-08-18 + + + - - Georg P. Krog, Harshvardhan J. Pandit - 2024-08-16 + + A register recording incidentes, their reports, notifications, and other related activities + Harshvardhan J. Pandit - - - Violation of Rights - 2022-08-18 - This concept was called "ViolationOfRights" in DPV 2.0 - Something that acts as or causes Violation of Rights + Incident Register + + 2024-05-19 accepted - + - + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + Harshvardhan J. Pandit - Control that monitors another Control + 3 Severity Levels + + + + Scale with 3 Severity Levels from High to Low + 2022-08-18 accepted + + + + 2024-05-19 - Monitor Control - - - - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + accepted + Halt Source + Control that halts the risk source or prevents it from materialising Harshvardhan J. Pandit + + + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + 0.40,xsd:decimal - Very High Risk (RM7x7 S:6 L:5) - 2022-08-17 + High Risk (RM5x5 S:2 L:5) + Harshvardhan J. Pandit + 2022-08-17 accepted - 0.61,xsd:decimal - + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + - - 2022-08-17 - - Harshvardhan J. Pandit - + + - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - Very Low Risk (RM5x5 S:1 L:3) - 0.12,xsd:decimal + 0.99,xsd:decimal + Harshvardhan J. Pandit + + 2022-08-17 accepted + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High + Very High Risk (RM5x5 S:5 L:5) - + + Concepts associated with risks that arise due to User or Human use - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - 2022-08-17 + accepted - + - Harshvardhan J. Pandit - Low Risk (RM5x5 S:4 L:1) - 0.16,xsd:decimal - accepted - + User Risks + - - https://www.iso.org/standard/72140.html + + https://www.iso.org/standard/72140.html IEC 31010:2019 - - 2022-08-18 + + + + + + + Risk Concepts - Turtle serialiation + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + Harshvardhan J. Pandit - accepted + 2022-08-17 + accepted - + - 3 Likelihood Levels - Scale with 3 Likelihood Levels from High to Low - + + Unauthorised Data Disclosure + Something that acts as or causes Unauthorised Data Disclosure + 2024-08-16 + + - - - + - - 0.20,xsd:decimal - Low Risk (RM7x7 S:2 L:5) - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - 2022-08-17 - Harshvardhan J. Pandit - - - - Risk Analysis - - A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - - + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low Harshvardhan J. Pandit + + 2022-08-17 accepted - 2022-08-18 + Very Low Risk (RM5x5 S:1 L:1) + 0.04,xsd:decimal + - - - - - 2024-08-16 - Something that acts as or causes Interception of Communications - - 2022-08-17 - modified - This concept was called "InterceptionCommunications" in DPV 2.0 - Intercept Communications - - Harshvardhan J. Pandit - - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - Risk Concepts - HTML serialiation - - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - 7 Severity Levels + + - - accepted - 2022-08-18 - Scale with 7 Severity Levels from Extremely High to Extremely Low - - Harshvardhan J. Pandit - - - + Societal Health & Safety accepted - - - - Control that reduces the severity of an event - Reduce Severity - 2024-05-19 - Harshvardhan J. Pandit - + - - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High - Harshvardhan J. Pandit - accepted + + + - - - Very High Risk (RM7x7 S:6 L:4) - 0.49,xsd:decimal - 2022-08-17 - - - - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - - - 0.20,xsd:decimal - 2022-08-17 accepted - Low Risk (RM7x7 S:5 L:2) - + 2024-08-16 Harshvardhan J. Pandit - + Physical Assault + 2022-08-17 + Something that acts as or causes Physical Assault + - - 2022-08-18 - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - Extremely Low Risk + + Confirmation Bias + Daniel Doherty + ISO/IEC 24027:2021 + 2024-09-13 + Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information - + - accepted - Level where Risk is Extremely Low - Harshvardhan J. Pandit - - - - 2024-05-19 accepted - Harshvardhan J. Pandit + + + + Security Attack - + - Control that monitors a Risk Source - Monitor Risk Source + Something that acts as or causes an attack on security with the aim of undermining it - + accepted + + + + - - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + + Very High Risk (RM7x7 S:7 L:4) + Harshvardhan J. Pandit - accepted - - Harshvardhan J. Pandit 2022-08-17 - 0.80,xsd:decimal - Very High Risk (RM5x5 S:5 L:4) - + 0.57,xsd:decimal + + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High + accepted + - + + 2022-03-30 + Harshvardhan J. Pandit + accepted 2024-08-16 - Compromise Account Credentials - 2022-08-17 - - Something that acts as or causes Account Credentials to be compromised - Harshvardhan J. Pandit - accepted - - + Damage + Something that acts as or causes Damage + - - - Identity Fraud + - + - Something that acts as or causes Identity Fraud + + 0.02,xsd:decimal Harshvardhan J. Pandit 2022-08-17 + Extremely Low Risk (RM7x7 S:1 L:1) + accepted + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + + + + has vulnerability + + + + 2024-02-14 + Indicates the associated context (subject) has indicated vulnerability (object) + accepted - 2024-08-16 - - - + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + - accepted - - Incident Notice - Notice associated with an Incident - 2024-05-19 + Daniel Doherty + Informativeness Bias + Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + 2024-09-13 + ISO/IEC 24027:2021 + - + 2024-05-19 accepted - Control that removes Consequence i.e. prevents it from materialising + Control that removes the risk source + Remove Source Harshvardhan J. Pandit - Remove Consequence - + - - Unauthorised Data Access - + + Very Low Risk (RM5x5 S:2 L:1) Harshvardhan J. Pandit - - 2022-08-17 - + + + 2022-08-17 accepted - 2024-08-16 - Something that acts as or causes Unauthorised Data Access - - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + 0.08,xsd:decimal + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + - - - Harshvardhan J. Pandit + + 2022-08-17 + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - Extremely High Risk (RM7x7 S:6 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - accepted - 2022-08-17 - 0.73,xsd:decimal - - - - 2022-08-17 - + 0.32,xsd:decimal accepted + Moderate Risk (RM5x5 S:4 L:2) + Harshvardhan J. Pandit + + + 2024-08-16 + + Harshvardhan J. Pandit + 2022-08-17 - Lose of Credibility - Something that acts as or causes Loss of Credibility - Harshvardhan J. Pandit - - - - Something that acts as or causes Non-Material Damage + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + accepted + Brute Force Authorisations + + + + + - The criteria for what is considered material damage is based in jurisdictional laws and norms - Non-Material Damage - Harshvardhan J. Pandit + accepted + + Coercion 2024-08-16 - 2022-03-30 - - - + Something that acts as or causes Coercion Harshvardhan J. Pandit - 0.60,xsd:decimal - - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High - High Risk (RM5x5 S:5 L:3) 2022-08-17 - - - - accepted - + + - - accepted + - 2024-02-14 - Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk - - Vulnerability - - - - - 2024-05-19 - accepted - Reduce Likelihood - Harshvardhan J. Pandit - Control that reduces the likelihood of an event + Identifier associated with an incident - + accepted + Incident Identifier - - 0.99,xsd:decimal - Level where Risk is Extremely High + + + - - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 2022-08-18 accepted - Extremely High Risk - - Harshvardhan J. Pandit - + Prevent Exercising of Rights + 2022-08-18 + This concept was called "PreventExercisingOfRights" in DPV 2.0 + 2024-08-16 + Georg P. Krog, Harshvardhan J. Pandit + Something that acts as or causes Prevent Exercising of Rights + - - has threat source - - - 2024-02-14 - Indicates the threat (subject) has the indicated source (object) + - - - - + + + + Something that acts as or causes Unauthorised Activity accepted + Unauthorised Activity + + + + - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - + + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + Harshvardhan J. Pandit - accepted - 2024-08-16 - Something that acts as or causes Copyright Violation - - Copyright Violation - + 0.41,xsd:decimal 2022-08-17 - - - accepted - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - Harshvardhan J. Pandit - - - - Very Low Risk (RM7x7 S:3 L:2) - 0.12,xsd:decimal - 2022-08-17 + High Risk (RM7x7 S:4 L:5) - - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - - Very High Risk (RM5x5 S:4 L:5) - - - - 0.80,xsd:decimal - 2022-08-17 - Harshvardhan J. Pandit - accepted - + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + - - - - Risk Concepts - Turtle serialiation - - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + + Primer for Data Privacy Vocabulary + + - - accepted - - - 2024-02-14 - Threat - Risk source event which causes Risk + + Daniel Doherty + 2024-09-13 + - - + Societal Bias + Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + ISO/IEC 24027:2021 + accepted + + + + Accidental Incident + Incident caused due to accidental actions arising from human or human-controlled situations + + 2024-05-19 - - Something that acts as or causes Unauthorised Activity - Unauthorised Activity + accepted - - - - - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - + + Risk Mitigation Measure that controls the Source + Source Control - + - - Something that acts as or causes Violation of Legal Obligations - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - 2024-08-16 - - 2022-08-17 - Violation of Legal Obligations Harshvardhan J. Pandit - modified - - - - - - - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - 0.44,xsd:decimal - Moderate Risk (RM3x3 S:2 L:2) - 2022-08-17 - accepted - Harshvardhan J. Pandit - + accepted + 2024-05-19 + - - 0.51,xsd:decimal - Very High Risk (RM7x7 S:5 L:5) + + Harshvardhan J. Pandit 2022-08-17 + 0.57,xsd:decimal - Harshvardhan J. Pandit accepted - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + Very High Risk (RM7x7 S:4 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - - + - + 2024-02-14 + + The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk accepted - 0.12,xsd:decimal - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low - Very Low Risk (RM7x7 S:1 L:6) - Harshvardhan J. Pandit - + Risk Source + 2024-08-16 + - + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + 2022-08-17 + accepted + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + - - accepted - Control that avoids the risk source - 2024-05-19 + 0.48,xsd:decimal + High Risk (RM5x5 S:4 L:3) Harshvardhan J. Pandit - Avoid Source - - - - - Guides for Data Privacy Vocabulary - - - - + - - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - - ENISA Threat Landscape 2021 - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - 0.86,xsd:decimal - + + - 2022-08-17 - Harshvardhan J. Pandit + + Human Errors + 2022-08-17 accepted - Extremely High Risk (RM7x7 S:7 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High - + 2024-08-16 + Something that acts as or causes Human Errors + + - + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - + + + + + accepted + 2024-02-14 + + + exploits vulnerability + + + Indicates the threat (subject) exploits the indicated vulnerability (object) + + + Identification Control - 2024-05-19 - Containment Control + 2024-05-19 + Control to identify characteristics of event accepted - Control to contain event - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - + + + - Recovery Control accepted - Control to recover from event - 2024-05-19 - - + Very High Risk (RM7x7 S:3 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High + 0.43,xsd:decimal + Harshvardhan J. Pandit + 2022-08-17 + - - + + Something that acts as or causes Loss of Opportunity + + 2024-08-16 + Lose of Opportunity + Harshvardhan J. Pandit + 2022-08-17 - 0.33,xsd:decimal - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - Moderate Risk (RM3x3 S:1 L:3) - Harshvardhan J. Pandit accepted - - - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments - + - - Environmental Risk + + + accepted + + + Misuse + Delaram Golpayegani + Something that acts as or causes Misuse + 2024-06-11 + 2024-08-16 + + + + Reduce Likelihood + Control that reduces the likelihood of an event + Harshvardhan J. Pandit + - accepted - Risks and issues that have their origin in environment or can affect the environment at large + 2024-05-19 - + accepted + - - ENISA Methodology for Sectoral Cybersecurity Assessments + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 - - - accepted + - - 2024-08-16 - Something that acts as or causes Sabotage - Sabotage - 2022-08-17 - Harshvardhan J. Pandit - - - - + + + 2024-05-19 + Incident involving cross-border or multiple jurisdictions + accepted + Cross-Border Incident - + Harshvardhan J. Pandit - 0.9,xsd:decimal + 2024-02-14 + The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring + - - Very High Likelihood - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 - Level where Likelihood is Very High - 2022-08-18 - accepted - - + accepted + Incident Concluded + - + - - accepted + + Risk Analysis + Harshvardhan J. Pandit - Control that monitors a Risk Impact - 2024-05-19 + A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures + 2022-08-18 - Monitor Impact - + accepted - - 0.08,xsd:decimal + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + Control that reduces the likelihood or severity of an event + 2024-05-19 - accepted + - - Very Low Risk (RM5x5 S:2 L:1) - 2022-08-17 - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - Harshvardhan J. Pandit - + Reduction Control + accepted + - - + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + ISO/IEC 24027:2021 + Simpson'S Paradox Bias + Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + 2024-09-13 + - accepted - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - Harshvardhan J. Pandit - 2022-08-18 - Very Low Risk - 0.1,xsd:decimal - Level where Risk is Very Low - - + accepted + Daniel Doherty + - - 0.99,xsd:decimal - + + + + + Risk Concepts - HTML serialiation + + + + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + - 2022-08-17 - Extremely High Risk (RM7x7 S:7 L:7) - Harshvardhan J. Pandit + A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High + Incident Mitigation Measure accepted - + 2024-05-19 + - - https://www.iso.org/standard/75281.html + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - + + 2024-08-16 + 2022-03-30 + Harshvardhan J. Pandit + Something that acts as or causes Material Damage - Something that acts as or causes Loss of Negotiating Capacity - 2022-08-17 - Harshvardhan J. Pandit + Material Damage accepted - Lose of Negotiating Capacity - - 2024-08-16 - + The criteria for what is considered material damage is based in jurisdictional laws and norms + - + accepted - External Security Threat + 0.06,xsd:decimal + + - - Concepts associated with security threats that are likely to originate externally - - + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low + Extremely Low Risk (RM7x7 S:1 L:3) + Harshvardhan J. Pandit + 2022-08-17 + - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - - - Examples for Data Privacy Vocabulary + https://www.iso.org/standard/72140.html + IEC 31010:2019 - + + accepted + - 2024-05-19 - accepted - Incident Identifier - Identifier associated with an incident - + + - - Extremely High Risk (RM7x7 S:5 L:7) - accepted - Harshvardhan J. Pandit - + + + - 2022-08-17 - - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High - 0.71,xsd:decimal - + accepted + External Security Threat + Concepts associated with security threats that are likely to originate externally + - - Very High Risk (RM7x7 S:4 L:7) - + + Incident Halted + - 2022-08-17 - Harshvardhan J. Pandit accepted - 0.57,xsd:decimal - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High - + The incident has halted or paused with a high likelihood of resuming or recurring + 2024-02-14 + Harshvardhan J. Pandit + - + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - Harshvardhan J. Pandit - + + Something that acts as or causes benefits + 2024-08-16 + 2022-03-23 + Benefit + - Risk Matrix 7x7 - A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - 2022-08-17 - accepted + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - + accepted + - - + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + + + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Methodology for Sectoral Cybersecurity Assessments + + + + A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known + Incident Preliminary Report - 2024-08-16 - Something that acts as or causes Cryptojacking - Cryptojacking - 2022-08-17 + 2024-05-19 + - Harshvardhan J. Pandit - accepted - - - - Harshvardhan J. Pandit + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + ENISA Threat Landscape for Ransomware Attacks 2022 + + - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - Level where Severity is Very Low + 0.9,xsd:decimal 2022-08-18 - Very Low Severity accepted - 0.1,xsd:decimal - + Very High Severity + Harshvardhan J. Pandit + Level where Severity is Very High + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + - - + + accepted - - accepted - Individual Health & Safety - + + Incident where the confidentiality of information or system has been affected + Confidentiality Incident + 2024-05-19 + - + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of - Component Malfunction - accepted - Something that acts as or causes Component Malfunction + Unauthorised Re-Identification + Something that acts as or causes Unauthorised Re-Identification + 2022-08-19 + 2024-08-16 + Georg P. Krog - - + accepted + + - + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - + + Moderate Risk (RM7x7 S:3 L:4) + 0.24,xsd:decimal + accepted - 0.86,xsd:decimal Harshvardhan J. Pandit - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - Extremely High Risk (RM7x7 S:6 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate 2022-08-17 - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + + Intentional Misuse + Intentional Misuse + - Judicial Penalty - Something that involves or causes judicial penalties to be paid - accepted - - - - - Harshvardhan J. Pandit accepted - 2024-08-16 - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - - - - - Financial Loss - 2022-08-17 - + - - + + The state where an incident was almost successful in taking place i.e. "it came very close" + 2024-02-14 + - 2022-08-17 - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - Harshvardhan J. Pandit - accepted - High Risk (RM7x7 S:6 L:3) - 0.37,xsd:decimal - + + Incident Near Miss + Harshvardhan J. Pandit + - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 + - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - https://www.iso.org/standard/72140.html - - IEC 31010:2019 - - - https://www.iso.org/standard/75281.html + + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + ENISA Threat Landscape for Ransomware Attacks 2022 - ISO/IEC 27005:2018 - - - - - - - Risk Concepts - N3 serialiation - - - - - - - Primer for Data Privacy Vocabulary - + + An impact assessment associated with a incident + Incident Impact Assessment + + + + Harshvardhan J. Pandit + + 2024-05-19 + accepted - - https://www.iso.org/standard/75281.html + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - - accepted + + + 2024-02-14 - - 2024-05-19 - Incident Report - Documented information about an incident, its handling, assessments,and notifications + + Threat Source + Source of threat event, including both agent and non-agent sources + accepted - + + Low Risk (RM3x3 S:1 L:2) - 2022-08-17 + 0.22,xsd:decimal Harshvardhan J. Pandit - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - High Risk (RM5x5 S:5 L:2) + 2022-08-17 accepted - 0.40,xsd:decimal - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low + - - ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - - - Indicates the cause of associated context (subject) was the indicated threat (object) - - 2024-02-14 - caused by threat - accepted - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments + + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + ENISA Threat Taxonomy 2016 - - + + + Control that modifies risk accepted - Something that acts as or causes an attack on security with the aim of undermining it - Security Attack - - - - + 2024-05-19 + Risk Control + - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - - - Risk Concepts - JSON-LD serialiation - - - + + ENISA Reference Incident Classification Taxonomy 2018 + + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + + https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 + + + Environmental Risk accepted - Legal Risk - Risks and issues that have their basis in legal requirements and enforcement - + Risks and issues that have their origin in environment or can affect the environment at large + - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - Physical Harm + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + accepted + Individual Health & Safety - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - https://www.iso.org/standard/75281.html - ISO/IEC 27005:2018 - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - - - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - https://www.iso.org/standard/75281.html + + https://www.iso.org/standard/75281.html ISO/IEC 27005:2018 - - - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - ENISA Reference Incident Classification Taxonomy 2018 - - - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - ENISA Methodology for Sectoral Cybersecurity Assessments - - - + - ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html + ISO/IEC 27005:2018 diff --git a/2.1-dev/risk/risk-owl.ttl b/2.1-dev/risk/risk-owl.ttl index f47d70a7a..93c712a51 100644 --- a/2.1-dev/risk/risk-owl.ttl +++ b/2.1-dev/risk/risk-owl.ttl @@ -190,6 +190,18 @@ risk-owl:Benefit a rdfs:Class, skos:definition "Something that acts as or causes benefits"@en ; skos:prefLabel "Benefit"@en . +risk-owl:Bias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:RiskConcept ; + sw:term_status "accepted"@en ; + skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; + skos:prefLabel "Bias"@en . + risk-owl:Blackmail a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -261,6 +273,18 @@ risk-owl:Coercion a rdfs:Class, skos:definition "Something that acts as or causes Coercion"@en ; skos:prefLabel "Coercion"@en . +risk-owl:CognitiveBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; + skos:prefLabel "Cognitive Bias"@en . + risk-owl:Compensation a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -354,6 +378,30 @@ risk-owl:ConfidentialityIncident a rdfs:Class, skos:definition "Incident where the confidentiality of information or system has been affected"@en ; skos:prefLabel "Confidentiality Incident"@en . +risk-owl:ConfirmationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; + skos:prefLabel "Confirmation Bias"@en . + +risk-owl:ConfoundingVariablesBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; + skos:prefLabel "Confounding Variables Bias"@en . + risk-owl:ConsequenceControl a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -390,6 +438,18 @@ risk-owl:CopyrightViolation a rdfs:Class, skos:definition "Something that acts as or causes Copyright Violation"@en ; skos:prefLabel "Copyright Violation"@en . +risk-owl:CoverageBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; + skos:prefLabel "Coverage Bias"@en . + risk-owl:CrossBorderIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -427,6 +487,30 @@ risk-owl:Damage a rdfs:Class, skos:definition "Something that acts as or causes Damage"@en ; skos:prefLabel "Damage"@en . +risk-owl:DataAggregationBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; + skos:prefLabel "Data Aggregation Bias"@en . + +risk-owl:DataBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:Bias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; + skos:prefLabel "Data Bias"@en . + risk-owl:DataBreach a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -464,6 +548,18 @@ risk-owl:DataCorruption a rdfs:Class, skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . +risk-owl:DataProcessingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; + skos:prefLabel "Data Processing Bias"@en . + risk-owl:DeliberateIncident a rdfs:Class, owl:Class ; dct:created "2024-05-19"^^xsd:date ; @@ -778,6 +874,18 @@ risk-owl:Fraud a rdfs:Class, skos:definition "Something that acts as or causes Fraud"@en ; skos:prefLabel "Fraud"@en . +risk-owl:GroupAttributionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; + skos:prefLabel "Group Attribution Bias"@en . + risk-owl:HaltSource a rdfs:Class, owl:Class, risk-owl:RiskControl ; @@ -931,6 +1039,30 @@ risk-owl:ImpactControl a rdfs:Class, skos:definition "Risk Mitigation Measure that controls Impacts"@en ; skos:prefLabel "Impact Control"@en . +risk-owl:ImplicitBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; + skos:prefLabel "Implicit Bias"@en . + +risk-owl:InGroupBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; + skos:prefLabel "In-Group Bias"@en . + risk-owl:Incident a rdfs:Class, owl:Class ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; @@ -1180,6 +1312,18 @@ risk-owl:IndividualRisk a rdfs:Class, skos:definition "Risks and issues that affect or have the potential to affect specific individuals"@en ; skos:prefLabel "Individual Risk"@en . +risk-owl:InformativenessBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:EngineeringDecisionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; + skos:prefLabel "Informativeness Bias"@en . + risk-owl:Injury a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -1612,6 +1756,30 @@ risk-owl:NonMaterialDamage a rdfs:Class, skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk-owl:NonNormalityBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; + skos:prefLabel "Non-Normality Bias"@en . + +risk-owl:NonResponseBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; + skos:prefLabel "Non-Response Bias"@en . + risk-owl:OperationalSecurityRisk a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -1621,6 +1789,18 @@ risk-owl:OperationalSecurityRisk a rdfs:Class, skos:definition "Risks and issues that arise during operational processes"@en ; skos:prefLabel "Operational Security Risk"@en . +risk-owl:OutGroupHomogeneityBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; + skos:prefLabel "Out-Group Homogeneity Bias"@en . + risk-owl:Payment a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -2841,6 +3021,19 @@ risk-owl:ReputationalRisk a rdfs:Class, skos:definition "Risks and issues that affect the reputation of the organisation"@en ; skos:prefLabel "Reputational Risk"@en . +risk-owl:RequirementsBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs in or during requirements creation"@en ; + skos:prefLabel "Requirements Bias"@en ; + skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . + risk-owl:Reward a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -3009,6 +3202,19 @@ risk-owl:RiskSource a rdfs:Class, skos:definition "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk"@en ; skos:prefLabel "Risk Source"@en . +risk-owl:RuleBasedSystemDesign a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; + skos:prefLabel "Rule-Based System Design"@en ; + skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . + risk-owl:Sabotage a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -3026,6 +3232,18 @@ risk-owl:Sabotage a rdfs:Class, skos:definition "Something that acts as or causes Sabotage"@en ; skos:prefLabel "Sabotage"@en . +risk-owl:SamplingBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:SelectionBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; + skos:prefLabel "Sampling Bias"@en . + risk-owl:Scam a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -3072,6 +3290,18 @@ risk-owl:SecurityBreach a rdfs:Class, skos:definition "Something that acts as or causes Security Breach"@en ; skos:prefLabel "Security Breach"@en . +risk-owl:SelectionBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:StatisticalBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; + skos:prefLabel "Selection Bias"@en . + risk-owl:SexualViolence a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -3098,6 +3328,18 @@ risk-owl:ShareRisk a rdfs:Class, skos:definition "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders"@en ; skos:prefLabel "Share Risk"@en . +risk-owl:SimpsonsParadoxBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; + skos:prefLabel "Simpson'S Paradox Bias"@en . + risk-owl:SocialDisadvantage a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -3110,6 +3352,18 @@ risk-owl:SocialDisadvantage a rdfs:Class, skos:definition "Something that acts as or causes Social Disadvantage"@en ; skos:prefLabel "Social Disadvantage"@en . +risk-owl:SocietalBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:CognitiveBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; + skos:prefLabel "Societal Bias"@en . + risk-owl:SocietalHealthSafety a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -3159,6 +3413,18 @@ risk-owl:Spoofing a rdfs:Class, skos:definition "Something that acts as or causes Spoofing"@en ; skos:prefLabel "Spoofing"@en . +risk-owl:StatisticalBias a rdfs:Class, + owl:Class, + risk-owl:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO 20501:2019"@en ; + rdfs:isDefinedBy risk-owl: ; + rdfs:subClassOf risk-owl:DataBias ; + sw:term_status "accepted"@en ; + skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; + skos:prefLabel "Statistical Bias"@en . + risk-owl:SystemFailure a rdfs:Class, owl:Class, dpv-owl:RiskConcept ; @@ -3892,6 +4158,7 @@ risk-owl: a owl:Ontology, "http://www.w3.org/2004/02/skos/core" ; dct:contributor "Axel Polleres", "Beatriz Esteves", + "Daniel Doherty", "Delaram Golpayegani", "Fajar Ekaputra", "Georg P. Krog", diff --git a/2.1-dev/risk/risk.csv b/2.1-dev/risk/risk.csv index 4f83e0524..8f70e883f 100644 --- a/2.1-dev/risk/risk.csv +++ b/2.1-dev/risk/risk.csv @@ -10,44 +10,52 @@ term,type,iri,label,definition,dpvtype,subclassof,hasbroader,scopenote,created,m 7SeverityLevels,class,https://w3id.org/dpv/risk#7SeverityLevels,7 Severity Levels,Scale with 7 Severity Levels from Extremely High to Extremely Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv#Severity,,2022-08-18,,risk,https://w3id.org/dpv/risk AccidentalIncident,class,https://w3id.org/dpv/risk#AccidentalIncident,Accidental Incident,Incident caused due to accidental actions arising from human or human-controlled situations,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk AccidentalMisuse,class,https://w3id.org/dpv/risk#AccidentalMisuse,Accidental Misuse,Accidental Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk -AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +AuthorisationFailure,class,https://w3id.org/dpv/risk#AuthorisationFailure,Authorisation Failure,Something that acts as or causes Authorisation Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk AvailabilityIncident,class,https://w3id.org/dpv/risk#AvailabilityIncident,Availability Incident,Incident where the availability of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk AvoidSource,class,https://w3id.org/dpv/risk#AvoidSource,Avoid Source,Control that avoids the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk Benefit,class,https://w3id.org/dpv/risk#Benefit,Benefit,Something that acts as or causes benefits,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk -Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Bias,class,https://w3id.org/dpv/risk#Bias,Bias,"Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#RiskConcept,,2024-09-13,,risk,https://w3id.org/dpv/risk +Blackmail,class,https://w3id.org/dpv/risk#Blackmail,Blackmail,Something that acts as or causes Blackmail,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +BruteForceAuthorisations,class,https://w3id.org/dpv/risk#BruteForceAuthorisations,Brute Force Authorisations,Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ChangeConsequence,class,https://w3id.org/dpv/risk#ChangeConsequence,Change Consequence,Control that changes Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ChangeImpact,class,https://w3id.org/dpv/risk#ChangeImpact,Change Impact,Control that changes Impact,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Coercion,class,https://w3id.org/dpv/risk#Coercion,Coercion,Something that acts as or causes Coercion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CognitiveBias,class,https://w3id.org/dpv/risk#CognitiveBias,Cognitive Bias,Bias that occurs when humans are processing and interpreting information,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk Compensation,class,https://w3id.org/dpv/risk#Compensation,Compensation,Something that acts as or provides compensation - which can be monetary and financial or in other forms,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk -ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk -CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#DataBreach;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ComponentFailure,class,https://w3id.org/dpv/risk#ComponentFailure,Component Failure,Something that acts as or causes Component Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#AvailabilityConcept,Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +ComponentMalfunction,class,https://w3id.org/dpv/risk#ComponentMalfunction,Component Malfunction,Something that acts as or causes Component Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#AvailabilityConcept,Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of,,,risk,https://w3id.org/dpv/risk +CompromiseAccount,class,https://w3id.org/dpv/risk#CompromiseAccount,Compromise Account,Something that acts as or causes a compromised account that is then used by the compromiser,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CompromiseAccountCredentials,class,https://w3id.org/dpv/risk#CompromiseAccountCredentials,Compromise Account Credentials,Something that acts as or causes Account Credentials to be compromised,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +ConfidentialityBreach,class,https://w3id.org/dpv/risk#ConfidentialityBreach,Confidentiality Breach,Something that acts as or causes Confidentiality Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#DataBreach,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ConfidentialityIncident,class,https://w3id.org/dpv/risk#ConfidentialityIncident,Confidentiality Incident,Incident where the confidentiality of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk +ConfirmationBias,class,https://w3id.org/dpv/risk#ConfirmationBias,Confirmation Bias,"Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +ConfoundingVariablesBias,class,https://w3id.org/dpv/risk#ConfoundingVariablesBias,Confounding Variables Bias,Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk ConsequenceControl,class,https://w3id.org/dpv/risk#ConsequenceControl,Consequence Control,Risk Mitigation Measure that controls the Consequences,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ContainmentControl,class,https://w3id.org/dpv/risk#ContainmentControl,Containment Control,Control to contain event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk CopyrightViolation,class,https://w3id.org/dpv/risk#CopyrightViolation,Copyright Violation,Something that acts as or causes Copyright Violation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +CoverageBias,class,https://w3id.org/dpv/risk#CoverageBias,Coverage Bias,Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk CrossBorderIncident,class,https://w3id.org/dpv/risk#CrossBorderIncident,Cross-Border Incident,Incident involving cross-border or multiple jurisdictions,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Cryptojacking,class,https://w3id.org/dpv/risk#Cryptojacking,Cryptojacking,Something that acts as or causes Cryptojacking,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Damage,class,https://w3id.org/dpv/risk#Damage,Damage,Something that acts as or causes Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk -DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#SecurityBreach;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataAggregationBias,class,https://w3id.org/dpv/risk#DataAggregationBias,Data Aggregation Bias,Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DataBias,class,https://w3id.org/dpv/risk#DataBias,Data Bias,Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#Bias,,2024-09-13,,risk,https://w3id.org/dpv/risk +DataBreach,class,https://w3id.org/dpv/risk#DataBreach,Data Breach,Something that acts as or causes Data Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#SecurityBreach;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk DataCorruption,class,https://w3id.org/dpv/risk#DataCorruption,Data Corruption,Something that acts as or causes Corruption of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#IntegrityConcept,"This concept was called ""Corruption Data"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DataProcessingBias,class,https://w3id.org/dpv/risk#DataProcessingBias,Data Processing Bias,"Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk DeliberateIncident,class,https://w3id.org/dpv/risk#DeliberateIncident,Deliberate Incident,Incident caused due to deliberate actions of a human,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk -DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DenialServiceAttack,class,https://w3id.org/dpv/risk#DenialServiceAttack,Denial of Service Attack (DoS),Something that acts as or causes Denial of Service Attack (DoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk DetectionControl,class,https://w3id.org/dpv/risk#DetectionControl,Detection Control,Control to detect event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk Detriment,class,https://w3id.org/dpv/risk#Detriment,Detriment,Something that acts as or causes Detriment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,,2022-03-23,2024-08-16,risk,https://w3id.org/dpv/risk Discrimination,class,https://w3id.org/dpv/risk#Discrimination,Discrimination,Something that acts as or causes Discrimination,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +DistributedDenialServiceAttack,class,https://w3id.org/dpv/risk#DistributedDenialServiceAttack,Distributed Denial of Service Attack (DDoS),Something that acts as or causes Distributed Denial of Service Attack (DDoS),https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk EnvironmentalIncident,class,https://w3id.org/dpv/risk#EnvironmentalIncident,Environmental Incident,Incident caused due to environmental factors outside human controls,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk EnvironmentalRisk,class,https://w3id.org/dpv/risk#EnvironmentalRisk,Environmental Risk,Risks and issues that have their origin in environment or can affect the environment at large,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentFailure,class,https://w3id.org/dpv/risk#EquipmentFailure,Equipment Failure,Something that acts as or causes Equipment Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#AvailabilityConcept,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +EquipmentMalfunction,class,https://w3id.org/dpv/risk#EquipmentMalfunction,Equipment Malfunction,Something that acts as or causes Equipment Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#AvailabilityConcept,Here equipment refers to physical equipment,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ErroneousSystemUse,class,https://w3id.org/dpv/risk#ErroneousSystemUse,Erroneous System Use,Something that acts as or causes Erroneous System Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ExposureToHarmfulSpeech,class,https://w3id.org/dpv/risk#ExposureToHarmfulSpeech,Exposure to Harmful Speech,Something that acts as or causes Harmful Speech,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""HarmfulSpeech"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ExternalSecurityThreat,class,https://w3id.org/dpv/risk#ExternalSecurityThreat,External Security Threat,Concepts associated with security threats that are likely to originate externally,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Extorsion,class,https://w3id.org/dpv/risk#Extorsion,Extorsion,Something that acts as or causes Extorsion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ExtremelyHighLikelihood,class,https://w3id.org/dpv/risk#ExtremelyHighLikelihood,Extremely High Likelihood,Level where Likelihood is Extremely High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyHighRisk,class,https://w3id.org/dpv/risk#ExtremelyHighRisk,Extremely High Risk,Level where Risk is Extremely High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ExtremelyHighSeverity,class,https://w3id.org/dpv/risk#ExtremelyHighSeverity,Extremely High Severity,Level where Severity is Extremely High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels,The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk @@ -57,18 +65,21 @@ ExtremelyLowSeverity,class,https://w3id.org/dpv/risk#ExtremelyLowSeverity,Extrem Fee,class,https://w3id.org/dpv/risk#Fee,Fee,Something that acts as or provides fees e.g. for using a service,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk FinancialImpact,class,https://w3id.org/dpv/risk#FinancialImpact,Financial Impact,Things that cause or have the potential to impact financial resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk FinancialLoss,class,https://w3id.org/dpv/risk#FinancialLoss,Financial Loss,Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Fraud,class,https://w3id.org/dpv/risk#Fraud,Fraud,Something that acts as or causes Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +GroupAttributionBias,class,https://w3id.org/dpv/risk#GroupAttributionBias,Group Attribution Bias,"Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk HaltSource,class,https://w3id.org/dpv/risk#HaltSource,Halt Source,Control that halts the risk source or prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk Harm,class,https://w3id.org/dpv/risk#Harm,Harm,Something that acts as or causes Harm to humans,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,This concept refers to the general abstract notion of harm,2022-08-13,2024-08-16,risk,https://w3id.org/dpv/risk -HighLikelihood,class,https://w3id.org/dpv/risk#HighLikelihood,High Likelihood,Level where Likelihood is High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -HighRisk,class,https://w3id.org/dpv/risk#HighRisk,High Risk,Level where Risk is High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +HighLikelihood,class,https://w3id.org/dpv/risk#HighLikelihood,High Likelihood,Level where Likelihood is High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +HighRisk,class,https://w3id.org/dpv/risk#HighRisk,High Risk,Level where Risk is High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#3RiskLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk HighSeverity,class,https://w3id.org/dpv/risk#HighSeverity,High Severity,Level where Severity is High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#5SeverityLevels,The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk HumanErrors,class,https://w3id.org/dpv/risk#HumanErrors,Human Errors,Something that acts as or causes Human Errors,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IdentificationControl,class,https://w3id.org/dpv/risk#IdentificationControl,Identification Control,Control to identify characteristics of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityFraud,class,https://w3id.org/dpv/risk#IdentityFraud,Identity Fraud,Something that acts as or causes Identity Fraud,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +IdentityTheft,class,https://w3id.org/dpv/risk#IdentityTheft,Identity Theft,Something that acts as or causes Identity Theft,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IllegalDataProcessing,class,https://w3id.org/dpv/risk#IllegalDataProcessing,Illegal Data Processing,Something that acts as or causes Illegal Processing of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""IllegalProcessingData"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ImpactControl,class,https://w3id.org/dpv/risk#ImpactControl,Impact Control,Risk Mitigation Measure that controls Impacts,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +ImplicitBias,class,https://w3id.org/dpv/risk#ImplicitBias,Implicit Bias,Bias that occurs when a human makes an association or assumption based on their mental models and memories,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +InGroupBias,class,https://w3id.org/dpv/risk#InGroupBias,In-Group Bias,Bias that occurs when showing partiality to one's own group or own characteristics,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk Incident,class,https://w3id.org/dpv/risk#Incident,Incident,An actual or occured event,,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,Incident is realised or materialised risk,2024-02-14,2024-08-16,risk,https://w3id.org/dpv/risk IncidentAssessmentReport,class,https://w3id.org/dpv/risk#IncidentAssessmentReport,Incident Assessment Report,A report describing the assessment of an incident in terms of its effects or impacts,,https://w3id.org/dpv/risk#IncidentReport,https://w3id.org/dpv/risk#IncidentReport,,2024-05-19,,risk,https://w3id.org/dpv/risk IncidentConcluded,class,https://w3id.org/dpv/risk#IncidentConcluded,Incident Concluded,The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk @@ -94,10 +105,11 @@ IncidentSuspectedReport,class,https://w3id.org/dpv/risk#IncidentSuspectedReport, IncidentTerminated,class,https://w3id.org/dpv/risk#IncidentTerminated,Incident Terminated,The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring,https://w3id.org/dpv/risk#IncidentStatus,,https://w3id.org/dpv/risk#IncidentStatus,,2024-02-14,,risk,https://w3id.org/dpv/risk IndividualHealthSafety,class,https://w3id.org/dpv/risk#IndividualHealthSafety,Individual Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk IndividualRisk,class,https://w3id.org/dpv/risk#IndividualRisk,Individual Risk,Risks and issues that affect or have the potential to affect specific individuals,,,,,,,risk,https://w3id.org/dpv/risk +InformativenessBias,class,https://w3id.org/dpv/risk#InformativenessBias,Informativeness Bias,Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#EngineeringDecisionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk Injury,class,https://w3id.org/dpv/risk#Injury,Injury,Something that acts as or causes Injury,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk IntegrityIncident,class,https://w3id.org/dpv/risk#IntegrityIncident,Integrity Incident,Incident where the integrity of information or system has been affected,,https://w3id.org/dpv/risk#Incident,https://w3id.org/dpv/risk#Incident,,2024-05-19,,risk,https://w3id.org/dpv/risk IntentionalMisuse,class,https://w3id.org/dpv/risk#IntentionalMisuse,Intentional Misuse,Intentional Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,,,risk,https://w3id.org/dpv/risk -InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +InterceptCommunications,class,https://w3id.org/dpv/risk#InterceptCommunications,Intercept Communications,Something that acts as or causes Interception of Communications,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,"This concept was called ""InterceptionCommunications"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk JudicialCosts,class,https://w3id.org/dpv/risk#JudicialCosts,Judicial Costs,Something that involves or causes judicial costs to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk JudicialPenalty,class,https://w3id.org/dpv/risk#JudicialPenalty,Judicial Penalty,Something that involves or causes judicial penalties to be paid,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,,,risk,https://w3id.org/dpv/risk LegalRisk,class,https://w3id.org/dpv/risk#LegalRisk,Legal Risk,Risks and issues that have their basis in legal requirements and enforcement,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk @@ -108,15 +120,15 @@ LoseNegotiatingCapacity,class,https://w3id.org/dpv/risk#LoseNegotiatingCapacity, LoseOpportunity,class,https://w3id.org/dpv/risk#LoseOpportunity,Lose of Opportunity,Something that acts as or causes Loss of Opportunity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk LoseReputation,class,https://w3id.org/dpv/risk#LoseReputation,Lose of Reputation,Something that acts as or causes Loss of Reputation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk LoseTrust,class,https://w3id.org/dpv/risk#LoseTrust,Lose of Trust,Something that acts as or causes Loss of Trust,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ReputationalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -LowLikelihood,class,https://w3id.org/dpv/risk#LowLikelihood,Low Likelihood,Level where Likelihood is Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -LowRisk,class,https://w3id.org/dpv/risk#LowRisk,Low Risk,Level where Risk is Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +LowLikelihood,class,https://w3id.org/dpv/risk#LowLikelihood,Low Likelihood,Level where Likelihood is Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +LowRisk,class,https://w3id.org/dpv/risk#LowRisk,Low Risk,Level where Risk is Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#3RiskLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk LowSeverity,class,https://w3id.org/dpv/risk#LowSeverity,Low Severity,Level where Severity is Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#5SeverityLevels,The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MaliciousCodeAttack,class,https://w3id.org/dpv/risk#MaliciousCodeAttack,Malicious Code Attack,Something that acts as or causes Malicious Code Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +MalwareAttack,class,https://w3id.org/dpv/risk#MalwareAttack,Malware Attack,Something that acts as or causes Malware Attack,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk MaterialDamage,class,https://w3id.org/dpv/risk#MaterialDamage,Material Damage,Something that acts as or causes Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk Misuse,class,https://w3id.org/dpv/risk#Misuse,Misuse,Something that acts as or causes Misuse,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#UserRisks,,2024-06-11,2024-08-16,risk,https://w3id.org/dpv/risk -ModerateLikelihood,class,https://w3id.org/dpv/risk#ModerateLikelihood,Moderate Likelihood,Level where Likelihood is Moderate,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#3LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -ModerateRisk,class,https://w3id.org/dpv/risk#ModerateRisk,Moderate Risk,Level where Risk is Moderate,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#3RiskLevels;https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ModerateLikelihood,class,https://w3id.org/dpv/risk#ModerateLikelihood,Moderate Likelihood,Level where Likelihood is Moderate,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#3LikelihoodLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +ModerateRisk,class,https://w3id.org/dpv/risk#ModerateRisk,Moderate Risk,Level where Risk is Moderate,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels;https://w3id.org/dpv/risk#3RiskLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ModerateSeverity,class,https://w3id.org/dpv/risk#ModerateSeverity,Moderate Severity,Level where Severity is Moderate,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#3SeverityLevels;https://w3id.org/dpv/risk#5SeverityLevels,The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk MonitorConsequence,class,https://w3id.org/dpv/risk#MonitorConsequence,Monitor Consequence,Control that monitors a Risk Consequence,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk MonitorControl,class,https://w3id.org/dpv/risk#MonitorControl,Monitor Control,Risk Mitigation Measure that uses controls to monitor events,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,"Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.",2024-05-19,,risk,https://w3id.org/dpv/risk @@ -126,10 +138,13 @@ MonitorRiskControl,class,https://w3id.org/dpv/risk#MonitorRiskControl,Monitor Co MonitorRiskSource,class,https://w3id.org/dpv/risk#MonitorRiskSource,Monitor Risk Source,Control that monitors a Risk Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk MonitorVulnerabilities,class,https://w3id.org/dpv/risk#MonitorVulnerabilities,Monitor Vulnerabilities,Control that monitors a Risk Vulnerability,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#MonitorControl,,2024-05-19,,risk,https://w3id.org/dpv/risk NonMaterialDamage,class,https://w3id.org/dpv/risk#NonMaterialDamage,Non-Material Damage,Something that acts as or causes Non-Material Damage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,The criteria for what is considered material damage is based in jurisdictional laws and norms,2022-03-30,2024-08-16,risk,https://w3id.org/dpv/risk +NonNormalityBias,class,https://w3id.org/dpv/risk#NonNormalityBias,Non-Normality Bias,"Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +NonResponseBias,class,https://w3id.org/dpv/risk#NonResponseBias,Non-Response Bias,Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk OperationalSecurityRisk,class,https://w3id.org/dpv/risk#OperationalSecurityRisk,Operational Security Risk,Risks and issues that arise during operational processes,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +OutGroupHomogeneityBias,class,https://w3id.org/dpv/risk#OutGroupHomogeneityBias,Out-Group Homogeneity Bias,"Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk Payment,class,https://w3id.org/dpv/risk#Payment,Payment,Something that acts as or provides payment e.g. to access a service or purchase resources,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk PersonalSafetyEndangerment,class,https://w3id.org/dpv/risk#PersonalSafetyEndangerment,Personal Safety Endangerment,Something that acts as or causes Personal Safety Endangerment,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +PhishingScam,class,https://w3id.org/dpv/risk#PhishingScam,Phishing Scam,Something that acts as or causes Phishing Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk PhysicalAssault,class,https://w3id.org/dpv/risk#PhysicalAssault,Physical Assault,Something that acts as or causes Physical Assault,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk PhysicalHarm,class,https://w3id.org/dpv/risk#PhysicalHarm,Physical Harm,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk Privacy,class,https://w3id.org/dpv/risk#Privacy,Privacy,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,,,risk,https://w3id.org/dpv/risk @@ -222,16 +237,17 @@ RecoveryControl,class,https://w3id.org/dpv/risk#RecoveryControl,Recovery Control ReduceLikelihood,class,https://w3id.org/dpv/risk#ReduceLikelihood,Reduce Likelihood,Control that reduces the likelihood of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ReduceSeverity,class,https://w3id.org/dpv/risk#ReduceSeverity,Reduce Severity,Control that reduces the severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ReductionControl,,2024-05-19,,risk,https://w3id.org/dpv/risk ReductionControl,class,https://w3id.org/dpv/risk#ReductionControl,Reduction Control,Control that reduces the likelihood or severity of an event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ConfidentialityConcept,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +Reidentification,class,https://w3id.org/dpv/risk#Reidentification,Re-identification,Something that acts as or causes Re-identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk RemedyControl,class,https://w3id.org/dpv/risk#RemedyControl,Remedy Control,Control to remedy consequences of event,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk RemoveConsequence,class,https://w3id.org/dpv/risk#RemoveConsequence,Remove Consequence,Control that removes Consequence i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ConsequenceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk RemoveImpact,class,https://w3id.org/dpv/risk#RemoveImpact,Remove Impact,Control that removes Impact i.e. prevents it from materialising,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#ImpactControl,,2024-05-19,,risk,https://w3id.org/dpv/risk RemoveSource,class,https://w3id.org/dpv/risk#RemoveSource,Remove Source,Control that removes the risk source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#SourceControl,,2024-05-19,,risk,https://w3id.org/dpv/risk Renumeration,class,https://w3id.org/dpv/risk#Renumeration,Remuneration,Something that acts as or provides renumeration which is in monetary or financial form,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk ReputationalRisk,class,https://w3id.org/dpv/risk#ReputationalRisk,Reputational Risk,Risks and issues that affect the reputation of the organisation,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk +RequirementsBias,class,https://w3id.org/dpv/risk#RequirementsBias,Requirements Bias,Bias that occurs in or during requirements creation,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,Requirements bias also represents occasions for the human cognitive biases to manifest,2024-09-13,,risk,https://w3id.org/dpv/risk Reward,class,https://w3id.org/dpv/risk#Reward,Reward,Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#FinancialImpact,,2024-04-14,2024-08-16,risk,https://w3id.org/dpv/risk RightsExercisePrevention,class,https://w3id.org/dpv/risk#RightsExercisePrevention,Prevent Exercising of Rights,Something that acts as or causes Prevent Exercising of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""PreventExercisingOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk -RightsImpact,class,https://w3id.org/dpv/risk#RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk;https://w3id.org/dpv#Impact,"This concept was called ""ImpactToRights"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +RightsImpact,class,https://w3id.org/dpv/risk#RightsImpact,Impact to Rights,Something that acts as or causes Impact to Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#Impact;https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ImpactToRights"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk RightsLimitation,class,https://w3id.org/dpv/risk#RightsLimitation,Limitation of Rights,Something that acts as or causes Limitation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""LimitationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk RightsViolation,class,https://w3id.org/dpv/risk#RightsViolation,Violation of Rights,Something that acts as or causes Violation of Rights,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,"This concept was called ""ViolationOfRights"" in DPV 2.0",2022-08-18,2024-08-16,risk,https://w3id.org/dpv/risk RiskAnalysis,class,https://w3id.org/dpv/risk#RiskAnalysis,Risk Analysis,"A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures",,https://w3id.org/dpv/risk#RiskAssessment,https://w3id.org/dpv/risk#RiskAssessment,,2022-08-18,,risk,https://w3id.org/dpv/risk @@ -243,44 +259,50 @@ RiskMatrix3x3,class,https://w3id.org/dpv/risk#RiskMatrix3x3,Risk Matrix 3x3,"A R RiskMatrix5x5,class,https://w3id.org/dpv/risk#RiskMatrix5x5,Risk Matrix 5x5,"A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk RiskMatrix7x7,class,https://w3id.org/dpv/risk#RiskMatrix7x7,Risk Matrix 7x7,"A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types",https://w3id.org/dpv/risk#RiskAnalysis,,https://w3id.org/dpv/risk#RiskMatrix,,2022-08-17,,risk,https://w3id.org/dpv/risk RiskSource,class,https://w3id.org/dpv/risk#RiskSource,Risk Source,"The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk",,https://w3id.org/dpv#RiskConcept,https://w3id.org/dpv#RiskConcept,,2024-02-14,2024-08-16,risk,https://w3id.org/dpv/risk -Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,,,risk,https://w3id.org/dpv/risk -SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +RuleBasedSystemDesign,class,https://w3id.org/dpv/risk#RuleBasedSystemDesign,Rule-Based System Design,Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,Rule based system design also potentially introduces various forms of human cognitive bias,2024-09-13,,risk,https://w3id.org/dpv/risk +Sabotage,class,https://w3id.org/dpv/risk#Sabotage,Sabotage,Something that acts as or causes Sabotage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SamplingBias,class,https://w3id.org/dpv/risk#SamplingBias,Sampling Bias,Bias that occurs when data records are not collected randomly from the intended population,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#SelectionBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +Scam,class,https://w3id.org/dpv/risk#Scam,Scam,Something that acts as or causes Scam,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SecurityAttack,class,https://w3id.org/dpv/risk#SecurityAttack,Security Attack,Something that acts as or causes an attack on security with the aim of undermining it,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,,,risk,https://w3id.org/dpv/risk +SecurityBreach,class,https://w3id.org/dpv/risk#SecurityBreach,Security Breach,Something that acts as or causes Security Breach,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SelectionBias,class,https://w3id.org/dpv/risk#SelectionBias,Selection Bias,Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#StatisticalBias,,2024-09-13,,risk,https://w3id.org/dpv/risk SexualViolence,class,https://w3id.org/dpv/risk#SexualViolence,Sexual Violence,Something that acts as or causes Sexual Violence,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IndividualRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk ShareRisk,class,https://w3id.org/dpv/risk#ShareRisk,Share Risk,Risk Mitigation Measure that shares Risk e.g. amongst stakeholders,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk +SimpsonsParadoxBias,class,https://w3id.org/dpv/risk#SimpsonsParadoxBias,Simpson'S Paradox Bias,Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk SocialDisadvantage,class,https://w3id.org/dpv/risk#SocialDisadvantage,Social Disadvantage,Something that acts as or causes Social Disadvantage,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +SocietalBias,class,https://w3id.org/dpv/risk#SocietalBias,Societal Bias,Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society,https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#CognitiveBias,,2024-09-13,,risk,https://w3id.org/dpv/risk SocietalHealthSafety,class,https://w3id.org/dpv/risk#SocietalHealthSafety,Societal Health & Safety,,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,,,risk,https://w3id.org/dpv/risk SocietalRisk,class,https://w3id.org/dpv/risk#SocietalRisk,Societal Risk,Risks and issues that affect or have the potential to affect society at large or specific groups in society,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk SourceControl,class,https://w3id.org/dpv/risk#SourceControl,Source Control,Risk Mitigation Measure that controls the Source,https://w3id.org/dpv/risk#RiskControl,,https://w3id.org/dpv/risk#RiskControl,,2024-05-19,,risk,https://w3id.org/dpv/risk -Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +Spoofing,class,https://w3id.org/dpv/risk#Spoofing,Spoofing,Something that acts as or causes Spoofing,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#OperationalSecurityRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +StatisticalBias,class,https://w3id.org/dpv/risk#StatisticalBias,Statistical Bias,"Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates",https://w3id.org/dpv/risk#RiskConcept,,https://w3id.org/dpv/risk#DataBias,,2024-09-13,,risk,https://w3id.org/dpv/risk +SystemFailure,class,https://w3id.org/dpv/risk#SystemFailure,System Failure,Something that acts as or causes System Failure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#AvailabilityConcept,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemIntrusion,class,https://w3id.org/dpv/risk#SystemIntrusion,System Intrusion,Something that acts as or causes System Intrusion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +SystemMalfunction,class,https://w3id.org/dpv/risk#SystemMalfunction,System Malfunction,Something that acts as or causes System Malfunction,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#OperationalSecurityRisk;https://w3id.org/dpv/risk#AvailabilityConcept,Here system refers to both hardware and software systems,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Terrorism,class,https://w3id.org/dpv/risk#Terrorism,Terrorism,Something that acts as or causes Terrorism,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#SocietalRisk,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk Threat,class,https://w3id.org/dpv/risk#Threat,Threat,Risk source event which causes Risk,,https://w3id.org/dpv/risk#RiskSource,https://w3id.org/dpv/risk#RiskSource,,2024-02-14,,risk,https://w3id.org/dpv/risk ThreatSource,class,https://w3id.org/dpv/risk#ThreatSource,Threat Source,"Source of threat event, including both agent and non-agent sources",,,,,2024-02-14,,risk,https://w3id.org/dpv/risk -UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,,,risk,https://w3id.org/dpv/risk -UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedAccesstoPremises,class,https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises,Unauthorised Access to Premises,Something that acts as or causes Unauthorised Access to Premises,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedActivity,class,https://w3id.org/dpv/risk#UnauthorisedActivity,Unauthorised Activity,Something that acts as or causes Unauthorised Activity,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,,,risk,https://w3id.org/dpv/risk +UnauthorisedCodeAccess,class,https://w3id.org/dpv/risk#UnauthorisedCodeAccess,Unauthorised Code Access,Something that acts as or causes Unauthorised Code Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedCodeDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure,Unauthorised Code Disclosure,Something that acts as or causes Unauthorised Code Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk UnauthorisedCodeModification,class,https://w3id.org/dpv/risk#UnauthorisedCodeModification,Unauthorised Code Modification,Something that acts as or causes Unauthorised Code Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataAccess,class,https://w3id.org/dpv/risk#UnauthorisedDataAccess,Unauthorised Data Access,Something that acts as or causes Unauthorised Data Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedDataDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedDataDisclosure,Unauthorised Data Disclosure,Something that acts as or causes Unauthorised Data Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk UnauthorisedDataModification,class,https://w3id.org/dpv/risk#UnauthorisedDataModification,Unauthorised Data Modification,Something that acts as or causes Unauthorised Data Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedInformationDisclosure,class,https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure,Unauthorised Information Disclosure,Something that acts as or causes Unauthorised Information Disclosure,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedReidentification,class,https://w3id.org/dpv/risk#UnauthorisedReidentification,Unauthorised Re-Identification,Something that acts as or causes Unauthorised Re-Identification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-19,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedResourceUse,class,https://w3id.org/dpv/risk#UnauthorisedResourceUse,Unauthorised Resource Use,Something that acts as or causes Unauthorised Resource Use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnauthorisedSystemAccess,class,https://w3id.org/dpv/risk#UnauthorisedSystemAccess,Unauthorised System Access,Something that acts as or causes Unauthorised System Access,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk UnauthorisedSystemModification,class,https://w3id.org/dpv/risk#UnauthorisedSystemModification,Unauthorised System Modification,Something that acts as or causes Unauthorised System Modification,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#AvailabilityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk -UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#ConfidentialityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedCodeDeletion,class,https://w3id.org/dpv/risk#UnwantedCodeDeletion,Unwanted Code Deletion,Something that acts as or causes Unwanted Code Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDataDeletion,class,https://w3id.org/dpv/risk#UnwantedDataDeletion,Unwanted Data Deletion,Something that acts as or causes Unwanted Data Deletion,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ExternalSecurityThreat;https://w3id.org/dpv/risk#IntegrityConcept;https://w3id.org/dpv/risk#AvailabilityConcept,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk +UnwantedDisclosureData,class,https://w3id.org/dpv/risk#UnwantedDisclosureData,Unwanted Disclosure of Data,Something that acts as or causes Unwanted Disclosure of Data,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#ConfidentialityConcept;https://w3id.org/dpv/risk#ExternalSecurityThreat,,2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk UserRisks,class,https://w3id.org/dpv/risk#UserRisks,User Risks,Concepts associated with risks that arise due to User or Human use,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv#RiskConcept,,,,risk,https://w3id.org/dpv/risk -VeryHighLikelihood,class,https://w3id.org/dpv/risk#VeryHighLikelihood,Very High Likelihood,Level where Likelihood is Very High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryHighLikelihood,class,https://w3id.org/dpv/risk#VeryHighLikelihood,Very High Likelihood,Level where Likelihood is Very High,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk VeryHighRisk,class,https://w3id.org/dpv/risk#VeryHighRisk,Very High Risk,Level where Risk is Very High,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk VeryHighSeverity,class,https://w3id.org/dpv/risk#VeryHighSeverity,Very High Severity,Level where Severity is Very High,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#5SeverityLevels,The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk -VeryLowLikelihood,class,https://w3id.org/dpv/risk#VeryLowLikelihood,Very Low Likelihood,Level where Likelihood is Very Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#7LikelihoodLevels;https://w3id.org/dpv/risk#5LikelihoodLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk +VeryLowLikelihood,class,https://w3id.org/dpv/risk#VeryLowLikelihood,Very Low Likelihood,Level where Likelihood is Very Low,https://w3id.org/dpv#Likelihood,,https://w3id.org/dpv/risk#5LikelihoodLevels;https://w3id.org/dpv/risk#7LikelihoodLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk VeryLowRisk,class,https://w3id.org/dpv/risk#VeryLowRisk,Very Low Risk,Level where Risk is Very Low,https://w3id.org/dpv#RiskLevel,,https://w3id.org/dpv/risk#5RiskLevels;https://w3id.org/dpv/risk#7RiskLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk VeryLowSeverity,class,https://w3id.org/dpv/risk#VeryLowSeverity,Very Low Severity,Level where Severity is Very Low,https://w3id.org/dpv#Severity,,https://w3id.org/dpv/risk#7SeverityLevels;https://w3id.org/dpv/risk#5SeverityLevels,The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1,2022-08-18,,risk,https://w3id.org/dpv/risk ViolatingCodeOfConduct,class,https://w3id.org/dpv/risk#ViolatingCodeOfConduct,Violating Code of Conduct,Something that acts as or causes Violation of Code of Conduct,https://w3id.org/dpv#RiskConcept,,https://w3id.org/dpv/risk#LegalRisk,"This concept was called ""ViolationCodeConduct"" in DPV 2.0",2022-08-17,2024-08-16,risk,https://w3id.org/dpv/risk diff --git a/2.1-dev/risk/risk.html b/2.1-dev/risk/risk.html index 4bef40b04..239452705 100644 --- a/2.1-dev/risk/risk.html +++ b/2.1-dev/risk/risk.html @@ -2099,6 +2099,117 @@

Financial

risk:Reward: Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee go to full definition + + + + +
+

Bias

+

Note: These are intended to represent bias concepts in general e.g. applicable for any technology. The AI extension contains an additional set of concepts that extend these concepts to represent biases that are specific to the development and use of AI.

+
    +
  • + risk:CognitiveBias: Bias that occurs when humans are processing and interpreting information + go to full definition +
      +
    • + risk:ConfirmationBias: Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + go to full definition + +
    • +
    • + risk:GroupAttributionBias: Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + go to full definition + +
    • +
    • + risk:ImplicitBias: Bias that occurs when a human makes an association or assumption based on their mental models and memories + go to full definition + +
    • +
    • + risk:InGroupBias: Bias that occurs when showing partiality to one's own group or own characteristics + go to full definition + +
    • +
    • + risk:OutGroupHomogeneityBias: Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + go to full definition + +
    • +
    • + risk:RequirementsBias: Bias that occurs in or during requirements creation + go to full definition + +
    • +
    • + risk:RuleBasedSystemDesign: Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + go to full definition + +
    • +
    • + risk:SocietalBias: Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + go to full definition + +
    • +
    +
  • +
  • + risk:DataBias: Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + go to full definition +
      +
    • + risk:DataAggregationBias: Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + go to full definition + +
    • +
    • + risk:DataProcessingBias: Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + go to full definition + +
    • +
    • + risk:SimpsonsParadoxBias: Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + go to full definition + +
    • +
    • + risk:StatisticalBias: Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + go to full definition +
        +
      • + risk:ConfoundingVariablesBias: Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + go to full definition + +
      • +
      • + risk:NonNormalityBias: Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + go to full definition + +
      • +
      • + risk:SelectionBias: Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + go to full definition +
          +
        • + risk:CoverageBias: Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + go to full definition + +
        • +
        • + risk:NonResponseBias: Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + go to full definition + +
        • +
        • + risk:SamplingBias: Bias that occurs when data records are not collected randomly from the intended population + go to full definition + +
        • +
        +
      • +
      +
    • +
@@ -3631,6 +3742,84 @@

Benefit

+
+

Bias

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermBiasPrefixrisk
LabelBias
IRIhttps://w3id.org/dpv/risk#Bias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskConcept +
DefinitionBias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + + +

Blackmail

@@ -4056,6 +4245,84 @@

Coercion

+
+

Cognitive Bias

+
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermCognitiveBiasPrefixrisk
LabelCognitive Bias
IRIhttps://w3id.org/dpv/risk#CognitiveBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:Bias + → risk:RiskConcept +
DefinitionBias that occurs when humans are processing and interpreting information
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in AI +
+
+ + +

Compensation

@@ -4643,47 +4910,41 @@

Confidentiality Incident

-
-

Consequence Control

+
+

Confirmation Bias

- + - + - + - + - - - - - + @@ -4692,31 +4953,34 @@

Consequence Control

- + - + + + + - + - + - @@ -4725,47 +4989,42 @@

Consequence Control

-
-

Containment Control

+
+

Confounding Variables Bias

TermConsequenceControlConfirmationBias Prefix risk
LabelConsequence ControlConfirmation Bias
IRIhttps://w3id.org/dpv/risk#ConsequenceControlhttps://w3id.org/dpv/risk#ConfirmationBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionRisk Mitigation Measure that controls the ConsequencesBias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information
Source
Date Created2024-05-192024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -4774,28 +5033,34 @@

Containment Control

- + - + + + + - + - + + + + - @@ -4804,40 +5069,47 @@

Containment Control

-
-

Copyright Violation

+
+

Consequence Control

TermContainmentControlConfoundingVariablesBias Prefix risk
LabelContainment ControlConfounding Variables Bias
IRIhttps://w3id.org/dpv/risk#ContainmentControlhttps://w3id.org/dpv/risk#ConfoundingVariablesBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl to contain eventBias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - + + + + @@ -4846,28 +5118,22 @@

Copyright Violation

- + - - - - + - + - - - - + @@ -4876,52 +5142,54 @@

Copyright Violation

-
TermCopyrightViolationConsequenceControl Prefix risk
LabelCopyright ViolationConsequence Control
IRIhttps://w3id.org/dpv/risk#CopyrightViolationhttps://w3id.org/dpv/risk#ConsequenceControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Copyright ViolationRisk Mitigation Measure that controls the Consequences
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- - -
-

Cross-Border Incident

+ +
+

Containment Control

- + - + - + - + - - @@ -4932,7 +5200,7 @@

Cross-Border Incident

- + @@ -4953,7 +5221,7 @@

Cross-Border Incident

- @@ -4962,23 +5230,23 @@

Cross-Border Incident

-
-

Cryptojacking

+
+

Copyright Violation

TermCrossBorderIncidentContainmentControl Prefix risk
LabelCross-Border IncidentContainment Control
IRIhttps://w3id.org/dpv/risk#CrossBorderIncidenthttps://w3id.org/dpv/risk#ContainmentControl
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:Incident - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation risk:hasIncident + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionIncident involving cross-border or multiple jurisdictionsControl to contain event
See More: section INCIDENT in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -4990,10 +5258,7 @@

Cryptojacking

- - - @@ -5007,7 +5272,7 @@

Cryptojacking

- + @@ -5016,7 +5281,7 @@

Cryptojacking

- + @@ -5043,39 +5308,44 @@

Cryptojacking

TermCryptojackingCopyrightViolation Prefix risk
LabelCryptojackingCopyright Violation
IRIhttps://w3id.org/dpv/risk#Cryptojackinghttps://w3id.org/dpv/risk#CopyrightViolation
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ExternalSecurityThreat + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes CryptojackingSomething that acts as or causes Copyright Violation
SourceENISA Threat Landscape 2021ENISA Reference Incident Classification Taxonomy 2018
+ + -
-

Damage

+
+

Coverage Bias

- + - + - + - + - @@ -5088,34 +5358,34 @@

Damage

- + - + + + + - + - - - - + - + - @@ -5123,54 +5393,44 @@

Damage

- -
-

Data Breach

+
+

Cross-Border Incident

TermDamageCoverageBias Prefix risk
LabelDamageCoverage Bias
IRIhttps://w3id.org/dpv/risk#Damagehttps://w3id.org/dpv/risk#CoverageBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes DamageBias that occurs when a population represented in a dataset does not match the actual or real population that are being used
Source
Date Created2022-03-302024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - - - - - - - + + + + @@ -5179,40 +5439,28 @@

Data Breach

- + - - - - - - - + - + - - - - - - - - + + - @@ -5221,23 +5469,23 @@

Data Breach

-
-

Data Corruption

+
+

Cryptojacking

TermDataBreachCrossBorderIncident Prefix risk
LabelData BreachCross-Border Incident
IRIhttps://w3id.org/dpv/risk#DataBreachhttps://w3id.org/dpv/risk#CrossBorderIncident
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:SecurityBreach - → risk:AvailabilityConcept -
Broader/Parent types risk:SecurityBreach - → risk:ConfidentialityConcept -
Broader/Parent types risk:SecurityBreach - → risk:IntegrityConcept -
Broader/Parent types risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:Incidentdpv:RiskConcept
Object of relation risk:hasIncident +
DefinitionSomething that acts as or causes Data BreachIncident involving cross-border or multiple jurisdictions
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0071 :: Using risk controls to express how tech/org measures address the risk
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in DEX + section INCIDENT in RISK
- + - + - + @@ -5249,10 +5497,10 @@

Data Corruption

- - @@ -5266,19 +5514,16 @@

Data Corruption

- + - - - - + - + @@ -5307,44 +5552,41 @@

Data Corruption

-
-

Deliberate Incident

+ +
+

Damage

TermDataCorruptionCryptojacking Prefix risk
LabelData CorruptionCryptojacking
IRIhttps://w3id.org/dpv/risk#DataCorruptionhttps://w3id.org/dpv/risk#Cryptojacking
Broader/Parent types risk:IntegrityConcept + risk:AvailabilityConcept
Broader/Parent types risk:OperationalSecurityRisk + risk:ExternalSecurityThreatdpv:RiskConcept
DefinitionSomething that acts as or causes Corruption of DataSomething that acts as or causes Cryptojacking
Usage NoteThis concept was called "Corruption Data" in DPV 2.0
SourceISO/IEC 27005:2018ENISA Threat Landscape 2021
- + - + - + - + - - - - - + @@ -5353,7 +5595,7 @@

Deliberate Incident

- + @@ -5366,15 +5608,21 @@

Deliberate Incident

- + - - + + + + + + + + - @@ -5383,39 +5631,37 @@

Deliberate Incident

-
-

Denial of Service Attack (DoS)

+
+

Data Aggregation Bias

TermDeliberateIncidentDamage Prefix risk
LabelDeliberate IncidentDamage
IRIhttps://w3id.org/dpv/risk#DeliberateIncidenthttps://w3id.org/dpv/risk#Damage
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:Incident + risk:LegalRiskdpv:RiskConcept
Object of relation risk:hasIncident -
DefinitionIncident caused due to deliberate actions of a humanSomething that acts as or causes Damage
Date Created2024-05-192022-03-30
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - @@ -5428,7 +5674,7 @@

Denial of Service Attack (DoS)

- + @@ -5437,28 +5683,25 @@

Denial of Service Attack (DoS)

- + - + - - - - + - + - @@ -5467,47 +5710,40 @@

Denial of Service Attack (DoS)

-
-

Detection Control

+
+

Data Bias

TermDenialServiceAttackDataAggregationBias Prefix risk
LabelDenial of Service Attack (DoS)Data Aggregation Bias
IRIhttps://w3id.org/dpv/risk#DenialServiceAttackhttps://w3id.org/dpv/risk#DataAggregationBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Denial of Service Attack (DoS)Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -5516,28 +5752,34 @@

Detection Control

- + - + + + + - + - + + + + - @@ -5546,23 +5788,23 @@

Detection Control

-
-

Detriment

+
+

Data Breach

TermDetectionControlDataBias Prefix risk
LabelDetection ControlData Bias
IRIhttps://w3id.org/dpv/risk#DetectionControlhttps://w3id.org/dpv/risk#DataBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl to detect eventBias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + @@ -5574,7 +5816,20 @@

Detriment

- + + + + + + @@ -5588,20 +5843,26 @@

Detriment

- + + + + - + + + + - + @@ -5609,13 +5870,13 @@

Detriment

- + - @@ -5624,23 +5885,23 @@

Detriment

-
-

Discrimination

+
+

Data Corruption

TermDetrimentDataBreach Prefix risk
LabelDetrimentData Breach
IRIhttps://w3id.org/dpv/risk#Detrimenthttps://w3id.org/dpv/risk#DataBreach
Broader/Parent types risk:LegalRisk + risk:SecurityBreach + → risk:AvailabilityConcept +
Broader/Parent types risk:SecurityBreach + → risk:ConfidentialityConcept +
Broader/Parent types risk:SecurityBreach + → risk:IntegrityConcept +
Broader/Parent types risk:SecurityBreach + → risk:OperationalSecurityRiskdpv:RiskConcept
DefinitionSomething that acts as or causes DetrimentSomething that acts as or causes Data Breach
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0071 :: Using risk controls to express how tech/org measures address the risk
SourceISO/IEC 27005:2018
Date Created2022-03-232022-08-17
Date Modified
ContributorsHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz EstevesHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONSEQUENCES in DEX
- + - + - + @@ -5652,7 +5913,10 @@

Discrimination

- + + @@ -5666,20 +5930,26 @@

Discrimination

- + - + + + + - + + + + - + @@ -5687,7 +5957,7 @@

Discrimination

- + @@ -5702,39 +5972,37 @@

Discrimination

-
-

Distributed Denial of Service Attack (DDoS)

+
+

Data Processing Bias

TermDiscriminationDataCorruption Prefix risk
LabelDiscriminationData Corruption
IRIhttps://w3id.org/dpv/risk#Discriminationhttps://w3id.org/dpv/risk#DataCorruption
Broader/Parent types risk:SocietalRisk + risk:IntegrityConcept +
Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept
DefinitionSomething that acts as or causes DiscriminationSomething that acts as or causes Corruption of Data
Usage NoteThis concept was called "Corruption Data" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2022-08-192022-08-17
Date Modified
ContributorsGeorg P. KrogHarshvardhan J. Pandit
- + - + - + - + - - - @@ -5747,7 +6015,7 @@

Distributed Denial of Service Attack (DDoS)

- + @@ -5756,28 +6024,25 @@

Distributed Denial of Service Attack (DDoS)

- + - + - - - - + - + - @@ -5785,23 +6050,23 @@

Distributed Denial of Service Attack (DDoS)

-
-

Environmental Incident

+
+

Deliberate Incident

TermDistributedDenialServiceAttackDataProcessingBias Prefix risk
LabelDistributed Denial of Service Attack (DDoS)Data Processing Bias
IRIhttps://w3id.org/dpv/risk#DistributedDenialServiceAttackhttps://w3id.org/dpv/risk#DataProcessingBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Distributed Denial of Service Attack (DDoS)Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + @@ -5831,7 +6096,7 @@

Environmental Incident

- + @@ -5861,23 +6126,23 @@

Environmental Incident

-
-

Environmental Risk

+
+

Denial of Service Attack (DoS)

TermEnvironmentalIncidentDeliberateIncident Prefix risk
LabelEnvironmental IncidentDeliberate Incident
IRIhttps://w3id.org/dpv/risk#EnvironmentalIncidenthttps://w3id.org/dpv/risk#DeliberateIncident
DefinitionIncident caused due to environmental factors outside human controlsIncident caused due to deliberate actions of a human
- + - + - + @@ -5889,7 +6154,11 @@

Environmental Risk

- + + @@ -5902,20 +6171,32 @@

Environmental Risk

- + - + + + + - - - + + + + + + + + + + + + @@ -5929,43 +6210,47 @@

Environmental Risk

-
-

Equipment Failure

+
+

Detection Control

TermEnvironmentalRiskDenialServiceAttack Prefix risk
LabelEnvironmental RiskDenial of Service Attack (DoS)
IRIhttps://w3id.org/dpv/risk#EnvironmentalRiskhttps://w3id.org/dpv/risk#DenialServiceAttack
Broader/Parent types dpv:RiskConcept + risk:AvailabilityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
DefinitionRisks and issues that have their origin in environment or can affect the environment at largeSomething that acts as or causes Denial of Service Attack (DoS)
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - + + + + @@ -5974,40 +6259,28 @@

Equipment Failure

- + - - - - + - - - - + - + - - - - - - - - + + - @@ -6016,23 +6289,23 @@

Equipment Failure

-
-

Equipment Malfunction

+
+

Detriment

TermEquipmentFailureDetectionControl Prefix risk
LabelEquipment FailureDetection Control
IRIhttps://w3id.org/dpv/risk#EquipmentFailurehttps://w3id.org/dpv/risk#DetectionControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Equipment FailureControl to detect event
Usage NoteHere equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -6044,10 +6317,7 @@

Equipment Malfunction

- - - @@ -6061,26 +6331,20 @@

Equipment Malfunction

- + - - - - + - - - - + - + @@ -6088,7 +6352,7 @@

Equipment Malfunction

- + @@ -6103,23 +6367,23 @@

Equipment Malfunction

-
-

Erroneous System Use

+
+

Discrimination

TermEquipmentMalfunctionDetriment Prefix risk
LabelEquipment MalfunctionDetriment
IRIhttps://w3id.org/dpv/risk#EquipmentMalfunctionhttps://w3id.org/dpv/risk#Detriment
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:OperationalSecurityRisk + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Equipment MalfunctionSomething that acts as or causes Detriment
Usage NoteHere equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-172022-03-23
Date Modified
ContributorsHarshvardhan J. PanditHarshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves
- + - + - + @@ -6131,7 +6395,7 @@

Erroneous System Use

- @@ -6145,23 +6409,20 @@

Erroneous System Use

- + - - - - + - + @@ -6169,7 +6430,7 @@

Erroneous System Use

- + @@ -6184,25 +6445,23 @@

Erroneous System Use

- - -
-

Exposure to Harmful Speech

+
+

Distributed Denial of Service Attack (DDoS)

TermErroneousSystemUseDiscrimination Prefix risk
LabelErroneous System UseDiscrimination
IRIhttps://w3id.org/dpv/risk#ErroneousSystemUsehttps://w3id.org/dpv/risk#Discrimination
Broader/Parent types risk:UserRisks + risk:SocietalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Erroneous System UseSomething that acts as or causes Discrimination
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-19
Date Modified
ContributorsHarshvardhan J. PanditGeorg P. Krog
- + - + - + @@ -6214,7 +6473,10 @@

Exposure to Harmful Speech

- + + @@ -6228,19 +6490,16 @@

Exposure to Harmful Speech

- + - - - - + - + @@ -6269,40 +6528,44 @@

Exposure to Harmful Speech

- -
-

External Security Threat

+
+

Environmental Incident

TermExposureToHarmfulSpeechDistributedDenialServiceAttack Prefix risk
LabelExposure to Harmful SpeechDistributed Denial of Service Attack (DDoS)
IRIhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeechhttps://w3id.org/dpv/risk#DistributedDenialServiceAttack
Broader/Parent types risk:SocietalRisk + risk:AvailabilityConcept +
Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept
DefinitionSomething that acts as or causes Harmful SpeechSomething that acts as or causes Distributed Denial of Service Attack (DDoS)
Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
- + - + - + - + - - + + + + @@ -6311,7 +6574,7 @@

External Security Threat

- + @@ -6322,14 +6585,17 @@

External Security Threat

- + + + + - @@ -6338,23 +6604,23 @@

External Security Threat

-
-

Extorsion

+
+

Environmental Risk

TermExternalSecurityThreatEnvironmentalIncident Prefix risk
LabelExternal Security ThreatEnvironmental Incident
IRIhttps://w3id.org/dpv/risk#ExternalSecurityThreathttps://w3id.org/dpv/risk#EnvironmentalIncident
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types dpv:RiskConcept + risk:Incident + → dpv:RiskConcept
Object of relation risk:hasIncident +
DefinitionConcepts associated with security threats that are likely to originate externallyIncident caused due to environmental factors outside human controls
Date Created2024-05-19
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + @@ -6366,11 +6632,7 @@

Extorsion

- - - @@ -6383,32 +6645,20 @@

Extorsion

- + - - - - + - - - - - - - - - - - - + + + @@ -6422,44 +6672,43 @@

Extorsion

-
-

Extremely High Likelihood

+
+

Equipment Failure

TermExtorsionEnvironmentalRisk Prefix risk
LabelExtorsionEnvironmental Risk
IRIhttps://w3id.org/dpv/risk#Extorsionhttps://w3id.org/dpv/risk#EnvironmentalRisk
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + dpv:RiskConcept
DefinitionSomething that acts as or causes ExtorsionRisks and issues that have their origin in environment or can affect the environment at large
SourceENISA Threat Taxonomy 2016
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - + + - - - - + @@ -6468,25 +6717,31 @@

Extremely High Likelihood

- + - + - + + + + - + - + + + + @@ -6495,7 +6750,7 @@

Extremely High Likelihood

- @@ -6504,44 +6759,43 @@

Extremely High Likelihood

-
-

Extremely High Risk

+
+

Equipment Malfunction

TermExtremelyHighLikelihoodEquipmentFailure Prefix risk
LabelExtremely High LikelihoodEquipment Failure
IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihoodhttps://w3id.org/dpv/risk#EquipmentFailure
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:AvailabilityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasLikelihood -
DefinitionLevel where Likelihood is Extremely HighSomething that acts as or causes Equipment Failure
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - - - - + @@ -6550,25 +6804,31 @@

Extremely High Risk

- + - + - + + + + - + - + + + + @@ -6577,7 +6837,7 @@

Extremely High Risk

- @@ -6586,44 +6846,40 @@

Extremely High Risk

-
-

Extremely High Severity

+
+

Erroneous System Use

TermExtremelyHighRiskEquipmentMalfunction Prefix risk
LabelExtremely High RiskEquipment Malfunction
IRIhttps://w3id.org/dpv/risk#ExtremelyHighRiskhttps://w3id.org/dpv/risk#EquipmentMalfunction
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:AvailabilityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasRiskLevel -
DefinitionLevel where Risk is Extremely HighSomething that acts as or causes Equipment Malfunction
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1Here equipment refers to physical equipment
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -6632,25 +6888,28 @@

Extremely High Severity

- + - - - - + - + + + + - + - + + + + @@ -6659,7 +6918,7 @@

Extremely High Severity

- @@ -6668,23 +6927,261 @@

Extremely High Severity

-
-

Extremely Low Likelihood

+ + +
+

Exposure to Harmful Speech

TermExtremelyHighSeverityErroneousSystemUse Prefix risk
LabelExtremely High SeverityErroneous System Use
IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverityhttps://w3id.org/dpv/risk#ErroneousSystemUse
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:UserRisks + → dpv:RiskConcept
Object of relation dpv:hasSeverity -
DefinitionLevel where Severity is Extremely HighSomething that acts as or causes Erroneous System Use
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowLikelihoodExposureToHarmfulSpeech Prefix risk
LabelExtremely Low LikelihoodExposure to Harmful Speech
IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihoodhttps://w3id.org/dpv/risk#ExposureToHarmfulSpeech
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Harmful Speech
Usage NoteThis concept was called "HarmfulSpeech" in DPV 2.0
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

External Security Threat

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExternalSecurityThreatPrefixrisk
LabelExternal Security Threat
IRIhttps://w3id.org/dpv/risk#ExternalSecurityThreat
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept +
DefinitionConcepts associated with security threats that are likely to originate externally
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Extorsion

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtorsionPrefixrisk
LabelExtorsion
IRIhttps://w3id.org/dpv/risk#Extorsion
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Extorsion
SourceENISA Threat Taxonomy 2016
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Extremely High Likelihood

+ + + + + + + + + + + + + + + @@ -6714,11 +7211,11 @@

Extremely Low Likelihood

- + - + @@ -6750,42 +7247,1372 @@

Extremely Low Likelihood

-
-

Extremely Low Risk

+
+

Extremely High Risk

TermExtremelyHighLikelihoodPrefixrisk
LabelExtremely High Likelihood
IRIhttps://w3id.org/dpv/risk#ExtremelyHighLikelihood
DefinitionLevel where Likelihood is Extremely LowLevel where Likelihood is Extremely High
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
- + - + - + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowRiskExtremelyHighRisk Prefix risk
LabelExtremely Low RiskExtremely High Risk
IRIhttps://w3id.org/dpv/risk#ExtremelyLowRiskhttps://w3id.org/dpv/risk#ExtremelyHighRisk
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
Object of relation dpv:hasRiskLevel +
DefinitionLevel where Risk is Extremely High
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely High Severity

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyHighSeverityPrefixrisk
LabelExtremely High Severity
IRIhttps://w3id.org/dpv/risk#ExtremelyHighSeverity
Typerdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:7SeverityLevels + → dpv:Severity +
Object of relation dpv:hasSeverity +
DefinitionLevel where Severity is Extremely High
Usage NoteThe suggested quantitative value for this concept is 0.99 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely Low Likelihood

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowLikelihoodPrefixrisk
LabelExtremely Low Likelihood
IRIhttps://w3id.org/dpv/risk#ExtremelyLowLikelihood
Typerdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood +
Object of relation dpv:hasLikelihood +
DefinitionLevel where Likelihood is Extremely Low
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely Low Risk

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowRiskPrefixrisk
LabelExtremely Low Risk
IRIhttps://w3id.org/dpv/risk#ExtremelyLowRisk
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
Object of relation dpv:hasRiskLevel +
DefinitionLevel where Risk is Extremely Low
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Extremely Low Severity

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermExtremelyLowSeverityPrefixrisk
LabelExtremely Low Severity
IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverity
Typerdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:7SeverityLevels + → dpv:Severity +
Object of relation dpv:hasSeverity +
DefinitionLevel where Severity is Extremely Low
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Fee

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFeePrefixrisk
LabelFee
IRIhttps://w3id.org/dpv/risk#Fee
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:FinancialImpact + → dpv:RiskConcept +
DefinitionSomething that acts as or provides fees e.g. for using a service
Source
Date Created2024-04-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Financial Impact

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFinancialImpactPrefixrisk
LabelFinancial Impact
IRIhttps://w3id.org/dpv/risk#FinancialImpact
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RiskConcept +
DefinitionThings that cause or have the potential to impact financial resources
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Financial Loss

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFinancialLossPrefixrisk
LabelFinancial Loss
IRIhttps://w3id.org/dpv/risk#FinancialLoss
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:FinancialImpact + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Fraud

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermFraudPrefixrisk
LabelFraud
IRIhttps://w3id.org/dpv/risk#Fraud
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Fraud
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Group Attribution Bias

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermGroupAttributionBiasPrefixrisk
LabelGroup Attribution Bias
IRIhttps://w3id.org/dpv/risk#GroupAttributionBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:CognitiveBias + → risk:Bias + → risk:RiskConcept +
DefinitionBias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in RISK +
+
+ + + +
+

Halt Source

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHaltSourcePrefixrisk
LabelHalt Source
IRIhttps://w3id.org/dpv/risk#HaltSource
Typerdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:SourceControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure +
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionControl that halts the risk source or prevents it from materialising
Date Created2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK +
+
+ + + +
+

Harm

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHarmPrefixrisk
LabelHarm
IRIhttps://w3id.org/dpv/risk#Harm
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IndividualRisk +
DefinitionSomething that acts as or causes Harm to humans
Usage NoteThis concept refers to the general abstract notion of harm
Date Created2022-08-13
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + + + + + + + + + + + +
+

High Likelihood

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHighLikelihoodPrefixrisk
LabelHigh Likelihood
IRIhttps://w3id.org/dpv/risk#HighLikelihood
Typerdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:3LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood +
Object of relation dpv:hasLikelihood +
DefinitionLevel where Likelihood is High
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

High Risk

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHighRiskPrefixrisk
LabelHigh Risk
IRIhttps://w3id.org/dpv/risk#HighRisk
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:3RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel +
Object of relation dpv:hasRiskLevel +
DefinitionLevel where Risk is High
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

High Severity

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHighSeverityPrefixrisk
LabelHigh Severity
IRIhttps://w3id.org/dpv/risk#HighSeverity
Typerdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:3SeverityLevels + → dpv:Severity +
Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
Broader/Parent types risk:7SeverityLevels + → dpv:Severity +
Object of relation dpv:hasSeverity +
DefinitionLevel where Severity is High
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK +
+
+ + + +
+

Human Errors

+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermHumanErrorsPrefixrisk
LabelHuman Errors
IRIhttps://w3id.org/dpv/risk#HumanErrors
Typerdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:UserRisks + → dpv:RiskConcept +
DefinitionSomething that acts as or causes Human Errors
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK +
+
+ + + +
+

Identification Control

+ + + + + + + + + + + + + + + - + - - @@ -6796,12 +8623,9 @@

Extremely Low Risk

- + - - - - + @@ -6812,18 +8636,15 @@

Extremely Low Risk

- + - - - - + - @@ -6832,44 +8653,43 @@

Extremely Low Risk

-
-

Extremely Low Severity

+
+

Identity Fraud

TermIdentificationControlPrefixrisk
LabelIdentification Control
IRIhttps://w3id.org/dpv/risk#IdentificationControl
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasRiskLevel + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Risk is Extremely LowControl to identify characteristics of event
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
Date Created2022-08-182024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - + + - - - - + @@ -6878,25 +8698,28 @@

Extremely Low Severity

- + - - - - + - + + + + - + - + + + + @@ -6905,7 +8728,7 @@

Extremely Low Severity

- @@ -6914,23 +8737,23 @@

Extremely Low Severity

-
-

Fee

+
+

Identity Theft

TermExtremelyLowSeverityIdentityFraud Prefix risk
LabelExtremely Low SeverityIdentity Fraud
IRIhttps://w3id.org/dpv/risk#ExtremelyLowSeverityhttps://w3id.org/dpv/risk#IdentityFraud
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:ConfidentialityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasSeverity -
DefinitionLevel where Severity is Extremely LowSomething that acts as or causes Identity Fraud
Usage NoteThe suggested quantitative value for this concept is 0.01 on a scale of 0 to 1
SourceENISA Threat Taxonomy 2016
Date Created2022-08-182022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -6942,7 +8765,10 @@

Fee

- + + @@ -6956,7 +8782,7 @@

Fee

- + @@ -6965,14 +8791,14 @@

Fee

- + - + @@ -6980,7 +8806,7 @@

Fee

- + @@ -6995,23 +8821,23 @@

Fee

-
-

Financial Impact

+
+

Illegal Data Processing

TermFeeIdentityTheft Prefix risk
LabelFeeIdentity Theft
IRIhttps://w3id.org/dpv/risk#Feehttps://w3id.org/dpv/risk#IdentityTheft
Broader/Parent types risk:FinancialImpact + risk:ConfidentialityConcept +
Broader/Parent types risk:OperationalSecurityRiskdpv:RiskConcept
DefinitionSomething that acts as or provides fees e.g. for using a serviceSomething that acts as or causes Identity Theft
SourceENISA Threat Taxonomy 2016
Date Created2024-04-142022-08-17
Date Modified
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
- + - + - + @@ -7023,7 +8849,8 @@

Financial Impact

- @@ -7036,20 +8863,35 @@

Financial Impact

- + - + + + + - + + + + - - - + + + + + + + + + + + + @@ -7063,40 +8905,47 @@

Financial Impact

-
-

Financial Loss

+
+

Impact Control

TermFinancialImpactIllegalDataProcessing Prefix risk
LabelFinancial ImpactIllegal Data Processing
IRIhttps://w3id.org/dpv/risk#FinancialImpacthttps://w3id.org/dpv/risk#IllegalDataProcessing
Broader/Parent types dpv:RiskConcept + risk:LegalRisk + → dpv:RiskConcept
DefinitionThings that cause or have the potential to impact financial resourcesSomething that acts as or causes Illegal Processing of Data
Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - + + + + @@ -7105,28 +8954,22 @@

Financial Loss

- + - - - - + - + - - - - + @@ -7135,7 +8978,7 @@

Financial Loss

- @@ -7144,39 +8987,37 @@

Financial Loss

-
-

Fraud

+
+

Implicit Bias

TermFinancialLossImpactControl Prefix risk
LabelFinancial LossImpact Control
IRIhttps://w3id.org/dpv/risk#FinancialLosshttps://w3id.org/dpv/risk#ImpactControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunityRisk Mitigation Measure that controls Impacts
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - @@ -7189,7 +9030,7 @@

Fraud

- + @@ -7198,28 +9039,25 @@

Fraud

- + - + - - - - + - + - @@ -7227,47 +9065,41 @@

Fraud

- -
-

Halt Source

+
+

Incident

TermFraudImplicitBias Prefix risk
LabelFraudImplicit Bias
IRIhttps://w3id.org/dpv/risk#Fraudhttps://w3id.org/dpv/risk#ImplicitBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes FraudBias that occurs when a human makes an association or assumption based on their mental models and memories
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - @@ -7278,10 +9110,16 @@

Halt Source

- + + + + + - + + + @@ -7291,59 +9129,73 @@

Halt Source

- + - + + + + - + -
TermHaltSourceIncident Prefix risk
LabelHalt SourceIncident
IRIhttps://w3id.org/dpv/risk#HaltSourcehttps://w3id.org/dpv/risk#Incident
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + risk:hasIncident
DefinitionControl that halts the risk source or prevents it from materialisingAn actual or occured event
Usage NoteIncident is realised or materialised risk
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0070 :: Indicating personal data involved in an incident
Date Created2024-05-192024-02-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez
See More: section RISK-CONTROLS in RISK + section CORE in DEX + , section INCIDENT in DEX
+ + - -
-

Harm

+
+

Incident Assessment Report

- + - + - + - + - - + + + + @@ -7352,12 +9204,9 @@

Harm

- + - - - - + @@ -7368,21 +9217,15 @@

Harm

- + - - - - - - - - + + - @@ -7391,60 +9234,44 @@

Harm

- - - - - - - - - - -
-

High Likelihood

+
+

Incident Concluded

TermHarmIncidentAssessmentReport Prefix risk
LabelHarmIncident Assessment Report
IRIhttps://w3id.org/dpv/risk#Harmhttps://w3id.org/dpv/risk#IncidentAssessmentReport
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:IndividualRisk + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure +
DefinitionSomething that acts as or causes Harm to humansA report describing the assessment of an incident in terms of its effects or impacts
Usage NoteThis concept refers to the general abstract notion of harm
Date Created2022-08-132024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + - + - - - - - - @@ -7455,12 +9282,9 @@

High Likelihood

- + - - - - + @@ -7471,7 +9295,7 @@

High Likelihood

- + @@ -7482,7 +9306,7 @@

High Likelihood

- @@ -7490,51 +9314,46 @@

High Likelihood

- -
-

High Risk

+
+

Incident Concluding Report

TermHighLikelihoodIncidentConcluded Prefix risk
LabelHigh LikelihoodIncident Concluded
IRIhttps://w3id.org/dpv/risk#HighLikelihoodhttps://w3id.org/dpv/risk#IncidentConcluded
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasLikelihood + dpv:hasContext, + dpv:hasStatus
DefinitionLevel where Likelihood is HighThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-182024-02-14
See More: section RISK-LEVELS in RISK + section INCIDENT-STATUS in RISK
- + - + - + - + - - - - - - @@ -7545,12 +9364,9 @@

High Risk

- + - - - - + @@ -7561,18 +9377,15 @@

High Risk

- + - - - - + - @@ -7580,51 +9393,46 @@

High Risk

- -
-

High Severity

+
+

Incident Detection Report

TermHighRiskIncidentConcludingReport Prefix risk
LabelHigh RiskIncident Concluding Report
IRIhttps://w3id.org/dpv/risk#HighRiskhttps://w3id.org/dpv/risk#IncidentConcludingReport
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept
Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasRiskLevel + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionLevel where Risk is HighA report describing the conclusion of an investigation regarding a Incident where all relevant facts are known
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-182024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
- + - + - + - + - - - - - - @@ -7635,12 +9443,9 @@

High Severity

- + - - - - + @@ -7651,18 +9456,15 @@

High Severity

- + - - - - + - @@ -7671,40 +9473,46 @@

High Severity

-
-

Human Errors

+
+

Incident Halted

TermHighSeverityIncidentDetectionReport Prefix risk
LabelHigh SeverityIncident Detection Report
IRIhttps://w3id.org/dpv/risk#HighSeverityhttps://w3id.org/dpv/risk#IncidentDetectionReport
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept
Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasSeverity + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionLevel where Severity is HighA report describing the detection of a Incident
Usage NoteThe suggested quantitative value for this concept is 0.75 on a scale of 0 to 1
Date Created2022-08-182024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section INCIDENT in RISK
- + - + - + - + - - + + + + @@ -7713,28 +9521,22 @@

Human Errors

- + - - - - + - + - - - - + @@ -7743,7 +9545,7 @@

Human Errors

- @@ -7751,46 +9553,46 @@

Human Errors

- -
-

Identification Control

+
+

Incident Handling Report

TermHumanErrorsIncidentHalted Prefix risk
LabelHuman ErrorsIncident Halted
IRIhttps://w3id.org/dpv/risk#HumanErrorshttps://w3id.org/dpv/risk#IncidentHalted
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types risk:UserRisks - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasContext, + dpv:hasStatus +
DefinitionSomething that acts as or causes Human ErrorsThe incident has halted or paused with a high likelihood of resuming or recurring
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-02-14
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
- + - + - + - + - - @@ -7801,7 +9603,7 @@

Identification Control

- + @@ -7822,7 +9624,7 @@

Identification Control

- @@ -7830,41 +9632,33 @@

Identification Control

- -
-

Identity Fraud

+
+

Incident Identifier

TermIdentificationControlIncidentHandlingReport Prefix risk
LabelIdentification ControlIncident Handling Report
IRIhttps://w3id.org/dpv/risk#IdentificationControlhttps://w3id.org/dpv/risk#IncidentHandlingReport
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionControl to identify characteristics of eventA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence
See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
- + - + - + - + - - - - - + @@ -7876,37 +9670,28 @@

Identity Fraud

- + - - - - + - + - - - - - - - - + + - @@ -7914,44 +9699,51 @@

Identity Fraud

- -
-

Identity Theft

+
+

Incident Impact Assessment

TermIdentityFraudIncidentIdentifier Prefix risk
LabelIdentity FraudIncident Identifier
IRIhttps://w3id.org/dpv/risk#IdentityFraudhttps://w3id.org/dpv/risk#IncidentIdentifier
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Identity FraudIdentifier associated with an incident
SourceENISA Threat Taxonomy 2016
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + - + - - - - + + + + @@ -7960,28 +9752,22 @@

Identity Theft

- + - - - - + - + - - - - + @@ -7990,7 +9776,7 @@

Identity Theft

- @@ -7999,40 +9785,46 @@

Identity Theft

-
-

Illegal Data Processing

+
+

Incident Mitigated

TermIdentityTheftIncidentImpactAssessment Prefix risk
LabelIdentity TheftIncident Impact Assessment
IRIhttps://w3id.org/dpv/risk#IdentityThefthttps://w3id.org/dpv/risk#IncidentImpactAssessment
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:ImpactAssessment + → dpv:RiskAssessment + → dpv:Assessment + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasAssessment, + dpv:hasImpactAssessment, + dpv:hasOrganisationalMeasure, + dpv:hasRiskAssessment, + dpv:hasTechnicalOrganisationalMeasure +
DefinitionSomething that acts as or causes Identity TheftAn impact assessment associated with a incident
SourceENISA Threat Taxonomy 2016
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT in RISK
- + - + - + - + - - + + + + @@ -8041,31 +9833,22 @@

Illegal Data Processing

- + - - - - + - - - - + - + - - - - + @@ -8074,7 +9857,7 @@

Illegal Data Processing

- @@ -8082,37 +9865,35 @@

Illegal Data Processing

- -
-

Impact Control

+
+

Incident Mitigation Measure

TermIllegalDataProcessingIncidentMitigated Prefix risk
LabelIllegal Data ProcessingIncident Mitigated
IRIhttps://w3id.org/dpv/risk#IllegalDataProcessinghttps://w3id.org/dpv/risk#IncidentMitigated
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasContext, + dpv:hasStatus +
DefinitionSomething that acts as or causes Illegal Processing of DataThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring
Usage NoteThis concept was called "IllegalProcessingData" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2022-08-172024-02-14
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section INCIDENT-STATUS in RISK
- + - + - + - + - @@ -8120,8 +9901,7 @@

Impact Control

@@ -8132,7 +9912,7 @@

Impact Control

- + @@ -8148,15 +9928,12 @@

Impact Control

- - - - + - @@ -8164,41 +9941,45 @@

Impact Control

-
-

Incident

+ +
+

Incident Near Miss

TermImpactControlIncidentMitigationMeasure Prefix risk
LabelImpact ControlIncident Mitigation Measure
IRIhttps://w3id.org/dpv/risk#ImpactControlhttps://w3id.org/dpv/risk#IncidentMitigationMeasure
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure + dpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:isMitigatedByMeasure
DefinitionRisk Mitigation Measure that controls ImpactsA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again
2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section INCIDENT in RISK
- + - + - + - + - - @@ -8209,16 +9990,10 @@

Incident

- + - - - - - - - + @@ -8228,48 +10003,42 @@

Incident

- + - - - - + - + -
TermIncidentIncidentNearMiss Prefix risk
LabelIncidentIncident Near Miss
IRIhttps://w3id.org/dpv/risk#Incidenthttps://w3id.org/dpv/risk#IncidentNearMiss
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types dpv:RiskConcept + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation risk:hasIncident + dpv:hasContext, + dpv:hasStatus
DefinitionAn actual or occured eventThe state where an incident was almost successful in taking place i.e. "it came very close"
Usage NoteIncident is realised or materialised risk
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
dex:E0070 :: Indicating personal data involved in an incident
Date Created2024-05-192024-02-14
Date Modified2024-08-16
ContributorsRob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio FernandezHarshvardhan J. Pandit
See More: section CORE in DEX - , section INCIDENT in DEX + section INCIDENT-STATUS in RISK
- - -
-

Incident Assessment Report

+
+

Incident Notice

- + - + - + @@ -8281,8 +10050,7 @@

Incident Assessment Report

- @@ -8290,8 +10058,8 @@

Incident Assessment Report

- @@ -8303,7 +10071,7 @@

Incident Assessment Report

- + @@ -8333,23 +10101,23 @@

Incident Assessment Report

-
-

Incident Concluded

+
+

Incident Ongoing

TermIncidentAssessmentReportIncidentNotice Prefix risk
LabelIncident Assessment ReportIncident Notice
IRIhttps://w3id.org/dpv/risk#IncidentAssessmentReporthttps://w3id.org/dpv/risk#IncidentNotice
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities + dpv:Noticedpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, + dpv:hasNotice, + dpv:hasOrganisationalMeasure, dpv:hasTechnicalOrganisationalMeasure
DefinitionA report describing the assessment of an incident in terms of its effects or impactsNotice associated with an Incident
- + - + - + @@ -8381,7 +10149,7 @@

Incident Concluded

- + @@ -8413,23 +10181,23 @@

Incident Concluded

-
-

Incident Concluding Report

+
+

Incident Ongoing Report

TermIncidentConcludedIncidentOngoing Prefix risk
LabelIncident ConcludedIncident Ongoing
IRIhttps://w3id.org/dpv/risk#IncidentConcludedhttps://w3id.org/dpv/risk#IncidentOngoing
DefinitionThe incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurringThe incident is ongoing i.e. still active
- + - + - + @@ -8463,7 +10231,7 @@

Incident Concluding Report

- + @@ -8492,23 +10260,23 @@

Incident Concluding Report

-
-

Incident Detection Report

+
+

Incident Preliminary Report

TermIncidentConcludingReportIncidentOngoingReport Prefix risk
LabelIncident Concluding ReportIncident Ongoing Report
IRIhttps://w3id.org/dpv/risk#IncidentConcludingReporthttps://w3id.org/dpv/risk#IncidentOngoingReport
DefinitionA report describing the conclusion of an investigation regarding a Incident where all relevant facts are knownA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated
- + - + - + @@ -8542,7 +10310,7 @@

Incident Detection Report

- + @@ -8571,45 +10339,45 @@

Incident Detection Report

- -
-

Incident Halted

+
+

Incident Register

TermIncidentDetectionReportIncidentPreliminaryReport Prefix risk
LabelIncident Detection ReportIncident Preliminary Report
IRIhttps://w3id.org/dpv/risk#IncidentDetectionReporthttps://w3id.org/dpv/risk#IncidentPreliminaryReport
DefinitionA report describing the detection of a IncidentA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known
- + - + - + - + - - @@ -8620,7 +10388,7 @@

Incident Halted

- + @@ -8633,7 +10401,7 @@

Incident Halted

- + @@ -8644,7 +10412,7 @@

Incident Halted

- @@ -8652,23 +10420,23 @@

Incident Halted

-
-

Incident Handling Report

+
+

Incident Report

TermIncidentHaltedIncidentRegister Prefix risk
LabelIncident HaltedIncident Register
IRIhttps://w3id.org/dpv/risk#IncidentHaltedhttps://w3id.org/dpv/risk#IncidentRegister
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + dpv:RecordsOfActivities + → dpv:OrganisationalMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasContext, - dpv:hasStatus + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionThe incident has halted or paused with a high likelihood of resuming or recurringA register recording incidentes, their reports, notifications, and other related activities
Date Created2024-02-142024-05-19
See More: section INCIDENT-STATUS in RISK + section INCIDENT in RISK
- + - + - + @@ -8680,8 +10448,7 @@

Incident Handling Report

- @@ -8702,7 +10469,7 @@

Incident Handling Report

- + @@ -8731,23 +10498,23 @@

Incident Handling Report

-
-

Incident Identifier

+
+

Incident Status

TermIncidentHandlingReportIncidentReport Prefix risk
LabelIncident Handling ReportIncident Report
IRIhttps://w3id.org/dpv/risk#IncidentHandlingReporthttps://w3id.org/dpv/risk#IncidentReport
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities + dpv:RecordsOfActivitiesdpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
DefinitionA report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrenceDocumented information about an incident, its handling, assessments,and notifications
- + - + - + @@ -8757,10 +10524,19 @@

Incident Identifier

- + + + - + + + + @@ -8769,10 +10545,13 @@

Incident Identifier

- + + + + @@ -8782,15 +10561,18 @@

Incident Identifier

- + - + + + + - @@ -8798,49 +10580,45 @@

Incident Identifier

-
-

Incident Impact Assessment

+ +
+

Incident Status Unknown

TermIncidentIdentifierIncidentStatus Prefix risk
LabelIncident IdentifierIncident Status
IRIhttps://w3id.org/dpv/risk#IncidentIdentifierhttps://w3id.org/dpv/risk#IncidentStatus
rdfs:Class, skos:Concept
Broader/Parent types dpv:Status + → dpv:Context +
Object of relation dpv:hasContext, + dpv:hasStatus +
DefinitionIdentifier associated with an incidentStatus associated with an incident
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
Date Created2024-05-192024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT in RISK + section INCIDENT-STATUS in DEX
- + - + - + - + - - @@ -8851,7 +10629,7 @@

Incident Impact Assessment

- + @@ -8864,7 +10642,7 @@

Incident Impact Assessment

- + @@ -8875,7 +10653,7 @@

Incident Impact Assessment

- @@ -8884,23 +10662,23 @@

Incident Impact Assessment

-
-

Incident Mitigated

+
+

Incident Suspected

TermIncidentImpactAssessmentIncidentStatusUnknown Prefix risk
LabelIncident Impact AssessmentIncident Status Unknown
IRIhttps://w3id.org/dpv/risk#IncidentImpactAssessmenthttps://w3id.org/dpv/risk#IncidentStatusUnknown
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:IncidentStatus
Broader/Parent types dpv:ImpactAssessment - → dpv:RiskAssessment - → dpv:Assessment - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IncidentStatus + → dpv:Status + → dpv:Context
Object of relation dpv:hasAssessment, - dpv:hasImpactAssessment, - dpv:hasOrganisationalMeasure, - dpv:hasRiskAssessment, - dpv:hasTechnicalOrganisationalMeasure + dpv:hasContext, + dpv:hasStatus
DefinitionAn impact assessment associated with a incidentThe status of a incident is unknown
Date Created2024-05-192024-02-14
See More: section INCIDENT in RISK + section INCIDENT-STATUS in RISK
- + - + - + @@ -8932,7 +10710,7 @@

Incident Mitigated

- + @@ -8964,23 +10742,23 @@

Incident Mitigated

-
-

Incident Mitigation Measure

+
+

Incident Suspected Report

TermIncidentMitigatedIncidentSuspected Prefix risk
LabelIncident MitigatedIncident Suspected
IRIhttps://w3id.org/dpv/risk#IncidentMitigatedhttps://w3id.org/dpv/risk#IncidentSuspected
DefinitionThe incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurringThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing
- + - + - + @@ -8992,15 +10770,18 @@

Incident Mitigation Measure

- - @@ -9011,7 +10792,7 @@

Incident Mitigation Measure

- + @@ -9041,23 +10822,23 @@

Incident Mitigation Measure

-
-

Incident Near Miss

+
+

Incident Terminated

TermIncidentMitigationMeasureIncidentSuspectedReport Prefix risk
LabelIncident Mitigation MeasureIncident Suspected Report
IRIhttps://w3id.org/dpv/risk#IncidentMitigationMeasurehttps://w3id.org/dpv/risk#IncidentSuspectedReport
Broader/Parent types dpv:RiskMitigationMeasure + risk:IncidentReport + → dpv:RecordsOfActivities + → dpv:OrganisationalMeasuredpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure + dpv:hasOrganisationalMeasure, + dpv:hasRecordOfActivity, + dpv:hasTechnicalOrganisationalMeasure
DefinitionA mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring againA report describing the suspicion of an incident in the past or occuring
- + - + - + @@ -9089,7 +10870,7 @@

Incident Near Miss

- + @@ -9121,57 +10902,47 @@

Incident Near Miss

-
-

Incident Notice

+ +
+

Individual Health & Safety

TermIncidentNearMissIncidentTerminated Prefix risk
LabelIncident Near MissIncident Terminated
IRIhttps://w3id.org/dpv/risk#IncidentNearMisshttps://w3id.org/dpv/risk#IncidentTerminated
DefinitionThe state where an incident was almost successful in taking place i.e. "it came very close"The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring
- + - + - + - + - - - - - + - - - - + @@ -9181,17 +10952,14 @@

Incident Notice

- - - - + - @@ -9199,47 +10967,36 @@

Incident Notice

- -
-

Incident Ongoing

+
+

Individual Risk

TermIncidentNoticeIndividualHealthSafety Prefix risk
LabelIncident NoticeIndividual Health & Safety
IRIhttps://w3id.org/dpv/risk#IncidentNoticehttps://w3id.org/dpv/risk#IndividualHealthSafety
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:Notice - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
Object of relation dpv:hasNotice, - dpv:hasOrganisationalMeasure, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionNotice associated with an Incident
Date Created2024-05-19
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - + - - - - + @@ -9248,7 +11005,7 @@

Incident Ongoing

- + @@ -9259,20 +11016,14 @@

Incident Ongoing

- - - - + - - - - + - @@ -9280,48 +11031,40 @@

Incident Ongoing

-
-

Incident Ongoing Report

+ +
+

Informativeness Bias

TermIncidentOngoingIndividualRisk Prefix risk
LabelIncident OngoingIndividual Risk
IRIhttps://w3id.org/dpv/risk#IncidentOngoinghttps://w3id.org/dpv/risk#IndividualRisk
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context -
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe incident is ongoing i.e. still activeRisks and issues that affect or have the potential to affect specific individuals
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -9330,28 +11073,34 @@

Incident Ongoing Report

- + - + + + + - + - + + + + - @@ -9359,48 +11108,42 @@

Incident Ongoing Report

-
-

Incident Preliminary Report

+ +
+

In-Group Bias

TermIncidentOngoingReportInformativenessBias Prefix risk
LabelIncident Ongoing ReportInformativeness Bias
IRIhttps://w3id.org/dpv/risk#IncidentOngoingReporthttps://w3id.org/dpv/risk#InformativenessBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:EngineeringDecisionBias
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigatedBias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section INCIDENT in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -9409,28 +11152,34 @@

Incident Preliminary Report

- + - + + + + - + - + + + + - @@ -9438,47 +11187,40 @@

Incident Preliminary Report

-
-

Incident Register

+ +
+

Injury

TermIncidentPreliminaryReportInGroupBias Prefix risk
LabelIncident Preliminary ReportIn-Group Bias
IRIhttps://w3id.org/dpv/risk#IncidentPreliminaryReporthttps://w3id.org/dpv/risk#InGroupBias
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be knownBias that occurs when showing partiality to one's own group or own characteristics
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section INCIDENT in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -9487,22 +11229,28 @@

Incident Register

- + - + + + + - + - + + + + @@ -9511,7 +11259,7 @@

Incident Register

- @@ -9519,57 +11267,77 @@

Incident Register

-
-

Incident Report

+ +
+

None

TermIncidentRegisterInjury Prefix risk
LabelIncident RegisterInjury
IRIhttps://w3id.org/dpv/risk#IncidentRegisterhttps://w3id.org/dpv/risk#Injury
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA register recording incidentes, their reports, notifications, and other related activitiesSomething that acts as or causes Injury
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + + + + + + + + + + + - - - - + - - - - + @@ -9579,17 +11347,14 @@

Incident Report

- - - - + - @@ -9597,23 +11362,23 @@

Incident Report

-
-

Incident Status

+
+

Integrity Incident

TermIncidentReportIntegrityBreach Prefix risk
LabelIncident ReportNone
IRIhttps://w3id.org/dpv/risk#IncidentReporthttps://w3id.org/dpv/risk#IntegrityBreach
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:DataBreach + → risk:AvailabilityConcept +
Broader/Parent types risk:DataBreach + → risk:ConfidentialityConcept +
Broader/Parent types risk:DataBreach + → risk:IntegrityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:AvailabilityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:ConfidentialityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:IntegrityConcept +
Broader/Parent types risk:DataBreach + → risk:SecurityBreach + → risk:OperationalSecurityRisk + → dpv:RiskConcept
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionDocumented information about an incident, its handling, assessments,and notifications
Date Created2024-05-19
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -9625,15 +11390,14 @@

Incident Status

- - @@ -9644,13 +11408,10 @@

Incident Status

- + - - - @@ -9660,18 +11421,15 @@

Incident Status

- + - - - - + - @@ -9680,46 +11438,40 @@

Incident Status

-
-

Incident Status Unknown

+
+

Intentional Misuse

TermIncidentStatusIntegrityIncident Prefix risk
LabelIncident StatusIntegrity Incident
IRIhttps://w3id.org/dpv/risk#IncidentStatushttps://w3id.org/dpv/risk#IntegrityIncident
Broader/Parent types dpv:Status - → dpv:Context + risk:Incident + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus + risk:hasIncident
DefinitionStatus associated with an incidentIncident where the integrity of information or system has been affected
Examples dex:E0069 :: Using DPV and RISK extension to represent incidents
Date Created2024-02-142024-05-19
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in DEX + section INCIDENT in RISK
- + - + - + - + - - - - - + @@ -9728,7 +11480,7 @@

Incident Status Unknown

- + @@ -9739,20 +11491,14 @@

Incident Status Unknown

- - - - + - - - - + - @@ -9761,46 +11507,43 @@

Incident Status Unknown

-
-

Incident Suspected

+
+

Intercept Communications

TermIncidentStatusUnknownIntentionalMisuse Prefix risk
LabelIncident Status UnknownIntentional Misuse
IRIhttps://w3id.org/dpv/risk#IncidentStatusUnknownhttps://w3id.org/dpv/risk#IntentionalMisuse
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:UserRisks + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe status of a incident is unknownIntentional Misuse
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - - - - + @@ -9809,22 +11552,31 @@

Incident Suspected

- + - + + + + - + + + + - + - + + + + @@ -9833,7 +11585,7 @@

Incident Suspected

- @@ -9841,48 +11593,45 @@

Incident Suspected

-
-

Incident Suspected Report

+ + + + + +
+

Judicial Costs

TermIncidentSuspectedInterceptCommunications Prefix risk
LabelIncident SuspectedIntercept Communications
IRIhttps://w3id.org/dpv/risk#IncidentSuspectedhttps://w3id.org/dpv/risk#InterceptCommunications
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoingSomething that acts as or causes Interception of Communications
Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2024-02-142022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -9891,7 +11640,7 @@

Incident Suspected Report

- + @@ -9902,17 +11651,14 @@

Incident Suspected Report

- - - - + - @@ -9921,46 +11667,40 @@

Incident Suspected Report

-
-

Incident Terminated

+
+

Judicial Penalty

TermIncidentSuspectedReportJudicialCosts Prefix risk
LabelIncident Suspected ReportJudicial Costs
IRIhttps://w3id.org/dpv/risk#IncidentSuspectedReporthttps://w3id.org/dpv/risk#JudicialCosts
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentReport - → dpv:RecordsOfActivities - → dpv:OrganisationalMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasOrganisationalMeasure, - dpv:hasRecordOfActivity, - dpv:hasTechnicalOrganisationalMeasure -
DefinitionA report describing the suspicion of an incident in the past or occuringSomething that involves or causes judicial costs to be paid
Date Created2024-05-19
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -9969,7 +11709,7 @@

Incident Terminated

- + @@ -9980,20 +11720,14 @@

Incident Terminated

- - - - + - - - - + - @@ -10002,23 +11736,23 @@

Incident Terminated

-
-

Individual Health & Safety

+
+

Legal Risk

TermIncidentTerminatedJudicialPenalty Prefix risk
LabelIncident TerminatedJudicial Penalty
IRIhttps://w3id.org/dpv/risk#IncidentTerminatedhttps://w3id.org/dpv/risk#JudicialPenalty
Typerdfs:Class, skos:Concept, risk:IncidentStatusrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:IncidentStatus - → dpv:Status - → dpv:Context + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasContext, - dpv:hasStatus -
DefinitionThe incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurringSomething that involves or causes judicial penalties to be paid
Date Created2024-02-14
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT-STATUS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -10030,7 +11764,7 @@

Individual Health & Safety

- @@ -10041,7 +11775,10 @@

Individual Health & Safety

- + + + + @@ -10066,33 +11803,38 @@

Individual Health & Safety

-
-

Individual Risk

+ +
+

Lose of Credibility

TermIndividualHealthSafetyLegalRisk Prefix risk
LabelIndividual Health & SafetyLegal Risk
IRIhttps://w3id.org/dpv/risk#IndividualHealthSafetyhttps://w3id.org/dpv/risk#LegalRisk
Broader/Parent types risk:IndividualRisk + dpv:RiskConcept
DefinitionRisks and issues that have their basis in legal requirements and enforcement
- + - + - + - + - + + + @@ -10104,20 +11846,32 @@

Individual Risk

- + - + + + + - - - + + + + + + + + + + + + @@ -10131,23 +11885,23 @@

Individual Risk

-
-

Injury

+
+

Lose of Customer Confidence

TermIndividualRiskLoseCredibility Prefix risk
LabelIndividual RiskLose of Credibility
IRIhttps://w3id.org/dpv/risk#IndividualRiskhttps://w3id.org/dpv/risk#LoseCredibility
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ReputationalRisk + → dpv:RiskConcept +
DefinitionRisks and issues that affect or have the potential to affect specific individualsSomething that acts as or causes Loss of Credibility
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -10159,7 +11913,8 @@

Injury

- @@ -10172,7 +11927,7 @@

Injury

- + @@ -10211,23 +11966,23 @@

Injury

-
-

None

+
+

Lose of Goodwill

TermInjuryLoseCustomerConfidence Prefix risk
LabelInjuryLose of Customer Confidence
IRIhttps://w3id.org/dpv/risk#Injuryhttps://w3id.org/dpv/risk#LoseCustomerConfidence
Broader/Parent types risk:IndividualRisk + risk:ReputationalRisk + → dpv:RiskConcept
DefinitionSomething that acts as or causes InjurySomething that acts as or causes Loss of Customer Confidence
- + - + - + @@ -10239,36 +11994,7 @@

None

- - - - - - - - - - - - - @@ -10280,19 +12006,34 @@

None

- + + + + - + + + + - - - + + + + + + + + + + + + @@ -10305,44 +12046,41 @@

None

-
-

Integrity Incident

+ +
+

Lose of Negotiating Capacity

TermIntegrityBreachLoseGoodwill Prefix risk
LabelNoneLose of Goodwill
IRIhttps://w3id.org/dpv/risk#IntegrityBreachhttps://w3id.org/dpv/risk#LoseGoodwill
Broader/Parent types risk:DataBreach - → risk:AvailabilityConcept -
Broader/Parent types risk:DataBreach - → risk:ConfidentialityConcept -
Broader/Parent types risk:DataBreach - → risk:IntegrityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:AvailabilityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:ConfidentialityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:IntegrityConcept -
Broader/Parent types risk:DataBreach - → risk:SecurityBreach - → risk:OperationalSecurityRisk + risk:ReputationalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Loss of Goodwill
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - - + @@ -10351,28 +12089,37 @@

Integrity Incident

- + - + + + + - + - - + + + + + + + + - @@ -10381,23 +12128,23 @@

Integrity Incident

-
-

Intentional Misuse

+
+

Lose of Opportunity

TermIntegrityIncidentLoseNegotiatingCapacity Prefix risk
LabelIntegrity IncidentLose of Negotiating Capacity
IRIhttps://w3id.org/dpv/risk#IntegrityIncidenthttps://w3id.org/dpv/risk#LoseNegotiatingCapacity
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:Incident + risk:ReputationalRiskdpv:RiskConcept
Object of relation risk:hasIncident -
DefinitionIncident where the integrity of information or system has been affectedSomething that acts as or causes Loss of Negotiating Capacity
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section INCIDENT in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -10409,7 +12156,7 @@

Intentional Misuse

- @@ -10423,20 +12170,32 @@

Intentional Misuse

- + - + + + + - - - + + + + + + + + + + + + @@ -10450,23 +12209,23 @@

Intentional Misuse

-
-

Intercept Communications

+
+

Lose of Reputation

TermIntentionalMisuseLoseOpportunity Prefix risk
LabelIntentional MisuseLose of Opportunity
IRIhttps://w3id.org/dpv/risk#IntentionalMisusehttps://w3id.org/dpv/risk#LoseOpportunity
Broader/Parent types risk:UserRisks + risk:ReputationalRiskdpv:RiskConcept
DefinitionIntentional MisuseSomething that acts as or causes Loss of Opportunity
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -10478,10 +12237,7 @@

Intercept Communications

- - - @@ -10495,12 +12251,9 @@

Intercept Communications

- + - - - - + @@ -10537,27 +12290,23 @@

Intercept Communications

- - - - -
-

Judicial Costs

+
+

Lose of Trust

TermInterceptCommunicationsLoseReputation Prefix risk
LabelIntercept CommunicationsLose of Reputation
IRIhttps://w3id.org/dpv/risk#InterceptCommunicationshttps://w3id.org/dpv/risk#LoseReputation
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat + risk:ReputationalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Interception of CommunicationsSomething that acts as or causes Loss of Reputation
Usage NoteThis concept was called "InterceptionCommunications" in DPV 2.0
- + - + - + @@ -10569,7 +12318,7 @@

Judicial Costs

- @@ -10583,20 +12332,32 @@

Judicial Costs

- + - + + + + - - - + + + + + + + + + + + + @@ -10610,40 +12371,52 @@

Judicial Costs

-
-

Judicial Penalty

+
+

Low Likelihood

TermJudicialCostsLoseTrust Prefix risk
LabelJudicial CostsLose of Trust
IRIhttps://w3id.org/dpv/risk#JudicialCostshttps://w3id.org/dpv/risk#LoseTrust
Broader/Parent types risk:FinancialImpact + risk:ReputationalRiskdpv:RiskConcept
DefinitionSomething that involves or causes judicial costs to be paidSomething that acts as or causes Loss of Trust
SourceISO/IEC 27005:2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - + + + + - + + + + @@ -10652,9 +12425,12 @@

Judicial Penalty

- + - + + + + @@ -10663,14 +12439,20 @@

Judicial Penalty

- + + + + - + + + + - @@ -10679,39 +12461,52 @@

Judicial Penalty

-
-

Legal Risk

+
+

Low Risk

TermJudicialPenaltyLowLikelihood Prefix risk
LabelJudicial PenaltyLow Likelihood
IRIhttps://w3id.org/dpv/risk#JudicialPenaltyhttps://w3id.org/dpv/risk#LowLikelihood
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
Object of relation dpv:hasLikelihood +
DefinitionSomething that involves or causes judicial penalties to be paidLevel where Likelihood is Low
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - + + + + - + + + + @@ -10720,9 +12515,12 @@

Legal Risk

- + - + + + + @@ -10731,14 +12529,20 @@

Legal Risk

- + + + + - + + + + - @@ -10747,40 +12551,52 @@

Legal Risk

-
-

Lose of Credibility

+
+

Low Severity

TermLegalRiskLowRisk Prefix risk
LabelLegal RiskLow Risk
IRIhttps://w3id.org/dpv/risk#LegalRiskhttps://w3id.org/dpv/risk#LowRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
Object of relation dpv:hasRiskLevel +
DefinitionRisks and issues that have their basis in legal requirements and enforcementLevel where Risk is Low
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Date Created2022-08-18
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - + + + + - + + + + @@ -10789,28 +12605,25 @@

Lose of Credibility

- + - + + + + - - - - + - + - - - - + @@ -10819,7 +12632,7 @@

Lose of Credibility

- @@ -10828,23 +12641,23 @@

Lose of Credibility

-
-

Lose of Customer Confidence

+
+

Malicious Code Attack

TermLoseCredibilityLowSeverity Prefix risk
LabelLose of CredibilityLow Severity
IRIhttps://w3id.org/dpv/risk#LoseCredibilityhttps://w3id.org/dpv/risk#LowSeverity
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3SeverityLevels + → dpv:Severity +
Broader/Parent types risk:5SeverityLevels + → dpv:Severity +
Broader/Parent types risk:7SeverityLevels + → dpv:Severity
Object of relation dpv:hasSeverity +
DefinitionSomething that acts as or causes Loss of CredibilityLevel where Severity is Low
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + @@ -10856,8 +12669,17 @@

Lose of Customer Confidence

- + + + + + + @@ -10870,7 +12692,7 @@

Lose of Customer Confidence

- + @@ -10879,7 +12701,7 @@

Lose of Customer Confidence

- + @@ -10909,23 +12731,23 @@

Lose of Customer Confidence

-
-

Lose of Goodwill

+
+

Malware Attack

TermLoseCustomerConfidenceMaliciousCodeAttack Prefix risk
LabelLose of Customer ConfidenceMalicious Code Attack
IRIhttps://w3id.org/dpv/risk#LoseCustomerConfidencehttps://w3id.org/dpv/risk#MaliciousCodeAttack
Broader/Parent types risk:ReputationalRisk + risk:AvailabilityConcept +
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionSomething that acts as or causes Loss of Customer ConfidenceSomething that acts as or causes Malicious Code Attack
SourceISO/IEC 27005:2018ENISA Reference Incident Classification Taxonomy 2018
- + - + - + @@ -10937,8 +12759,17 @@

Lose of Goodwill

- + + + + + + @@ -10951,7 +12782,7 @@

Lose of Goodwill

- + @@ -10960,7 +12791,7 @@

Lose of Goodwill

- + @@ -10990,23 +12821,23 @@

Lose of Goodwill

-
-

Lose of Negotiating Capacity

+
+

Material Damage

TermLoseGoodwillMalwareAttack Prefix risk
LabelLose of GoodwillMalware Attack
IRIhttps://w3id.org/dpv/risk#LoseGoodwillhttps://w3id.org/dpv/risk#MalwareAttack
Broader/Parent types risk:ReputationalRisk + risk:AvailabilityConcept +
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreatdpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionSomething that acts as or causes Loss of GoodwillSomething that acts as or causes Malware Attack
SourceISO/IEC 27005:2018ENISA Methodology for Sectoral Cybersecurity Assessments
- + - + - + @@ -11018,7 +12849,7 @@

Lose of Negotiating Capacity

- @@ -11032,23 +12863,23 @@

Lose of Negotiating Capacity

- + - + + + + - - - - + - + @@ -11071,23 +12902,23 @@

Lose of Negotiating Capacity

-
-

Lose of Opportunity

+
+

Misuse

TermLoseNegotiatingCapacityMaterialDamage Prefix risk
LabelLose of Negotiating CapacityMaterial Damage
IRIhttps://w3id.org/dpv/risk#LoseNegotiatingCapacityhttps://w3id.org/dpv/risk#MaterialDamage
Broader/Parent types risk:ReputationalRisk + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Loss of Negotiating CapacitySomething that acts as or causes Material Damage
Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
SourceISO/IEC 27005:2018
Date Created2022-08-172022-03-30
Date Modified
- + - + - + @@ -11099,7 +12930,7 @@

Lose of Opportunity

- @@ -11113,23 +12944,20 @@

Lose of Opportunity

- + - - - - + - + @@ -11137,7 +12965,7 @@

Lose of Opportunity

- + @@ -11152,40 +12980,52 @@

Lose of Opportunity

-
-

Lose of Reputation

+
+

Moderate Likelihood

TermLoseOpportunityMisuse Prefix risk
LabelLose of OpportunityMisuse
IRIhttps://w3id.org/dpv/risk#LoseOpportunityhttps://w3id.org/dpv/risk#Misuse
Broader/Parent types risk:ReputationalRisk + risk:UserRisksdpv:RiskConcept
DefinitionSomething that acts as or causes Loss of OpportunitySomething that acts as or causes Misuse
SourceISO/IEC 27005:2018
Date Created2022-08-172024-06-11
Date Modified
ContributorsHarshvardhan J. PanditDelaram Golpayegani
- + - + - + - + - + + + + - + + + + @@ -11194,28 +13034,25 @@

Lose of Reputation

- + - + + + + - - - - + - + - - - - + @@ -11224,7 +13061,7 @@

Lose of Reputation

- @@ -11233,40 +13070,52 @@

Lose of Reputation

-
-

Lose of Trust

+
+

Moderate Risk

TermLoseReputationModerateLikelihood Prefix risk
LabelLose of ReputationModerate Likelihood
IRIhttps://w3id.org/dpv/risk#LoseReputationhttps://w3id.org/dpv/risk#ModerateLikelihood
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:Likelihood
Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:5LikelihoodLevels + → dpv:Likelihood +
Broader/Parent types risk:7LikelihoodLevels + → dpv:Likelihood
Object of relation dpv:hasLikelihood +
DefinitionSomething that acts as or causes Loss of ReputationLevel where Likelihood is Moderate
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - + + + + - + + + + @@ -11275,28 +13124,25 @@

Lose of Trust

- + - + + + + - - - - + - + - - - - + @@ -11305,7 +13151,7 @@

Lose of Trust

- @@ -11314,50 +13160,50 @@

Lose of Trust

-
-

Low Likelihood

+
+

Moderate Severity

TermLoseTrustModerateRisk Prefix risk
LabelLose of TrustModerate Risk
IRIhttps://w3id.org/dpv/risk#LoseTrusthttps://w3id.org/dpv/risk#ModerateRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:ReputationalRisk - → dpv:RiskConcept + risk:3RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:5RiskLevels + → dpv:RiskLevel +
Broader/Parent types risk:7RiskLevels + → dpv:RiskLevel
Object of relation dpv:hasRiskLevel +
DefinitionSomething that acts as or causes Loss of TrustLevel where Risk is Moderate
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
SourceISO/IEC 27005:2018
Date Created2022-08-172022-08-18
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-LEVELS in RISK
- + - + - + - + - - - - @@ -11368,11 +13214,11 @@

Low Likelihood

- + - + @@ -11404,50 +13250,46 @@

Low Likelihood

-
-

Low Risk

+
+

Monitor Consequence

TermLowLikelihoodModerateSeverity Prefix risk
LabelLow LikelihoodModerate Severity
IRIhttps://w3id.org/dpv/risk#LowLikelihoodhttps://w3id.org/dpv/risk#ModerateSeverity
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, dpv:Severity
Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood + risk:3SeverityLevels + → dpv:Severity
Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood + risk:5SeverityLevels + → dpv:Severity
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:7SeverityLevels + → dpv:Severity
Object of relation dpv:hasLikelihood + dpv:hasSeverity
DefinitionLevel where Likelihood is LowLevel where Severity is Moderate
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
- + - + - + - - - - - - - - + + + + - - @@ -11458,12 +13300,9 @@

Low Risk

- + - - - - + @@ -11474,7 +13313,7 @@

Low Risk

- + @@ -11485,7 +13324,7 @@

Low Risk

- @@ -11494,50 +13333,45 @@

Low Risk

-
-

Low Severity

+
+

Monitor Control

TermLowRiskMonitorConsequence Prefix risk
LabelLow RiskMonitor Consequence
IRIhttps://w3id.org/dpv/risk#LowRiskhttps://w3id.org/dpv/risk#MonitorConsequence
Typerdfs:Class, skos:Concept, dpv:RiskLevel
Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
rdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasRiskLevel + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Risk is LowControl that monitors a Risk Consequence
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1
Date Created2022-08-182024-05-19
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - @@ -11548,11 +13382,11 @@

Low Severity

- + - + @@ -11564,7 +13398,7 @@

Low Severity

- + @@ -11575,7 +13409,7 @@

Low Severity

- @@ -11584,49 +13418,48 @@

Low Severity

-
-

Malicious Code Attack

+
+

Monitor Impact

TermLowSeverityMonitorControl Prefix risk
LabelLow SeverityMonitor Control
IRIhttps://w3id.org/dpv/risk#LowSeverityhttps://w3id.org/dpv/risk#MonitorControl
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasSeverity + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Severity is LowRisk Mitigation Measure that uses controls to monitor events
Usage NoteThe suggested quantitative value for this concept is 0.25 on a scale of 0 to 1Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
Date Created2022-08-182024-05-19
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - - - + + + + @@ -11635,28 +13468,22 @@

Malicious Code Attack

- + - - - - + - + - - - - + @@ -11665,7 +13492,7 @@

Malicious Code Attack

- @@ -11674,49 +13501,48 @@

Malicious Code Attack

-
-

Malware Attack

+
+

Monitor Risk

TermMaliciousCodeAttackMonitorImpact Prefix risk
LabelMalicious Code AttackMonitor Impact
IRIhttps://w3id.org/dpv/risk#MaliciousCodeAttackhttps://w3id.org/dpv/risk#MonitorImpact
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
Broader/Parent types risk:IntegrityConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Malicious Code AttackControl that monitors a Risk Impact
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - - - + + + + @@ -11725,28 +13551,22 @@

Malware Attack

- + - - - - + - + - - - - + @@ -11755,7 +13575,7 @@

Malware Attack

- @@ -11764,40 +13584,48 @@

Malware Attack

-
-

Material Damage

+
+

Monitor Control

TermMalwareAttackMonitorRisk Prefix risk
LabelMalware AttackMonitor Risk
IRIhttps://w3id.org/dpv/risk#MalwareAttackhttps://w3id.org/dpv/risk#MonitorRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
Broader/Parent types risk:IntegrityConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Malware AttackControl that monitors a Risk
SourceENISA Methodology for Sectoral Cybersecurity Assessments
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + @@ -11806,12 +13634,9 @@

Material Damage

- + - - - - + @@ -11822,12 +13647,9 @@

Material Damage

- + - - - - + @@ -11836,7 +13658,7 @@

Material Damage

- @@ -11845,40 +13667,48 @@

Material Damage

-
-

Misuse

+
+

Monitor Risk Source

TermMaterialDamageMonitorRiskControl Prefix risk
LabelMaterial DamageMonitor Control
IRIhttps://w3id.org/dpv/risk#MaterialDamagehttps://w3id.org/dpv/risk#MonitorRiskControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Material DamageControl that monitors another Control
Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
Date Created2022-03-302024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + @@ -11887,7 +13717,7 @@

Misuse

- + @@ -11900,21 +13730,18 @@

Misuse

- + - - - - + - + - @@ -11923,50 +13750,46 @@

Misuse

-
-

Moderate Likelihood

+
+

Monitor Vulnerabilities

TermMisuseMonitorRiskSource Prefix risk
LabelMisuseMonitor Risk Source
IRIhttps://w3id.org/dpv/risk#Misusehttps://w3id.org/dpv/risk#MonitorRiskSource
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:UserRisks - → dpv:RiskConcept + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes MisuseControl that monitors a Risk Source
Date Created2024-06-112024-05-19
Date Modified2024-08-16
ContributorsDelaram GolpayeganiHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - @@ -11977,12 +13800,9 @@

Moderate Likelihood

- + - - - - + @@ -11993,7 +13813,7 @@

Moderate Likelihood

- + @@ -12004,7 +13824,7 @@

Moderate Likelihood

- @@ -12013,52 +13833,40 @@

Moderate Likelihood

-
-

Moderate Risk

+
+

Non-Material Damage

TermModerateLikelihoodMonitorVulnerabilities Prefix risk
LabelModerate LikelihoodMonitor Vulnerabilities
IRIhttps://w3id.org/dpv/risk#ModerateLikelihoodhttps://w3id.org/dpv/risk#MonitorVulnerabilities
Typerdfs:Class, skos:Concept, dpv:Likelihoodrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:3LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:5LikelihoodLevels - → dpv:Likelihood -
Broader/Parent types risk:7LikelihoodLevels - → dpv:Likelihood + risk:MonitorControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasLikelihood + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionLevel where Likelihood is ModerateControl that monitors a Risk Vulnerability
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Date Created2022-08-182024-05-19
See More: section RISK-LEVELS in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - - - - - - - - + @@ -12067,11 +13875,11 @@

Moderate Risk

- + - + @@ -12083,9 +13891,12 @@

Moderate Risk

- + - + + + + @@ -12094,7 +13905,7 @@

Moderate Risk

- @@ -12103,52 +13914,42 @@

Moderate Risk

-
-

Moderate Severity

+
+

Non-Normality Bias

TermModerateRiskNonMaterialDamage Prefix risk
LabelModerate RiskNon-Material Damage
IRIhttps://w3id.org/dpv/risk#ModerateRiskhttps://w3id.org/dpv/risk#NonMaterialDamage
Typerdfs:Class, skos:Concept, dpv:RiskLevelrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:3RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:5RiskLevels - → dpv:RiskLevel -
Broader/Parent types risk:7RiskLevels - → dpv:RiskLevel + risk:LegalRisk + → dpv:RiskConcept
Object of relation dpv:hasRiskLevel -
DefinitionLevel where Risk is ModerateSomething that acts as or causes Non-Material Damage
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1The criteria for what is considered material damage is based in jurisdictional laws and norms
Date Created2022-08-182022-03-30
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-LEVELS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - - - - - + @@ -12157,34 +13958,34 @@

Moderate Severity

- + - - - - + - + + + + - + - + - @@ -12193,48 +13994,43 @@

Moderate Severity

-
-

Monitor Consequence

+
+

Non-Response Bias

TermModerateSeverityNonNormalityBias Prefix risk
LabelModerate SeverityNon-Normality Bias
IRIhttps://w3id.org/dpv/risk#ModerateSeverityhttps://w3id.org/dpv/risk#NonNormalityBias
Typerdfs:Class, skos:Concept, dpv:Severityrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:3SeverityLevels - → dpv:Severity -
Broader/Parent types risk:5SeverityLevels - → dpv:Severity -
Broader/Parent types risk:7SeverityLevels - → dpv:Severity + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasSeverity -
DefinitionLevel where Severity is ModerateBias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading
Usage NoteThe suggested quantitative value for this concept is 0.5 on a scale of 0 to 1
Source
Date Created2022-08-182024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-LEVELS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -12243,31 +14039,34 @@

Monitor Consequence

- + - + + + + - + - + - @@ -12276,47 +14075,39 @@

Monitor Consequence

-
-

Monitor Control

+
+

Operational Security Risk

TermMonitorConsequenceNonResponseBias Prefix risk
LabelMonitor ConsequenceNon-Response Bias
IRIhttps://w3id.org/dpv/risk#MonitorConsequencehttps://w3id.org/dpv/risk#NonResponseBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk ConsequenceBias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias
Source
Date Created2024-05-192024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -12325,12 +14116,9 @@

Monitor Control

- + - - - - + @@ -12339,20 +14127,14 @@

Monitor Control

- - - - + - - - - + - @@ -12361,48 +14143,41 @@

Monitor Control

-
-

Monitor Impact

+
+

Out-Group Homogeneity Bias

TermMonitorControlOperationalSecurityRisk Prefix risk
LabelMonitor ControlOperational Security Risk
IRIhttps://w3id.org/dpv/risk#MonitorControlhttps://w3id.org/dpv/risk#OperationalSecurityRisk
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionRisk Mitigation Measure that uses controls to monitor eventsRisks and issues that arise during operational processes
Usage NoteMonitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised.
Date Created2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -12411,31 +14186,34 @@

Monitor Impact

- + - + + + + - + - + - @@ -12444,48 +14222,40 @@

Monitor Impact

-
-

Monitor Risk

+
+

Payment

TermMonitorImpactOutGroupHomogeneityBias Prefix risk
LabelMonitor ImpactOut-Group Homogeneity Bias
IRIhttps://w3id.org/dpv/risk#MonitorImpacthttps://w3id.org/dpv/risk#OutGroupHomogeneityBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk ImpactBias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics
Source
Date Created2024-05-192024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -12494,7 +14264,7 @@

Monitor Risk

- + @@ -12507,18 +14277,21 @@

Monitor Risk

- + - + + + + - + - @@ -12527,48 +14300,40 @@

Monitor Risk

-
-

Monitor Control

+
+

Personal Safety Endangerment

TermMonitorRiskPayment Prefix risk
LabelMonitor RiskPayment
IRIhttps://w3id.org/dpv/risk#MonitorRiskhttps://w3id.org/dpv/risk#Payment
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a RiskSomething that acts as or provides payment e.g. to access a service or purchase resources
Date Created2024-05-192024-04-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -12577,22 +14342,28 @@

Monitor Control

- + - + + + + - + - + + + + @@ -12601,7 +14372,7 @@

Monitor Control

- @@ -12610,48 +14381,43 @@

Monitor Control

-
-

Monitor Risk Source

+
+

Phishing Scam

TermMonitorRiskControlPersonalSafetyEndangerment Prefix risk
LabelMonitor ControlPersonal Safety Endangerment
IRIhttps://w3id.org/dpv/risk#MonitorRiskControlhttps://w3id.org/dpv/risk#PersonalSafetyEndangerment
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors another ControlSomething that acts as or causes Personal Safety Endangerment
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - - - - + @@ -12660,22 +14426,28 @@

Monitor Risk Source

- + - + + + + - + - + + + + @@ -12684,7 +14456,7 @@

Monitor Risk Source

- @@ -12693,48 +14465,39 @@

Monitor Risk Source

-
-

Monitor Vulnerabilities

+
+

Physical Assault

TermMonitorRiskSourcePhishingScam Prefix risk
LabelMonitor Risk SourcePhishing Scam
IRIhttps://w3id.org/dpv/risk#MonitorRiskSourcehttps://w3id.org/dpv/risk#PhishingScam
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk SourceSomething that acts as or causes Phishing Scam
SourceENISA Threat Landscape for Ransomware Attacks 2022
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -12743,22 +14506,28 @@

Monitor Vulnerabilities

- + - + + + + - + - + + + + @@ -12767,7 +14536,7 @@

Monitor Vulnerabilities

- @@ -12776,23 +14545,23 @@

Monitor Vulnerabilities

-
-

Non-Material Damage

+
+

Physical Harm

TermMonitorVulnerabilitiesPhysicalAssault Prefix risk
LabelMonitor VulnerabilitiesPhysical Assault
IRIhttps://w3id.org/dpv/risk#MonitorVulnerabilitieshttps://w3id.org/dpv/risk#PhysicalAssault
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:MonitorControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:IndividualRisk
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that monitors a Risk VulnerabilitySomething that acts as or causes Physical Assault
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -12804,8 +14573,7 @@

Non-Material Damage

- @@ -12816,14 +14584,8 @@

Non-Material Damage

- - - - - - - - + + @@ -12832,18 +14594,9 @@

Non-Material Damage

- - - - - - - - - - - - + + + @@ -12857,23 +14610,23 @@

Non-Material Damage

-
-

Operational Security Risk

+
+

Privacy

TermNonMaterialDamagePhysicalHarm Prefix risk
LabelNon-Material DamagePhysical Harm
IRIhttps://w3id.org/dpv/risk#NonMaterialDamagehttps://w3id.org/dpv/risk#PhysicalHarm
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:IndividualRisk
DefinitionSomething that acts as or causes Non-Material Damage
Usage NoteThe criteria for what is considered material damage is based in jurisdictional laws and norms
Date Created2022-03-30
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -12885,7 +14638,7 @@

Operational Security Risk

- @@ -12896,10 +14649,7 @@

Operational Security Risk

- - - - + @@ -12925,23 +14675,23 @@

Operational Security Risk

-
-

Payment

+
+

Psychological Harm

TermOperationalSecurityRiskPrivacy Prefix risk
LabelOperational Security RiskPrivacy
IRIhttps://w3id.org/dpv/risk#OperationalSecurityRiskhttps://w3id.org/dpv/risk#Privacy
Broader/Parent types dpv:RiskConcept + risk:IndividualRisk
DefinitionRisks and issues that arise during operational processes
- + - + - + @@ -12953,8 +14703,7 @@

Payment

- @@ -12967,20 +14716,23 @@

Payment

- + - + + + + - + @@ -12988,7 +14740,7 @@

Payment

- + @@ -13003,23 +14755,23 @@

Payment

-
-

Personal Safety Endangerment

+
+

Public Order Breach

TermPaymentPsychologicalHarm Prefix risk
LabelPaymentPsychological Harm
IRIhttps://w3id.org/dpv/risk#Paymenthttps://w3id.org/dpv/risk#PsychologicalHarm
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:IndividualRisk
DefinitionSomething that acts as or provides payment e.g. to access a service or purchase resourcesSomething that acts as or causes Psychological Harm
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2024-04-142022-08-17
Date Modified
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
- + - + - + @@ -13031,7 +14783,7 @@

Personal Safety Endangerment

- @@ -13045,7 +14797,7 @@

Personal Safety Endangerment

- + @@ -13084,43 +14836,47 @@

Personal Safety Endangerment

-
-

Phishing Scam

+
+

Recovery Control

TermPersonalSafetyEndangermentPublicOrderBreach Prefix risk
LabelPersonal Safety EndangermentPublic Order Breach
IRIhttps://w3id.org/dpv/risk#PersonalSafetyEndangermenthttps://w3id.org/dpv/risk#PublicOrderBreach
Broader/Parent types risk:SocietalRisk + risk:LegalRiskdpv:RiskConcept
DefinitionSomething that acts as or causes Personal Safety EndangermentSomething that acts as or causes Public Order Breach
- + - + - + - + - - - - + + + + @@ -13129,37 +14885,28 @@

Phishing Scam

- + - - - - + - + - - - - - - - - + + - @@ -13168,39 +14915,48 @@

Phishing Scam

-
-

Physical Assault

+
+

Reduce Likelihood

TermPhishingScamRecoveryControl Prefix risk
LabelPhishing ScamRecovery Control
IRIhttps://w3id.org/dpv/risk#PhishingScamhttps://w3id.org/dpv/risk#RecoveryControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Phishing ScamControl to recover from event
SourceENISA Threat Landscape for Ransomware Attacks 2022
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + @@ -13209,28 +14965,22 @@

Physical Assault

- + - - - - + - + - - - - + @@ -13239,7 +14989,7 @@

Physical Assault

- @@ -13248,46 +14998,58 @@

Physical Assault

-
-

Physical Harm

+
+

Reduce Severity

TermPhysicalAssaultReduceLikelihood Prefix risk
LabelPhysical AssaultReduce Likelihood
IRIhttps://w3id.org/dpv/risk#PhysicalAssaulthttps://w3id.org/dpv/risk#ReduceLikelihood
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:IndividualRisk + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Physical AssaultControl that reduces the likelihood of an event
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + - + + + + @@ -13297,14 +15059,20 @@

Physical Harm

- + + + + - + + + + - @@ -13313,46 +15081,57 @@

Physical Harm

-
-

Privacy

+
+

Reduction Control

TermPhysicalHarmReduceSeverity Prefix risk
LabelPhysical HarmReduce Severity
IRIhttps://w3id.org/dpv/risk#PhysicalHarmhttps://w3id.org/dpv/risk#ReduceSeverity
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:IndividualRisk + risk:ReductionControl + → risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionControl that reduces the severity of an event
Date Created2024-05-19
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - - + + + + - + + + + @@ -13362,14 +15141,17 @@

Privacy

- + + + + - @@ -13378,23 +15160,25 @@

Privacy

-
-

Psychological Harm

+ + +
+

Re-identification

TermPrivacyReductionControl Prefix risk
LabelPrivacyReduction Control
IRIhttps://w3id.org/dpv/risk#Privacyhttps://w3id.org/dpv/risk#ReductionControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:IndividualRisk + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionControl that reduces the likelihood or severity of an event
Date Created2024-05-19
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -13406,7 +15190,11 @@

Psychological Harm

- + + @@ -13419,23 +15207,23 @@

Psychological Harm

- + - + + + + - - - - + - + @@ -13458,40 +15246,47 @@

Psychological Harm

-
-

Public Order Breach

+
+

Remedy Control

TermPsychologicalHarmReidentification Prefix risk
LabelPsychological HarmRe-identification
IRIhttps://w3id.org/dpv/risk#PsychologicalHarmhttps://w3id.org/dpv/risk#Reidentification
Broader/Parent types risk:IndividualRisk + risk:ConfidentialityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
DefinitionSomething that acts as or causes Psychological HarmSomething that acts as or causes Re-identification
Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172022-08-19
Date Modified
- + - + - + - + - - + + + + @@ -13500,37 +15295,28 @@

Public Order Breach

- + - - - - + - + - - - - - - - - + + - @@ -13539,23 +15325,23 @@

Public Order Breach

-
-

Recovery Control

+
+

Remove Consequence

TermPublicOrderBreachRemedyControl Prefix risk
LabelPublic Order BreachRemedy Control
IRIhttps://w3id.org/dpv/risk#PublicOrderBreachhttps://w3id.org/dpv/risk#RemedyControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:LegalRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Public Order BreachControl to remedy consequences of event
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + @@ -13567,7 +15353,8 @@

Recovery Control

- @@ -13588,7 +15375,7 @@

Recovery Control

- + @@ -13604,7 +15391,10 @@

Recovery Control

- + + + + @@ -13618,23 +15408,23 @@

Recovery Control

-
-

Reduce Likelihood

+
+

Remove Impact

TermRecoveryControlRemoveConsequence Prefix risk
LabelRecovery ControlRemove Consequence
IRIhttps://w3id.org/dpv/risk#RecoveryControlhttps://w3id.org/dpv/risk#RemoveConsequence
Broader/Parent types risk:RiskControl + risk:ConsequenceControl + → risk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure
DefinitionControl to recover from eventControl that removes Consequence i.e. prevents it from materialising
2024-05-19
ContributorsHarshvardhan J. Pandit
- + - + - + @@ -13646,7 +15436,7 @@

Reduce Likelihood

- - + @@ -13701,23 +15491,23 @@

Reduce Likelihood

-
-

Reduce Severity

+
+

Remove Source

TermReduceLikelihoodRemoveImpact Prefix risk
LabelReduce LikelihoodRemove Impact
IRIhttps://w3id.org/dpv/risk#ReduceLikelihoodhttps://w3id.org/dpv/risk#RemoveImpact
Broader/Parent types risk:ReductionControl + risk:ImpactControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -13668,7 +15458,7 @@

Reduce Likelihood

DefinitionControl that reduces the likelihood of an eventControl that removes Impact i.e. prevents it from materialising
- + - + - + @@ -13729,7 +15519,7 @@

Reduce Severity

- - + @@ -13784,47 +15574,40 @@

Reduce Severity

-
-

Reduction Control

+
+

Remuneration

TermReduceSeverityRemoveSource Prefix risk
LabelReduce SeverityRemove Source
IRIhttps://w3id.org/dpv/risk#ReduceSeverityhttps://w3id.org/dpv/risk#RemoveSource
Broader/Parent types risk:ReductionControl + risk:SourceControlrisk:RiskControldpv:RiskMitigationMeasuredpv:TechnicalOrganisationalMeasure @@ -13751,7 +15541,7 @@

Reduce Severity

DefinitionControl that reduces the severity of an eventControl that removes the risk source
- + - + - + - + - - - - - + @@ -13833,7 +15616,7 @@

Reduction Control

- + @@ -13846,15 +15629,21 @@

Reduction Control

- + - - + + + + + + + + - @@ -13863,25 +15652,23 @@

Reduction Control

- - -
-

Re-identification

+
+

Reputational Risk

TermReductionControlRenumeration Prefix risk
LabelReduction ControlRemuneration
IRIhttps://w3id.org/dpv/risk#ReductionControlhttps://w3id.org/dpv/risk#Renumeration
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that reduces the likelihood or severity of an eventSomething that acts as or provides renumeration which is in monetary or financial form
Date Created2024-05-192024-04-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -13893,11 +15680,7 @@

Re-identification

- - - @@ -13910,12 +15693,9 @@

Re-identification

- + - - - - + @@ -13924,18 +15704,9 @@

Re-identification

- - - - - - - - - - - - + + + @@ -13949,47 +15720,41 @@

Re-identification

-
-

Remedy Control

+
+

Requirements Bias

TermReidentificationReputationalRisk Prefix risk
LabelRe-identificationReputational Risk
IRIhttps://w3id.org/dpv/risk#Reidentificationhttps://w3id.org/dpv/risk#ReputationalRisk
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + dpv:RiskConcept
DefinitionSomething that acts as or causes Re-identificationRisks and issues that affect the reputation of the organisation
Usage NoteUse this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification
Date Created2022-08-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - - + @@ -13998,28 +15763,37 @@

Remedy Control

- + - + + + + - + + + + - + - + + + + - @@ -14028,48 +15802,40 @@

Remedy Control

-
-

Remove Consequence

+
+

Reward

TermRemedyControlRequirementsBias Prefix risk
LabelRemedy ControlRequirements Bias
IRIhttps://w3id.org/dpv/risk#RemedyControlhttps://w3id.org/dpv/risk#RequirementsBias
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl to remedy consequences of eventBias that occurs in or during requirements creation
Usage NoteRequirements bias also represents occasions for the human cognitive biases to manifest
Source
Date Created2024-05-192024-09-13
ContributorsDaniel Doherty
See More: section RISK-CONTROLS in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -14078,7 +15844,7 @@

Remove Consequence

- + @@ -14091,18 +15857,21 @@

Remove Consequence

- + - + + + + - + - @@ -14111,48 +15880,40 @@

Remove Consequence

-
-

Remove Impact

+
+

Prevent Exercising of Rights

TermRemoveConsequenceReward Prefix risk
LabelRemove ConsequenceReward
IRIhttps://w3id.org/dpv/risk#RemoveConsequencehttps://w3id.org/dpv/risk#Reward
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ConsequenceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:FinancialImpact + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that removes Consequence i.e. prevents it from materialisingSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee
Date Created2024-05-192024-04-14
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - - - + @@ -14161,9 +15922,12 @@

Remove Impact

- + - + + + + @@ -14174,18 +15938,21 @@

Remove Impact

- + - + + + + - + - @@ -14194,46 +15961,48 @@

Remove Impact

-
-

Remove Source

+
+

Impact to Rights

TermRemoveImpactRightsExercisePrevention Prefix risk
LabelRemove ImpactPrevent Exercising of Rights
IRIhttps://w3id.org/dpv/risk#RemoveImpacthttps://w3id.org/dpv/risk#RightsExercisePrevention
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:ImpactControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that removes Impact i.e. prevents it from materialisingSomething that acts as or causes Prevent Exercising of Rights
Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
Date Created2024-05-192022-08-18
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + - @@ -14244,22 +16013,31 @@

Remove Source

- + - + + + + - + + + + - + - + + + + @@ -14268,7 +16046,7 @@

Remove Source

- @@ -14277,23 +16055,23 @@

Remove Source

-
-

Remuneration

+
+

Limitation of Rights

TermRemoveSourceRightsImpact Prefix risk
LabelRemove SourceImpact to Rights
IRIhttps://w3id.org/dpv/risk#RemoveSourcehttps://w3id.org/dpv/risk#RightsImpact
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:SourceControl - → risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + dpv:Impact + → dpv:Consequence + → dpv:RiskConcept +
Broader/Parent types risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl + dpv:hasConsequence, + dpv:hasImpact
DefinitionControl that removes the risk sourceSomething that acts as or causes Impact to Rights
Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
SourceISO/IEC 27005:2018
Date Created2024-05-192022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -14305,7 +16083,7 @@

Remuneration

- @@ -14319,9 +16097,12 @@

Remuneration

- + - + + + + @@ -14332,7 +16113,7 @@

Remuneration

- + @@ -14355,23 +16136,23 @@

Remuneration

-
-

Reputational Risk

+
+

Violation of Rights

TermRenumerationRightsLimitation Prefix risk
LabelRemunerationLimitation of Rights
IRIhttps://w3id.org/dpv/risk#Renumerationhttps://w3id.org/dpv/risk#RightsLimitation
Broader/Parent types risk:FinancialImpact + risk:SocietalRiskdpv:RiskConcept
DefinitionSomething that acts as or provides renumeration which is in monetary or financial formSomething that acts as or causes Limitation of Rights
Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
Date Created2024-04-142022-08-18
Date Modified
- + - + - + @@ -14383,7 +16164,8 @@

Reputational Risk

- @@ -14396,9 +16178,12 @@

Reputational Risk

- + - + + + + @@ -14407,9 +16192,18 @@

Reputational Risk

- - - + + + + + + + + + + + + @@ -14420,39 +16214,42 @@

Reputational Risk

TermReputationalRiskRightsViolation Prefix risk
LabelReputational RiskViolation of Rights
IRIhttps://w3id.org/dpv/risk#ReputationalRiskhttps://w3id.org/dpv/risk#RightsViolation
Broader/Parent types dpv:RiskConcept + risk:SocietalRisk + → dpv:RiskConcept
DefinitionRisks and issues that affect the reputation of the organisationSomething that acts as or causes Violation of Rights
Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
Date Created2022-08-18
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
+ + + + - -
-

Reward

+
+

Risk Analysis

- + - + - + - + - @@ -14465,34 +16262,34 @@

Reward

- + - + + + + - + - - - - + - + - @@ -14500,37 +16297,35 @@

Reward

- -
-

Prevent Exercising of Rights

+
+

Risk Assessment

TermRewardRiskAnalysis Prefix risk
LabelRewardRisk Analysis
IRIhttps://w3id.org/dpv/risk#Rewardhttps://w3id.org/dpv/risk#RiskAnalysis
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:FinancialImpact - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
DefinitionSomething that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or feeA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures
SourceIEC 31010:2019
Date Created2024-04-142022-08-18
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- + - + - + - + - @@ -14543,37 +16338,31 @@

Prevent Exercising of Rights

- + - - - - + - + + + + - + - - - - - - - - + + - @@ -14581,49 +16370,44 @@

Prevent Exercising of Rights

- -
-

Impact to Rights

+
+

Risk Control

TermRightsExercisePreventionRiskAssessment Prefix risk
LabelPrevent Exercising of RightsRisk Assessment
IRIhttps://w3id.org/dpv/risk#RightsExercisePreventionhttps://w3id.org/dpv/risk#RiskAssessment
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskManagement
DefinitionSomething that acts as or causes Prevent Exercising of RightsAssessment of risk involving its identification, analysis, and evaluation
Usage NoteThis concept was called "PreventExercisingOfRights" in DPV 2.0
Source
Date Created2022-08-182024-02-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- + - + - + - + - - - - @@ -14634,40 +16418,31 @@

Impact to Rights

- + - - - - + + + + - - - - + - + - - - - - - - - + + - @@ -14675,38 +16450,33 @@

Impact to Rights

- -
-

Limitation of Rights

+
+

Risk Management

TermRightsImpactRiskControl Prefix risk
LabelImpact to RightsRisk Control
IRIhttps://w3id.org/dpv/risk#RightsImpacthttps://w3id.org/dpv/risk#RiskControl
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types dpv:Impact - → dpv:Consequence - → dpv:RiskConcept -
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasConsequence, - dpv:hasImpact + dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl
DefinitionSomething that acts as or causes Impact to RightsControl that modifies risk
Usage NoteThis concept was called "ImpactToRights" in DPV 2.0
Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in DEX
- + - + - + - + - - - + @@ -14718,37 +16488,31 @@

Limitation of Rights

- + - - - - + - + + + + - + - - - - - - - - + + - @@ -14757,36 +16521,36 @@

Limitation of Rights

-
-

Violation of Rights

+
+

Risk Matrix

TermRightsLimitationRiskManagement Prefix risk
LabelLimitation of RightsRisk Management
IRIhttps://w3id.org/dpv/risk#RightsLimitationhttps://w3id.org/dpv/risk#RiskManagement
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept -
DefinitionSomething that acts as or causes Limitation of RightsSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk
Usage NoteThis concept was called "LimitationOfRights" in DPV 2.0
Source
Date Created2022-08-182024-06-12
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- + - + - + - + - @@ -14799,77 +16563,72 @@

Violation of Rights

- + - - - - + - + + + + - + - - - - + - + -
TermRightsViolationRiskMatrix Prefix risk
LabelViolation of RightsRisk Matrix
IRIhttps://w3id.org/dpv/risk#RightsViolationhttps://w3id.org/dpv/risk#RiskMatrix
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskAssessment
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:RiskAssessment + → risk:RiskManagement
DefinitionSomething that acts as or causes Violation of RightsCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.
Usage NoteThis concept was called "ViolationOfRights" in DPV 2.0
SourceIEC 31010:2019
Date Created2022-08-182024-02-14
Date Modified2024-08-16
ContributorsGeorg P. Krog, Harshvardhan J. PanditHarshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section CORE in RISK
- - - - -
-

Risk Analysis

+ +
+

Risk Matrix 3x3

- + - + - + - + - @@ -14883,23 +16642,20 @@

Risk Analysis

- + - - - - + - + @@ -14910,7 +16666,7 @@

Risk Analysis

- @@ -14918,35 +16674,38 @@

Risk Analysis

-
-

Risk Assessment

+ +
+

Risk Matrix 5x5

TermRiskAnalysisRiskMatrix3x3 Prefix risk
LabelRisk AnalysisRisk Matrix 3x3
IRIhttps://w3id.org/dpv/risk#RiskAnalysishttps://w3id.org/dpv/risk#RiskMatrix3x3
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types risk:RiskAssessment + risk:RiskMatrix + → risk:RiskAssessmentrisk:RiskManagement
DefinitionA technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management proceduresA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types
SourceIEC 31010:2019
Date Created2022-08-182022-08-17
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + - + - @@ -14959,31 +16718,31 @@

Risk Assessment

- + - - - - + - + - + + + + - @@ -14991,46 +16750,42 @@

Risk Assessment

-
-

Risk Control

+ +
+

Risk Matrix 7x7

TermRiskAssessmentRiskMatrix5x5 Prefix risk
LabelRisk AssessmentRisk Matrix 5x5
IRIhttps://w3id.org/dpv/risk#RiskAssessmenthttps://w3id.org/dpv/risk#RiskMatrix5x5
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types risk:RiskManagement + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
DefinitionAssessment of risk involving its identification, analysis, and evaluationA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types
Source
Date Created2024-02-142022-08-17
ContributorsHarshvardhan J. Pandit
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + - + - - - - - + @@ -15039,13 +16794,10 @@

Risk Control

- + - - - @@ -15055,15 +16807,18 @@

Risk Control

- + - + + + + - @@ -15071,23 +16826,23 @@

Risk Control

-
-

Risk Management

+
+

Risk Source

TermRiskControlRiskMatrix7x7 Prefix risk
LabelRisk ControlRisk Matrix 7x7
IRIhttps://w3id.org/dpv/risk#RiskControlhttps://w3id.org/dpv/risk#RiskMatrix7x7
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionControl that modifies riskA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types
Examples dex:E0071 :: Using risk controls to express how tech/org measures address the risk
Date Created2024-05-192022-08-17
ContributorsHarshvardhan J. Pandit
See More: section RISK-CONTROLS in DEX + section RISK-MATRIX in RISK
- + - + - + @@ -15097,10 +16852,17 @@

Risk Management

- + + + - + + + + @@ -15109,25 +16871,25 @@

Risk Management

- + - - - - + - + - + + + + @@ -15142,35 +16904,37 @@

Risk Management

-
-

Risk Matrix

+
+

Low Risk (RM3x3 S:1 L:1)

TermRiskManagementRiskSource Prefix risk
LabelRisk ManagementRisk Source
IRIhttps://w3id.org/dpv/risk#RiskManagementhttps://w3id.org/dpv/risk#RiskSource
rdfs:Class, skos:Concept
Broader/Parent types dpv:RiskConcept +
Object of relation risk:hasRiskSource +
DefinitionSystematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to riskThe 'cause' or 'source', which by itself or with another source has the potential to give rise to risk
Source
Date Created2024-06-122024-02-14
Date Modified2024-08-16
- + - + - + - + - @@ -15184,23 +16948,20 @@

Risk Matrix

- + - - - - + - + @@ -15211,7 +16972,7 @@

Risk Matrix

- @@ -15220,23 +16981,23 @@

Risk Matrix

-
-

Risk Matrix 3x3

+
+

Low Risk (RM3x3 S:1 L:2)

TermRiskMatrixRM3x3S1L1 Prefix risk
LabelRisk MatrixLow Risk (RM3x3 S:1 L:1)
IRIhttps://w3id.org/dpv/risk#RiskMatrixhttps://w3id.org/dpv/risk#RM3x3S1L1
Typerdfs:Class, skos:Concept, risk:RiskAssessmentrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types risk:RiskAssessment + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessmentrisk:RiskManagement
DefinitionCompares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other.Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
SourceIEC 31010:2019
Date Created2024-02-142022-08-17
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + @@ -15248,7 +17009,8 @@

Risk Matrix 3x3

- @@ -15263,7 +17025,7 @@

Risk Matrix 3x3

- + @@ -15296,23 +17058,23 @@

Risk Matrix 3x3

-
-

Risk Matrix 5x5

+
+

Moderate Risk (RM3x3 S:1 L:3)

TermRiskMatrix3x3RM3x3S1L2 Prefix risk
LabelRisk Matrix 3x3Low Risk (RM3x3 S:1 L:2)
IRIhttps://w3id.org/dpv/risk#RiskMatrix3x3https://w3id.org/dpv/risk#RM3x3S1L2
Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
DefinitionA Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low
- + - + - + @@ -15324,7 +17086,8 @@

Risk Matrix 5x5

- @@ -15339,7 +17102,7 @@

Risk Matrix 5x5

- + @@ -15372,23 +17135,23 @@

Risk Matrix 5x5

-
-

Risk Matrix 7x7

+
+

Low Risk (RM3x3 S:2 L:1)

TermRiskMatrix5x5RM3x3S1L3 Prefix risk
LabelRisk Matrix 5x5Moderate Risk (RM3x3 S:1 L:3)
IRIhttps://w3id.org/dpv/risk#RiskMatrix5x5https://w3id.org/dpv/risk#RM3x3S1L3
Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
DefinitionA Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
- + - + - + @@ -15400,7 +17163,8 @@

Risk Matrix 7x7

- @@ -15415,7 +17179,7 @@

Risk Matrix 7x7

- + @@ -15447,43 +17211,43 @@

Risk Matrix 7x7

-
-

Risk Source

+ +
+

Moderate Risk (RM3x3 S:2 L:2)

TermRiskMatrix7x7RM3x3S2L1 Prefix risk
LabelRisk Matrix 7x7Low Risk (RM3x3 S:2 L:1)
IRIhttps://w3id.org/dpv/risk#RiskMatrix7x7https://w3id.org/dpv/risk#RM3x3S2L1
Broader/Parent types risk:RiskMatrix + risk:RiskMatrix3x3 + → risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement
DefinitionA Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level typesNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low
- + - + - + - + - - - - - + @@ -15492,7 +17256,7 @@

Risk Source

- + @@ -15505,18 +17269,18 @@

Risk Source

- + + - - - - + + + - @@ -15525,23 +17289,23 @@

Risk Source

-
-

Low Risk (RM3x3 S:1 L:1)

+
+

High Risk (RM3x3 S:2 L:3)

TermRiskSourceRM3x3S2L2 Prefix risk
LabelRisk SourceModerate Risk (RM3x3 S:2 L:2)
IRIhttps://w3id.org/dpv/risk#RiskSourcehttps://w3id.org/dpv/risk#RM3x3S2L2
Typerdfs:Class, skos:Conceptrdfs:Class, skos:Concept, risk:RiskAnalysis
Broader/Parent types dpv:RiskConcept + risk:RiskMatrix3x3 + → risk:RiskMatrix + → risk:RiskAssessment + → risk:RiskManagement
Object of relation risk:hasRiskSource -
DefinitionThe 'cause' or 'source', which by itself or with another source has the potential to give rise to riskNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
Date Created2024-02-142022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
See More: section CORE in RISK + section RISK-MATRIX in RISK
- + - + - + @@ -15569,7 +17333,7 @@

Low Risk (RM3x3 S:1 L:1)

- + @@ -15602,23 +17366,23 @@

Low Risk (RM3x3 S:1 L:1)

-
-

Low Risk (RM3x3 S:1 L:2)

+
+

Moderate Risk (RM3x3 S:3 L:1)

TermRM3x3S1L1RM3x3S2L3 Prefix risk
LabelLow Risk (RM3x3 S:1 L:1)High Risk (RM3x3 S:2 L:3)
IRIhttps://w3id.org/dpv/risk#RM3x3S1L1https://w3id.org/dpv/risk#RM3x3S2L3
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
- + - + - + @@ -15646,7 +17410,7 @@

Low Risk (RM3x3 S:1 L:2)

- + @@ -15679,23 +17443,23 @@

Low Risk (RM3x3 S:1 L:2)

-
-

Moderate Risk (RM3x3 S:1 L:3)

+
+

High Risk (RM3x3 S:3 L:2)

TermRM3x3S1L2RM3x3S3L1 Prefix risk
LabelLow Risk (RM3x3 S:1 L:2)Moderate Risk (RM3x3 S:3 L:1)
IRIhttps://w3id.org/dpv/risk#RM3x3S1L2https://w3id.org/dpv/risk#RM3x3S3L1
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -15723,7 +17487,7 @@

Moderate Risk (RM3x3 S:1 L:3)

- + @@ -15756,23 +17520,23 @@

Moderate Risk (RM3x3 S:1 L:3)

-
-

Low Risk (RM3x3 S:2 L:1)

+
+

High Risk (RM3x3 S:3 L:3)

TermRM3x3S1L3RM3x3S3L2 Prefix risk
LabelModerate Risk (RM3x3 S:1 L:3)High Risk (RM3x3 S:3 L:2)
IRIhttps://w3id.org/dpv/risk#RM3x3S1L3https://w3id.org/dpv/risk#RM3x3S3L2
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -15800,7 +17564,7 @@

Low Risk (RM3x3 S:2 L:1)

- + @@ -15833,23 +17597,23 @@

Low Risk (RM3x3 S:2 L:1)

-
-

Moderate Risk (RM3x3 S:2 L:2)

+
+

Very Low Risk (RM5x5 S:1 L:1)

TermRM3x3S2L1RM3x3S3L3 Prefix risk
LabelLow Risk (RM3x3 S:2 L:1)High Risk (RM3x3 S:3 L:3)
IRIhttps://w3id.org/dpv/risk#RM3x3S2L1https://w3id.org/dpv/risk#RM3x3S3L3
DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: LowNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High
- + - + - + @@ -15861,7 +17625,7 @@

Moderate Risk (RM3x3 S:2 L:2)

- - + @@ -15910,23 +17674,23 @@

Moderate Risk (RM3x3 S:2 L:2)

-
-

High Risk (RM3x3 S:2 L:3)

+
+

Very Low Risk (RM5x5 S:1 L:2)

TermRM3x3S2L2RM5x5S1L1 Prefix risk
LabelModerate Risk (RM3x3 S:2 L:2)Very Low Risk (RM5x5 S:1 L:1)
IRIhttps://w3id.org/dpv/risk#RM3x3S2L2https://w3id.org/dpv/risk#RM5x5S1L1
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -15877,7 +17641,7 @@

Moderate Risk (RM3x3 S:2 L:2)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -15938,7 +17702,7 @@

High Risk (RM3x3 S:2 L:3)

- - + @@ -15987,23 +17751,23 @@

High Risk (RM3x3 S:2 L:3)

-
-

Moderate Risk (RM3x3 S:3 L:1)

+
+

Very Low Risk (RM5x5 S:1 L:3)

TermRM3x3S2L3RM5x5S1L2 Prefix risk
LabelHigh Risk (RM3x3 S:2 L:3)Very Low Risk (RM5x5 S:1 L:2)
IRIhttps://w3id.org/dpv/risk#RM3x3S2L3https://w3id.org/dpv/risk#RM5x5S1L2
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -15954,7 +17718,7 @@

High Risk (RM3x3 S:2 L:3)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
- + - + - + @@ -16015,7 +17779,7 @@

Moderate Risk (RM3x3 S:3 L:1)

- - + @@ -16064,23 +17828,23 @@

Moderate Risk (RM3x3 S:3 L:1)

-
-

High Risk (RM3x3 S:3 L:2)

+
+

Low Risk (RM5x5 S:1 L:4)

TermRM3x3S3L1RM5x5S1L3 Prefix risk
LabelModerate Risk (RM3x3 S:3 L:1)Very Low Risk (RM5x5 S:1 L:3)
IRIhttps://w3id.org/dpv/risk#RM3x3S3L1https://w3id.org/dpv/risk#RM5x5S1L3
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -16031,7 +17795,7 @@

Moderate Risk (RM3x3 S:3 L:1)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low
- + - + - + @@ -16092,7 +17856,7 @@

High Risk (RM3x3 S:3 L:2)

- - + @@ -16141,23 +17905,23 @@

High Risk (RM3x3 S:3 L:2)

-
-

High Risk (RM3x3 S:3 L:3)

+
+

Low Risk (RM5x5 S:1 L:5)

TermRM3x3S3L2RM5x5S1L4 Prefix risk
LabelHigh Risk (RM3x3 S:3 L:2)Low Risk (RM5x5 S:1 L:4)
IRIhttps://w3id.org/dpv/risk#RM3x3S3L2https://w3id.org/dpv/risk#RM5x5S1L4
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -16108,7 +17872,7 @@

High Risk (RM3x3 S:3 L:2)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
- + - + - + @@ -16169,7 +17933,7 @@

High Risk (RM3x3 S:3 L:3)

- - + @@ -16218,23 +17982,23 @@

High Risk (RM3x3 S:3 L:3)

-
-

Very Low Risk (RM5x5 S:1 L:1)

+
+

Very Low Risk (RM5x5 S:2 L:1)

TermRM3x3S3L3RM5x5S1L5 Prefix risk
LabelHigh Risk (RM3x3 S:3 L:3)Low Risk (RM5x5 S:1 L:5)
IRIhttps://w3id.org/dpv/risk#RM3x3S3L3https://w3id.org/dpv/risk#RM5x5S1L5
Broader/Parent types risk:RiskMatrix3x3 + risk:RiskMatrix5x5risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -16185,7 +17949,7 @@

High Risk (RM3x3 S:3 L:3)

DefinitionNode in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low
- + - + - + @@ -16262,7 +18026,7 @@

Very Low Risk (RM5x5 S:1 L:1)

- + @@ -16295,23 +18059,23 @@

Very Low Risk (RM5x5 S:1 L:1)

-
-

Very Low Risk (RM5x5 S:1 L:2)

+
+

Low Risk (RM5x5 S:2 L:2)

TermRM5x5S1L1RM5x5S2L1 Prefix risk
LabelVery Low Risk (RM5x5 S:1 L:1)Very Low Risk (RM5x5 S:2 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L1https://w3id.org/dpv/risk#RM5x5S2L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -16339,7 +18103,7 @@

Very Low Risk (RM5x5 S:1 L:2)

- + @@ -16372,23 +18136,23 @@

Very Low Risk (RM5x5 S:1 L:2)

-
-

Very Low Risk (RM5x5 S:1 L:3)

+
+

Moderate Risk (RM5x5 S:2 L:3)

TermRM5x5S1L2RM5x5S2L2 Prefix risk
LabelVery Low Risk (RM5x5 S:1 L:2)Low Risk (RM5x5 S:2 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L2https://w3id.org/dpv/risk#RM5x5S2L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
- + - + - + @@ -16416,7 +18180,7 @@

Very Low Risk (RM5x5 S:1 L:3)

- + @@ -16449,23 +18213,23 @@

Very Low Risk (RM5x5 S:1 L:3)

-
-

Low Risk (RM5x5 S:1 L:4)

+
+

Moderate Risk (RM5x5 S:2 L:4)

TermRM5x5S1L3RM5x5S2L3 Prefix risk
LabelVery Low Risk (RM5x5 S:1 L:3)Moderate Risk (RM5x5 S:2 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L3https://w3id.org/dpv/risk#RM5x5S2L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
- + - + - + @@ -16493,7 +18257,7 @@

Low Risk (RM5x5 S:1 L:4)

- + @@ -16526,23 +18290,23 @@

Low Risk (RM5x5 S:1 L:4)

-
-

Low Risk (RM5x5 S:1 L:5)

+
+

High Risk (RM5x5 S:2 L:5)

TermRM5x5S1L4RM5x5S2L4 Prefix risk
LabelLow Risk (RM5x5 S:1 L:4)Moderate Risk (RM5x5 S:2 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L4https://w3id.org/dpv/risk#RM5x5S2L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate
- + - + - + @@ -16570,7 +18334,7 @@

Low Risk (RM5x5 S:1 L:5)

- + @@ -16603,23 +18367,23 @@

Low Risk (RM5x5 S:1 L:5)

-
-

Very Low Risk (RM5x5 S:2 L:1)

+
+

Very Low Risk (RM5x5 S:3 L:1)

TermRM5x5S1L5RM5x5S2L5 Prefix risk
LabelLow Risk (RM5x5 S:1 L:5)High Risk (RM5x5 S:2 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S1L5https://w3id.org/dpv/risk#RM5x5S2L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
- + - + - + @@ -16647,7 +18411,7 @@

Very Low Risk (RM5x5 S:2 L:1)

- + @@ -16680,23 +18444,23 @@

Very Low Risk (RM5x5 S:2 L:1)

-
-

Low Risk (RM5x5 S:2 L:2)

+
+

Moderate Risk (RM5x5 S:3 L:2)

TermRM5x5S2L1RM5x5S3L1 Prefix risk
LabelVery Low Risk (RM5x5 S:2 L:1)Very Low Risk (RM5x5 S:3 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L1https://w3id.org/dpv/risk#RM5x5S3L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -16724,7 +18488,7 @@

Low Risk (RM5x5 S:2 L:2)

- + @@ -16757,23 +18521,23 @@

Low Risk (RM5x5 S:2 L:2)

-
-

Moderate Risk (RM5x5 S:2 L:3)

+
+

Moderate Risk (RM5x5 S:3 L:3)

TermRM5x5S2L2RM5x5S3L2 Prefix risk
LabelLow Risk (RM5x5 S:2 L:2)Moderate Risk (RM5x5 S:3 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L2https://w3id.org/dpv/risk#RM5x5S3L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -16801,7 +18565,7 @@

Moderate Risk (RM5x5 S:2 L:3)

- + @@ -16834,23 +18598,23 @@

Moderate Risk (RM5x5 S:2 L:3)

-
-

Moderate Risk (RM5x5 S:2 L:4)

+
+

High Risk (RM5x5 S:3 L:4)

TermRM5x5S2L3RM5x5S3L3 Prefix risk
LabelModerate Risk (RM5x5 S:2 L:3)Moderate Risk (RM5x5 S:3 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L3https://w3id.org/dpv/risk#RM5x5S3L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate
- + - + - + @@ -16878,7 +18642,7 @@

Moderate Risk (RM5x5 S:2 L:4)

- + @@ -16911,23 +18675,23 @@

Moderate Risk (RM5x5 S:2 L:4)

-
-

High Risk (RM5x5 S:2 L:5)

+
+

Very High Risk (RM5x5 S:3 L:5)

TermRM5x5S2L4RM5x5S3L4 Prefix risk
LabelModerate Risk (RM5x5 S:2 L:4)High Risk (RM5x5 S:3 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L4https://w3id.org/dpv/risk#RM5x5S3L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
- + - + - + @@ -16955,7 +18719,7 @@

High Risk (RM5x5 S:2 L:5)

- + @@ -16988,23 +18752,23 @@

High Risk (RM5x5 S:2 L:5)

-
-

Very Low Risk (RM5x5 S:3 L:1)

+
+

Low Risk (RM5x5 S:4 L:1)

TermRM5x5S2L5RM5x5S3L5 Prefix risk
LabelHigh Risk (RM5x5 S:2 L:5)Very High Risk (RM5x5 S:3 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S2L5https://w3id.org/dpv/risk#RM5x5S3L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -17032,7 +18796,7 @@

Very Low Risk (RM5x5 S:3 L:1)

- + @@ -17065,23 +18829,23 @@

Very Low Risk (RM5x5 S:3 L:1)

-
-

Moderate Risk (RM5x5 S:3 L:2)

+
+

Moderate Risk (RM5x5 S:4 L:2)

TermRM5x5S3L1RM5x5S4L1 Prefix risk
LabelVery Low Risk (RM5x5 S:3 L:1)Low Risk (RM5x5 S:4 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L1https://w3id.org/dpv/risk#RM5x5S4L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very LowNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -17109,7 +18873,7 @@

Moderate Risk (RM5x5 S:3 L:2)

- + @@ -17142,23 +18906,23 @@

Moderate Risk (RM5x5 S:3 L:2)

-
-

Moderate Risk (RM5x5 S:3 L:3)

+
+

High Risk (RM5x5 S:4 L:3)

TermRM5x5S3L2RM5x5S4L2 Prefix risk
LabelModerate Risk (RM5x5 S:3 L:2)Moderate Risk (RM5x5 S:4 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L2https://w3id.org/dpv/risk#RM5x5S4L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -17186,7 +18950,7 @@

Moderate Risk (RM5x5 S:3 L:3)

- + @@ -17219,23 +18983,23 @@

Moderate Risk (RM5x5 S:3 L:3)

-
-

High Risk (RM5x5 S:3 L:4)

+
+

Very High Risk (RM5x5 S:4 L:4)

TermRM5x5S3L3RM5x5S4L3 Prefix risk
LabelModerate Risk (RM5x5 S:3 L:3)High Risk (RM5x5 S:4 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L3https://w3id.org/dpv/risk#RM5x5S4L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -17263,7 +19027,7 @@

High Risk (RM5x5 S:3 L:4)

- + @@ -17296,23 +19060,23 @@

High Risk (RM5x5 S:3 L:4)

-
-

Very High Risk (RM5x5 S:3 L:5)

+
+

Very High Risk (RM5x5 S:4 L:5)

TermRM5x5S3L4RM5x5S4L4 Prefix risk
LabelHigh Risk (RM5x5 S:3 L:4)Very High Risk (RM5x5 S:4 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L4https://w3id.org/dpv/risk#RM5x5S4L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -17340,7 +19104,7 @@

Very High Risk (RM5x5 S:3 L:5)

- + @@ -17373,23 +19137,23 @@

Very High Risk (RM5x5 S:3 L:5)

-
-

Low Risk (RM5x5 S:4 L:1)

+
+

Low Risk (RM5x5 S:5 L:1)

TermRM5x5S3L5RM5x5S4L5 Prefix risk
LabelVery High Risk (RM5x5 S:3 L:5)Very High Risk (RM5x5 S:4 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S3L5https://w3id.org/dpv/risk#RM5x5S4L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -17417,7 +19181,7 @@

Low Risk (RM5x5 S:4 L:1)

- + @@ -17450,23 +19214,23 @@

Low Risk (RM5x5 S:4 L:1)

-
-

Moderate Risk (RM5x5 S:4 L:2)

+
+

High Risk (RM5x5 S:5 L:2)

TermRM5x5S4L1RM5x5S5L1 Prefix risk
LabelLow Risk (RM5x5 S:4 L:1)Low Risk (RM5x5 S:5 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L1https://w3id.org/dpv/risk#RM5x5S5L1
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -17494,7 +19258,7 @@

Moderate Risk (RM5x5 S:4 L:2)

- + @@ -17527,23 +19291,23 @@

Moderate Risk (RM5x5 S:4 L:2)

-
-

High Risk (RM5x5 S:4 L:3)

+
+

High Risk (RM5x5 S:5 L:3)

TermRM5x5S4L2RM5x5S5L2 Prefix risk
LabelModerate Risk (RM5x5 S:4 L:2)High Risk (RM5x5 S:5 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L2https://w3id.org/dpv/risk#RM5x5S5L2
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
- + - + - + @@ -17571,7 +19335,7 @@

High Risk (RM5x5 S:4 L:3)

- + @@ -17604,23 +19368,23 @@

High Risk (RM5x5 S:4 L:3)

-
-

Very High Risk (RM5x5 S:4 L:4)

+
+

Very High Risk (RM5x5 S:5 L:4)

TermRM5x5S4L3RM5x5S5L3 Prefix risk
LabelHigh Risk (RM5x5 S:4 L:3)High Risk (RM5x5 S:5 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L3https://w3id.org/dpv/risk#RM5x5S5L3
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -17648,7 +19412,7 @@

Very High Risk (RM5x5 S:4 L:4)

- + @@ -17681,23 +19445,23 @@

Very High Risk (RM5x5 S:4 L:4)

-
-

Very High Risk (RM5x5 S:4 L:5)

+
+

Very High Risk (RM5x5 S:5 L:5)

TermRM5x5S4L4RM5x5S5L4 Prefix risk
LabelVery High Risk (RM5x5 S:4 L:4)Very High Risk (RM5x5 S:5 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L4https://w3id.org/dpv/risk#RM5x5S5L4
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -17725,7 +19489,7 @@

Very High Risk (RM5x5 S:4 L:5)

- + @@ -17758,23 +19522,23 @@

Very High Risk (RM5x5 S:4 L:5)

-
-

Low Risk (RM5x5 S:5 L:1)

+
+

Extremely Low Risk (RM7x7 S:1 L:1)

TermRM5x5S4L5RM5x5S5L5 Prefix risk
LabelVery High Risk (RM5x5 S:4 L:5)Very High Risk (RM5x5 S:5 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S4L5https://w3id.org/dpv/risk#RM5x5S5L5
DefinitionNode in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very HighNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -17786,7 +19550,7 @@

Low Risk (RM5x5 S:5 L:1)

- - + @@ -17835,23 +19599,23 @@

Low Risk (RM5x5 S:5 L:1)

-
-

High Risk (RM5x5 S:5 L:2)

+
+

Extremely Low Risk (RM7x7 S:1 L:2)

TermRM5x5S5L1RM7x7S1L1 Prefix risk
LabelLow Risk (RM5x5 S:5 L:1)Extremely Low Risk (RM7x7 S:1 L:1)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L1https://w3id.org/dpv/risk#RM7x7S1L1
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17802,7 +19566,7 @@

Low Risk (RM5x5 S:5 L:1)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -17863,7 +19627,7 @@

High Risk (RM5x5 S:5 L:2)

- - + @@ -17912,23 +19676,23 @@

High Risk (RM5x5 S:5 L:2)

-
-

High Risk (RM5x5 S:5 L:3)

+
+

Extremely Low Risk (RM7x7 S:1 L:3)

TermRM5x5S5L2RM7x7S1L2 Prefix risk
LabelHigh Risk (RM5x5 S:5 L:2)Extremely Low Risk (RM7x7 S:1 L:2)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L2https://w3id.org/dpv/risk#RM7x7S1L2
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17879,7 +19643,7 @@

High Risk (RM5x5 S:5 L:2)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low
- + - + - + @@ -17940,7 +19704,7 @@

High Risk (RM5x5 S:5 L:3)

- - + @@ -17989,23 +19753,23 @@

High Risk (RM5x5 S:5 L:3)

-
-

Very High Risk (RM5x5 S:5 L:4)

+
+

Very Low Risk (RM7x7 S:1 L:4)

TermRM5x5S5L3RM7x7S1L3 Prefix risk
LabelHigh Risk (RM5x5 S:5 L:3)Extremely Low Risk (RM7x7 S:1 L:3)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L3https://w3id.org/dpv/risk#RM7x7S1L3
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -17956,7 +19720,7 @@

High Risk (RM5x5 S:5 L:3)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low
- + - + - + @@ -18017,7 +19781,7 @@

Very High Risk (RM5x5 S:5 L:4)

- - + @@ -18066,23 +19830,23 @@

Very High Risk (RM5x5 S:5 L:4)

-
-

Very High Risk (RM5x5 S:5 L:5)

+
+

Very Low Risk (RM7x7 S:1 L:5)

TermRM5x5S5L4RM7x7S1L4 Prefix risk
LabelVery High Risk (RM5x5 S:5 L:4)Very Low Risk (RM7x7 S:1 L:4)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L4https://w3id.org/dpv/risk#RM7x7S1L4
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18033,7 +19797,7 @@

Very High Risk (RM5x5 S:5 L:4)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low
- + - + - + @@ -18094,7 +19858,7 @@

Very High Risk (RM5x5 S:5 L:5)

- - + @@ -18143,23 +19907,23 @@

Very High Risk (RM5x5 S:5 L:5)

-
-

Extremely Low Risk (RM7x7 S:1 L:1)

+
+

Very Low Risk (RM7x7 S:1 L:6)

TermRM5x5S5L5RM7x7S1L5 Prefix risk
LabelVery High Risk (RM5x5 S:5 L:5)Very Low Risk (RM7x7 S:1 L:5)
IRIhttps://w3id.org/dpv/risk#RM5x5S5L5https://w3id.org/dpv/risk#RM7x7S1L5
Broader/Parent types risk:RiskMatrix5x5 + risk:RiskMatrix7x7risk:RiskMatrixrisk:RiskAssessmentrisk:RiskManagement @@ -18110,7 +19874,7 @@

Very High Risk (RM5x5 S:5 L:5)

DefinitionNode in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low
- + - + - + @@ -18187,7 +19951,7 @@

Extremely Low Risk (RM7x7 S:1 L:1)

- + @@ -18220,23 +19984,23 @@

Extremely Low Risk (RM7x7 S:1 L:1)

-
-

Extremely Low Risk (RM7x7 S:1 L:2)

+
+

Low Risk (RM7x7 S:1 L:7)

TermRM7x7S1L1RM7x7S1L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:1 L:1)Very Low Risk (RM7x7 S:1 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L1https://w3id.org/dpv/risk#RM7x7S1L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low
- + - + - + @@ -18264,7 +20028,7 @@

Extremely Low Risk (RM7x7 S:1 L:2)

- + @@ -18297,23 +20061,23 @@

Extremely Low Risk (RM7x7 S:1 L:2)

-
-

Extremely Low Risk (RM7x7 S:1 L:3)

+
+

Extremely Low Risk (RM7x7 S:2 L:1)

TermRM7x7S1L2RM7x7S1L7 Prefix risk
LabelExtremely Low Risk (RM7x7 S:1 L:2)Low Risk (RM7x7 S:1 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L2https://w3id.org/dpv/risk#RM7x7S1L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low
- + - + - + @@ -18341,7 +20105,7 @@

Extremely Low Risk (RM7x7 S:1 L:3)

- + @@ -18374,23 +20138,23 @@

Extremely Low Risk (RM7x7 S:1 L:3)

-
-

Very Low Risk (RM7x7 S:1 L:4)

+
+

Extremely Low Risk (RM7x7 S:2 L:2)

TermRM7x7S1L3RM7x7S2L1 Prefix risk
LabelExtremely Low Risk (RM7x7 S:1 L:3)Extremely Low Risk (RM7x7 S:2 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L3https://w3id.org/dpv/risk#RM7x7S2L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -18418,7 +20182,7 @@

Very Low Risk (RM7x7 S:1 L:4)

- + @@ -18451,23 +20215,23 @@

Very Low Risk (RM7x7 S:1 L:4)

-
-

Very Low Risk (RM7x7 S:1 L:5)

+
+

Very Low Risk (RM7x7 S:2 L:3)

TermRM7x7S1L4RM7x7S2L2 Prefix risk
LabelVery Low Risk (RM7x7 S:1 L:4)Extremely Low Risk (RM7x7 S:2 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L4https://w3id.org/dpv/risk#RM7x7S2L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low
- + - + - + @@ -18495,7 +20259,7 @@

Very Low Risk (RM7x7 S:1 L:5)

- + @@ -18528,23 +20292,23 @@

Very Low Risk (RM7x7 S:1 L:5)

-
-

Very Low Risk (RM7x7 S:1 L:6)

+
+

Low Risk (RM7x7 S:2 L:4)

TermRM7x7S1L5RM7x7S2L3 Prefix risk
LabelVery Low Risk (RM7x7 S:1 L:5)Very Low Risk (RM7x7 S:2 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L5https://w3id.org/dpv/risk#RM7x7S2L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low
- + - + - + @@ -18572,7 +20336,7 @@

Very Low Risk (RM7x7 S:1 L:6)

- + @@ -18605,23 +20369,23 @@

Very Low Risk (RM7x7 S:1 L:6)

-
-

Low Risk (RM7x7 S:1 L:7)

+
+

Low Risk (RM7x7 S:2 L:5)

TermRM7x7S1L6RM7x7S2L4 Prefix risk
LabelVery Low Risk (RM7x7 S:1 L:6)Low Risk (RM7x7 S:2 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L6https://w3id.org/dpv/risk#RM7x7S2L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low
- + - + - + @@ -18649,7 +20413,7 @@

Low Risk (RM7x7 S:1 L:7)

- + @@ -18682,23 +20446,23 @@

Low Risk (RM7x7 S:1 L:7)

-
-

Extremely Low Risk (RM7x7 S:2 L:1)

+
+

Moderate Risk (RM7x7 S:2 L:6)

TermRM7x7S1L7RM7x7S2L5 Prefix risk
LabelLow Risk (RM7x7 S:1 L:7)Low Risk (RM7x7 S:2 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S1L7https://w3id.org/dpv/risk#RM7x7S2L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low
- + - + - + @@ -18726,7 +20490,7 @@

Extremely Low Risk (RM7x7 S:2 L:1)

- + @@ -18759,23 +20523,23 @@

Extremely Low Risk (RM7x7 S:2 L:1)

-
-

Extremely Low Risk (RM7x7 S:2 L:2)

+
+

Moderate Risk (RM7x7 S:2 L:7)

TermRM7x7S2L1RM7x7S2L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:2 L:1)Moderate Risk (RM7x7 S:2 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L1https://w3id.org/dpv/risk#RM7x7S2L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate
- + - + - + @@ -18803,7 +20567,7 @@

Extremely Low Risk (RM7x7 S:2 L:2)

- + @@ -18836,23 +20600,23 @@

Extremely Low Risk (RM7x7 S:2 L:2)

-
-

Very Low Risk (RM7x7 S:2 L:3)

+
+

Extremely Low Risk (RM7x7 S:3 L:1)

TermRM7x7S2L2RM7x7S2L7 Prefix risk
LabelExtremely Low Risk (RM7x7 S:2 L:2)Moderate Risk (RM7x7 S:2 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L2https://w3id.org/dpv/risk#RM7x7S2L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate
- + - + - + @@ -18880,7 +20644,7 @@

Very Low Risk (RM7x7 S:2 L:3)

- + @@ -18913,23 +20677,23 @@

Very Low Risk (RM7x7 S:2 L:3)

-
-

Low Risk (RM7x7 S:2 L:4)

+
+

Very Low Risk (RM7x7 S:3 L:2)

TermRM7x7S2L3RM7x7S3L1 Prefix risk
LabelVery Low Risk (RM7x7 S:2 L:3)Extremely Low Risk (RM7x7 S:3 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L3https://w3id.org/dpv/risk#RM7x7S3L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -18957,7 +20721,7 @@

Low Risk (RM7x7 S:2 L:4)

- + @@ -18990,23 +20754,23 @@

Low Risk (RM7x7 S:2 L:4)

-
-

Low Risk (RM7x7 S:2 L:5)

+
+

Low Risk (RM7x7 S:3 L:3)

TermRM7x7S2L4RM7x7S3L2 Prefix risk
LabelLow Risk (RM7x7 S:2 L:4)Very Low Risk (RM7x7 S:3 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L4https://w3id.org/dpv/risk#RM7x7S3L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low
- + - + - + @@ -19034,7 +20798,7 @@

Low Risk (RM7x7 S:2 L:5)

- + @@ -19067,23 +20831,23 @@

Low Risk (RM7x7 S:2 L:5)

-
-

Moderate Risk (RM7x7 S:2 L:6)

+
+

Moderate Risk (RM7x7 S:3 L:4)

TermRM7x7S2L5RM7x7S3L3 Prefix risk
LabelLow Risk (RM7x7 S:2 L:5)Low Risk (RM7x7 S:3 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L5https://w3id.org/dpv/risk#RM7x7S3L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low
- + - + - + @@ -19111,7 +20875,7 @@

Moderate Risk (RM7x7 S:2 L:6)

- + @@ -19144,23 +20908,23 @@

Moderate Risk (RM7x7 S:2 L:6)

-
-

Moderate Risk (RM7x7 S:2 L:7)

+
+

High Risk (RM7x7 S:3 L:5)

TermRM7x7S2L6RM7x7S3L4 Prefix risk
LabelModerate Risk (RM7x7 S:2 L:6)Moderate Risk (RM7x7 S:3 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L6https://w3id.org/dpv/risk#RM7x7S3L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate
- + - + - + @@ -19188,7 +20952,7 @@

Moderate Risk (RM7x7 S:2 L:7)

- + @@ -19221,23 +20985,23 @@

Moderate Risk (RM7x7 S:2 L:7)

-
-

Extremely Low Risk (RM7x7 S:3 L:1)

+
+

High Risk (RM7x7 S:3 L:6)

TermRM7x7S2L7RM7x7S3L5 Prefix risk
LabelModerate Risk (RM7x7 S:2 L:7)High Risk (RM7x7 S:3 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S2L7https://w3id.org/dpv/risk#RM7x7S3L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High
- + - + - + @@ -19265,7 +21029,7 @@

Extremely Low Risk (RM7x7 S:3 L:1)

- + @@ -19298,23 +21062,23 @@

Extremely Low Risk (RM7x7 S:3 L:1)

-
-

Very Low Risk (RM7x7 S:3 L:2)

+
+

Very High Risk (RM7x7 S:3 L:7)

TermRM7x7S3L1RM7x7S3L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:3 L:1)High Risk (RM7x7 S:3 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L1https://w3id.org/dpv/risk#RM7x7S3L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High
- + - + - + @@ -19342,7 +21106,7 @@

Very Low Risk (RM7x7 S:3 L:2)

- + @@ -19375,23 +21139,23 @@

Very Low Risk (RM7x7 S:3 L:2)

-
-

Low Risk (RM7x7 S:3 L:3)

+
+

Extremely Low Risk (RM7x7 S:4 L:1)

TermRM7x7S3L2RM7x7S3L7 Prefix risk
LabelVery Low Risk (RM7x7 S:3 L:2)Very High Risk (RM7x7 S:3 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L2https://w3id.org/dpv/risk#RM7x7S3L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High
- + - + - + @@ -19419,7 +21183,7 @@

Low Risk (RM7x7 S:3 L:3)

- + @@ -19452,23 +21216,23 @@

Low Risk (RM7x7 S:3 L:3)

-
-

Moderate Risk (RM7x7 S:3 L:4)

+
+

Low Risk (RM7x7 S:4 L:2)

TermRM7x7S3L3RM7x7S4L1 Prefix risk
LabelLow Risk (RM7x7 S:3 L:3)Extremely Low Risk (RM7x7 S:4 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L3https://w3id.org/dpv/risk#RM7x7S4L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low
- + - + - + @@ -19496,7 +21260,7 @@

Moderate Risk (RM7x7 S:3 L:4)

- + @@ -19529,23 +21293,23 @@

Moderate Risk (RM7x7 S:3 L:4)

-
-

High Risk (RM7x7 S:3 L:5)

+
+

Moderate Risk (RM7x7 S:4 L:3)

TermRM7x7S3L4RM7x7S4L2 Prefix risk
LabelModerate Risk (RM7x7 S:3 L:4)Low Risk (RM7x7 S:4 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L4https://w3id.org/dpv/risk#RM7x7S4L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -19573,7 +21337,7 @@

High Risk (RM7x7 S:3 L:5)

- + @@ -19606,23 +21370,23 @@

High Risk (RM7x7 S:3 L:5)

-
-

High Risk (RM7x7 S:3 L:6)

+
+

High Risk (RM7x7 S:4 L:4)

TermRM7x7S3L5RM7x7S4L3 Prefix risk
LabelHigh Risk (RM7x7 S:3 L:5)Moderate Risk (RM7x7 S:4 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L5https://w3id.org/dpv/risk#RM7x7S4L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -19650,7 +21414,7 @@

High Risk (RM7x7 S:3 L:6)

- + @@ -19683,23 +21447,23 @@

High Risk (RM7x7 S:3 L:6)

-
-

Very High Risk (RM7x7 S:3 L:7)

+
+

High Risk (RM7x7 S:4 L:5)

TermRM7x7S3L6RM7x7S4L4 Prefix risk
LabelHigh Risk (RM7x7 S:3 L:6)High Risk (RM7x7 S:4 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L6https://w3id.org/dpv/risk#RM7x7S4L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -19727,7 +21491,7 @@

Very High Risk (RM7x7 S:3 L:7)

- + @@ -19760,23 +21524,23 @@

Very High Risk (RM7x7 S:3 L:7)

-
-

Extremely Low Risk (RM7x7 S:4 L:1)

+
+

Very High Risk (RM7x7 S:4 L:6)

TermRM7x7S3L7RM7x7S4L5 Prefix risk
LabelVery High Risk (RM7x7 S:3 L:7)High Risk (RM7x7 S:4 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S3L7https://w3id.org/dpv/risk#RM7x7S4L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High
- + - + - + @@ -19804,7 +21568,7 @@

Extremely Low Risk (RM7x7 S:4 L:1)

- + @@ -19837,23 +21601,23 @@

Extremely Low Risk (RM7x7 S:4 L:1)

-
-

Low Risk (RM7x7 S:4 L:2)

+
+

Very High Risk (RM7x7 S:4 L:7)

TermRM7x7S4L1RM7x7S4L6 Prefix risk
LabelExtremely Low Risk (RM7x7 S:4 L:1)Very High Risk (RM7x7 S:4 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L1https://w3id.org/dpv/risk#RM7x7S4L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High
- + - + - + @@ -19881,7 +21645,7 @@

Low Risk (RM7x7 S:4 L:2)

- + @@ -19914,23 +21678,23 @@

Low Risk (RM7x7 S:4 L:2)

-
-

Moderate Risk (RM7x7 S:4 L:3)

+
+

Very Low Risk (RM7x7 S:5 L:1)

TermRM7x7S4L2RM7x7S4L7 Prefix risk
LabelLow Risk (RM7x7 S:4 L:2)Very High Risk (RM7x7 S:4 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L2https://w3id.org/dpv/risk#RM7x7S4L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High
- + - + - + @@ -19958,7 +21722,7 @@

Moderate Risk (RM7x7 S:4 L:3)

- + @@ -19991,23 +21755,23 @@

Moderate Risk (RM7x7 S:4 L:3)

-
-

High Risk (RM7x7 S:4 L:4)

+
+

Low Risk (RM7x7 S:5 L:2)

TermRM7x7S4L3RM7x7S5L1 Prefix risk
LabelModerate Risk (RM7x7 S:4 L:3)Very Low Risk (RM7x7 S:5 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L3https://w3id.org/dpv/risk#RM7x7S5L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low
- + - + - + @@ -20035,7 +21799,7 @@

High Risk (RM7x7 S:4 L:4)

- + @@ -20068,23 +21832,23 @@

High Risk (RM7x7 S:4 L:4)

-
-

High Risk (RM7x7 S:4 L:5)

+
+

Moderate Risk (RM7x7 S:5 L:3)

TermRM7x7S4L4RM7x7S5L2 Prefix risk
LabelHigh Risk (RM7x7 S:4 L:4)Low Risk (RM7x7 S:5 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L4https://w3id.org/dpv/risk#RM7x7S5L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low
- + - + - + @@ -20112,7 +21876,7 @@

High Risk (RM7x7 S:4 L:5)

- + @@ -20145,23 +21909,23 @@

High Risk (RM7x7 S:4 L:5)

-
-

Very High Risk (RM7x7 S:4 L:6)

+
+

High Risk (RM7x7 S:5 L:4)

TermRM7x7S4L5RM7x7S5L3 Prefix risk
LabelHigh Risk (RM7x7 S:4 L:5)Moderate Risk (RM7x7 S:5 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L5https://w3id.org/dpv/risk#RM7x7S5L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate
- + - + - + @@ -20189,7 +21953,7 @@

Very High Risk (RM7x7 S:4 L:6)

- + @@ -20222,23 +21986,23 @@

Very High Risk (RM7x7 S:4 L:6)

-
-

Very High Risk (RM7x7 S:4 L:7)

+
+

Very High Risk (RM7x7 S:5 L:5)

TermRM7x7S4L6RM7x7S5L4 Prefix risk
LabelVery High Risk (RM7x7 S:4 L:6)High Risk (RM7x7 S:5 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L6https://w3id.org/dpv/risk#RM7x7S5L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High
- + - + - + @@ -20266,7 +22030,7 @@

Very High Risk (RM7x7 S:4 L:7)

- + @@ -20299,23 +22063,23 @@

Very High Risk (RM7x7 S:4 L:7)

-
-

Very Low Risk (RM7x7 S:5 L:1)

+
+

Extremely High Risk (RM7x7 S:5 L:6)

TermRM7x7S4L7RM7x7S5L5 Prefix risk
LabelVery High Risk (RM7x7 S:4 L:7)Very High Risk (RM7x7 S:5 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S4L7https://w3id.org/dpv/risk#RM7x7S5L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -20343,7 +22107,7 @@

Very Low Risk (RM7x7 S:5 L:1)

- + @@ -20376,23 +22140,23 @@

Very Low Risk (RM7x7 S:5 L:1)

-
-

Low Risk (RM7x7 S:5 L:2)

+
+

Extremely High Risk (RM7x7 S:5 L:7)

TermRM7x7S5L1RM7x7S5L6 Prefix risk
LabelVery Low Risk (RM7x7 S:5 L:1)Extremely High Risk (RM7x7 S:5 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L1https://w3id.org/dpv/risk#RM7x7S5L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High
- + - + - + @@ -20420,7 +22184,7 @@

Low Risk (RM7x7 S:5 L:2)

- + @@ -20453,23 +22217,23 @@

Low Risk (RM7x7 S:5 L:2)

-
-

Moderate Risk (RM7x7 S:5 L:3)

+
+

Very Low Risk (RM7x7 S:6 L:1)

TermRM7x7S5L2RM7x7S5L7 Prefix risk
LabelLow Risk (RM7x7 S:5 L:2)Extremely High Risk (RM7x7 S:5 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L2https://w3id.org/dpv/risk#RM7x7S5L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High
- + - + - + @@ -20497,7 +22261,7 @@

Moderate Risk (RM7x7 S:5 L:3)

- + @@ -20530,23 +22294,23 @@

Moderate Risk (RM7x7 S:5 L:3)

-
-

High Risk (RM7x7 S:5 L:4)

+
+

Moderate Risk (RM7x7 S:6 L:2)

TermRM7x7S5L3RM7x7S6L1 Prefix risk
LabelModerate Risk (RM7x7 S:5 L:3)Very Low Risk (RM7x7 S:6 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L3https://w3id.org/dpv/risk#RM7x7S6L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low
- + - + - + @@ -20574,7 +22338,7 @@

High Risk (RM7x7 S:5 L:4)

- + @@ -20607,23 +22371,23 @@

High Risk (RM7x7 S:5 L:4)

-
-

Very High Risk (RM7x7 S:5 L:5)

+
+

High Risk (RM7x7 S:6 L:3)

TermRM7x7S5L4RM7x7S6L2 Prefix risk
LabelHigh Risk (RM7x7 S:5 L:4)Moderate Risk (RM7x7 S:6 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L4https://w3id.org/dpv/risk#RM7x7S6L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate
- + - + - + @@ -20651,7 +22415,7 @@

Very High Risk (RM7x7 S:5 L:5)

- + @@ -20684,23 +22448,23 @@

Very High Risk (RM7x7 S:5 L:5)

-
-

Extremely High Risk (RM7x7 S:5 L:6)

+
+

Very High Risk (RM7x7 S:6 L:4)

TermRM7x7S5L5RM7x7S6L3 Prefix risk
LabelVery High Risk (RM7x7 S:5 L:5)High Risk (RM7x7 S:6 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L5https://w3id.org/dpv/risk#RM7x7S6L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High
- + - + - + @@ -20728,7 +22492,7 @@

Extremely High Risk (RM7x7 S:5 L:6)

- + @@ -20761,23 +22525,23 @@

Extremely High Risk (RM7x7 S:5 L:6)

-
-

Extremely High Risk (RM7x7 S:5 L:7)

+
+

Very High Risk (RM7x7 S:6 L:5)

TermRM7x7S5L6RM7x7S6L4 Prefix risk
LabelExtremely High Risk (RM7x7 S:5 L:6)Very High Risk (RM7x7 S:6 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L6https://w3id.org/dpv/risk#RM7x7S6L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High
- + - + - + @@ -20805,7 +22569,7 @@

Extremely High Risk (RM7x7 S:5 L:7)

- + @@ -20838,23 +22602,23 @@

Extremely High Risk (RM7x7 S:5 L:7)

-
-

Very Low Risk (RM7x7 S:6 L:1)

+
+

Extremely High Risk (RM7x7 S:6 L:6)

TermRM7x7S5L7RM7x7S6L5 Prefix risk
LabelExtremely High Risk (RM7x7 S:5 L:7)Very High Risk (RM7x7 S:6 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S5L7https://w3id.org/dpv/risk#RM7x7S6L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High
- + - + - + @@ -20882,7 +22646,7 @@

Very Low Risk (RM7x7 S:6 L:1)

- + @@ -20915,23 +22679,23 @@

Very Low Risk (RM7x7 S:6 L:1)

-
-

Moderate Risk (RM7x7 S:6 L:2)

+
+

Extremely High Risk (RM7x7 S:6 L:7)

TermRM7x7S6L1RM7x7S6L6 Prefix risk
LabelVery Low Risk (RM7x7 S:6 L:1)Extremely High Risk (RM7x7 S:6 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L1https://w3id.org/dpv/risk#RM7x7S6L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very LowNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High
- + - + - + @@ -20959,7 +22723,7 @@

Moderate Risk (RM7x7 S:6 L:2)

- + @@ -20992,23 +22756,23 @@

Moderate Risk (RM7x7 S:6 L:2)

-
-

High Risk (RM7x7 S:6 L:3)

+
+

Low Risk (RM7x7 S:7 L:1)

TermRM7x7S6L2RM7x7S6L7 Prefix risk
LabelModerate Risk (RM7x7 S:6 L:2)Extremely High Risk (RM7x7 S:6 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L2https://w3id.org/dpv/risk#RM7x7S6L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High
- + - + - + @@ -21036,7 +22800,7 @@

High Risk (RM7x7 S:6 L:3)

- + @@ -21069,23 +22833,23 @@

High Risk (RM7x7 S:6 L:3)

-
-

Very High Risk (RM7x7 S:6 L:4)

+
+

Moderate Risk (RM7x7 S:7 L:2)

TermRM7x7S6L3RM7x7S7L1 Prefix risk
LabelHigh Risk (RM7x7 S:6 L:3)Low Risk (RM7x7 S:7 L:1)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L3https://w3id.org/dpv/risk#RM7x7S7L1
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low
- + - + - + @@ -21113,7 +22877,7 @@

Very High Risk (RM7x7 S:6 L:4)

- + @@ -21146,23 +22910,23 @@

Very High Risk (RM7x7 S:6 L:4)

-
-

Very High Risk (RM7x7 S:6 L:5)

+
+

High Risk (RM7x7 S:7 L:3)

TermRM7x7S6L4RM7x7S7L2 Prefix risk
LabelVery High Risk (RM7x7 S:6 L:4)Moderate Risk (RM7x7 S:7 L:2)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L4https://w3id.org/dpv/risk#RM7x7S7L2
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate
- + - + - + @@ -21190,7 +22954,7 @@

Very High Risk (RM7x7 S:6 L:5)

- + @@ -21223,23 +22987,23 @@

Very High Risk (RM7x7 S:6 L:5)

-
-

Extremely High Risk (RM7x7 S:6 L:6)

+
+

Very High Risk (RM7x7 S:7 L:4)

TermRM7x7S6L5RM7x7S7L3 Prefix risk
LabelVery High Risk (RM7x7 S:6 L:5)High Risk (RM7x7 S:7 L:3)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L5https://w3id.org/dpv/risk#RM7x7S7L3
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High
- + - + - + @@ -21267,7 +23031,7 @@

Extremely High Risk (RM7x7 S:6 L:6)

- + @@ -21300,23 +23064,23 @@

Extremely High Risk (RM7x7 S:6 L:6)

-
-

Extremely High Risk (RM7x7 S:6 L:7)

+
+

Extremely High Risk (RM7x7 S:7 L:5)

TermRM7x7S6L6RM7x7S7L4 Prefix risk
LabelExtremely High Risk (RM7x7 S:6 L:6)Very High Risk (RM7x7 S:7 L:4)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L6https://w3id.org/dpv/risk#RM7x7S7L4
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High
- + - + - + @@ -21344,7 +23108,7 @@

Extremely High Risk (RM7x7 S:6 L:7)

- + @@ -21377,23 +23141,23 @@

Extremely High Risk (RM7x7 S:6 L:7)

-
-

Low Risk (RM7x7 S:7 L:1)

+
+

Extremely High Risk (RM7x7 S:7 L:6)

TermRM7x7S6L7RM7x7S7L5 Prefix risk
LabelExtremely High Risk (RM7x7 S:6 L:7)Extremely High Risk (RM7x7 S:7 L:5)
IRIhttps://w3id.org/dpv/risk#RM7x7S6L7https://w3id.org/dpv/risk#RM7x7S7L5
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely HighNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High
- + - + - + @@ -21421,7 +23185,7 @@

Low Risk (RM7x7 S:7 L:1)

- + @@ -21454,23 +23218,23 @@

Low Risk (RM7x7 S:7 L:1)

-
-

Moderate Risk (RM7x7 S:7 L:2)

+
+

Extremely High Risk (RM7x7 S:7 L:7)

TermRM7x7S7L1RM7x7S7L6 Prefix risk
LabelLow Risk (RM7x7 S:7 L:1)Extremely High Risk (RM7x7 S:7 L:6)
IRIhttps://w3id.org/dpv/risk#RM7x7S7L1https://w3id.org/dpv/risk#RM7x7S7L6
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: LowNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High
- + - + - + @@ -21498,7 +23262,7 @@

Moderate Risk (RM7x7 S:7 L:2)

- + @@ -21531,38 +23295,37 @@

Moderate Risk (RM7x7 S:7 L:2)

-
-

High Risk (RM7x7 S:7 L:3)

+
+

Rule-Based System Design

TermRM7x7S7L2RM7x7S7L7 Prefix risk
LabelModerate Risk (RM7x7 S:7 L:2)Extremely High Risk (RM7x7 S:7 L:7)
IRIhttps://w3id.org/dpv/risk#RM7x7S7L2https://w3id.org/dpv/risk#RM7x7S7L7
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: ModerateNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High
- + - + - + - + - @@ -21575,31 +23338,37 @@

High Risk (RM7x7 S:7 L:3)

- + - + + + + - + + + + - + - + - @@ -21608,38 +23377,42 @@

High Risk (RM7x7 S:7 L:3)

-
-

Very High Risk (RM7x7 S:7 L:4)

+
+

Sabotage

TermRM7x7S7L3RuleBasedSystemDesign Prefix risk
LabelHigh Risk (RM7x7 S:7 L:3)Rule-Based System Design
IRIhttps://w3id.org/dpv/risk#RM7x7S7L3https://w3id.org/dpv/risk#RuleBasedSystemDesign
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: HighBias that occurs due to developer experience and expert advice having a significant influence on rule-based system design
Usage NoteRule based system design also potentially introduces various forms of human cognitive bias
Source
Date Created2022-08-172024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-MATRIX in RISK + section BIAS in RISK
- + - + - + - + - + + + + @@ -21652,14 +23425,17 @@

Very High Risk (RM7x7 S:7 L:4)

- + - + + + + @@ -21667,7 +23443,10 @@

Very High Risk (RM7x7 S:7 L:4)

- + + + + @@ -21676,7 +23455,7 @@

Very High Risk (RM7x7 S:7 L:4)

- @@ -21685,38 +23464,39 @@

Very High Risk (RM7x7 S:7 L:4)

-
-

Extremely High Risk (RM7x7 S:7 L:5)

+
+

Sampling Bias

TermRM7x7S7L4Sabotage Prefix risk
LabelVery High Risk (RM7x7 S:7 L:4)Sabotage
IRIhttps://w3id.org/dpv/risk#RM7x7S7L4https://w3id.org/dpv/risk#Sabotage
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:AvailabilityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very HighSomething that acts as or causes Sabotage
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created 2022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-MATRIX in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - - - + + @@ -21729,31 +23509,34 @@

Extremely High Risk (RM7x7 S:7 L:5)

- + - + + + + - + - + - @@ -21762,38 +23545,39 @@

Extremely High Risk (RM7x7 S:7 L:5)

-
-

Extremely High Risk (RM7x7 S:7 L:6)

+
+

Scam

TermRM7x7S7L5SamplingBias Prefix risk
LabelExtremely High Risk (RM7x7 S:7 L:5)Sampling Bias
IRIhttps://w3id.org/dpv/risk#RM7x7S7L5https://w3id.org/dpv/risk#SamplingBias
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement +
Broader/Parent types risk:SelectionBias + → risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely HighBias that occurs when data records are not collected randomly from the intended population
Source
Date Created2022-08-172024-09-13
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-MATRIX in RISK + section BIAS in RISK
- + - + - + - + - + + @@ -21806,14 +23590,17 @@

Extremely High Risk (RM7x7 S:7 L:6)

- + - + + + + @@ -21821,7 +23608,10 @@

Extremely High Risk (RM7x7 S:7 L:6)

- + + + + @@ -21830,7 +23620,7 @@

Extremely High Risk (RM7x7 S:7 L:6)

- @@ -21839,38 +23629,45 @@

Extremely High Risk (RM7x7 S:7 L:6)

-
-

Extremely High Risk (RM7x7 S:7 L:7)

+
+

Security Attack

TermRM7x7S7L6Scam Prefix risk
LabelExtremely High Risk (RM7x7 S:7 L:6)Scam
IRIhttps://w3id.org/dpv/risk#RM7x7S7L6https://w3id.org/dpv/risk#Scam
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely HighSomething that acts as or causes Scam
SourceISO/IEC 27005:2018
Date Created 2022-08-17
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-MATRIX in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - + + + + + + @@ -21883,7 +23680,7 @@

Extremely High Risk (RM7x7 S:7 L:7)

- + @@ -21894,20 +23691,14 @@

Extremely High Risk (RM7x7 S:7 L:7)

- - - - + - - - - + - @@ -21916,23 +23707,23 @@

Extremely High Risk (RM7x7 S:7 L:7)

-
-

Sabotage

+
+

Security Breach

TermRM7x7S7L7SecurityAttack Prefix risk
LabelExtremely High Risk (RM7x7 S:7 L:7)Security Attack
IRIhttps://w3id.org/dpv/risk#RM7x7S7L7https://w3id.org/dpv/risk#SecurityAttack
Typerdfs:Class, skos:Concept, risk:RiskAnalysisrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskMatrix7x7 - → risk:RiskMatrix - → risk:RiskAssessment - → risk:RiskManagement + risk:AvailabilityConcept +
Broader/Parent types risk:ConfidentialityConcept +
Broader/Parent types risk:ExternalSecurityThreat + → dpv:RiskConcept +
Broader/Parent types risk:IntegrityConcept
DefinitionNode in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely HighSomething that acts as or causes an attack on security with the aim of undermining it
Date Created2022-08-17
ContributorsHarshvardhan J. Pandit
See More: section RISK-MATRIX in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + @@ -21947,11 +23738,14 @@

Sabotage

- + + @@ -21964,7 +23758,7 @@

Sabotage

- + @@ -21973,7 +23767,7 @@

Sabotage

- + @@ -22003,39 +23797,38 @@

Sabotage

-
-

Scam

+
+

Selection Bias

TermSabotageSecurityBreach Prefix risk
LabelSabotageSecurity Breach
IRIhttps://w3id.org/dpv/risk#Sabotagehttps://w3id.org/dpv/risk#SecurityBreach
risk:AvailabilityConcept
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:ConfidentialityConcept
Broader/Parent types risk:IntegrityConcept +
Broader/Parent types risk:OperationalSecurityRisk + → dpv:RiskConcept
DefinitionSomething that acts as or causes SabotageSomething that acts as or causes Security Breach
SourceENISA Reference Incident Classification Taxonomy 2018ISO/IEC 27005:2018
- + - + - + - + - - - @@ -22048,7 +23841,7 @@

Scam

- + @@ -22057,28 +23850,25 @@

Scam

- + - + - - - - + - + - @@ -22087,23 +23877,28 @@

Scam

-
-

Security Attack

+ + + + + +
+

Sexual Violence

TermScamSelectionBias Prefix risk
LabelScamSelection Bias
IRIhttps://w3id.org/dpv/risk#Scamhttps://w3id.org/dpv/risk#SelectionBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept + risk:StatisticalBias + → risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes ScamBias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution
SourceISO/IEC 27005:2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + @@ -22115,17 +23910,7 @@

Security Attack

- - - - - - - @@ -22138,20 +23923,32 @@

Security Attack

- + - + + + + - - - + + + + + + + + + + + + @@ -22165,49 +23962,47 @@

Security Attack

-
-

Security Breach

+
+

Share Risk

TermSecurityAttackSexualViolence Prefix risk
LabelSecurity AttackSexual Violence
IRIhttps://w3id.org/dpv/risk#SecurityAttackhttps://w3id.org/dpv/risk#SexualViolence
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:ExternalSecurityThreat - → dpv:RiskConcept -
Broader/Parent types risk:IntegrityConcept + risk:IndividualRisk
DefinitionSomething that acts as or causes an attack on security with the aim of undermining itSomething that acts as or causes Sexual Violence
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-17
Date Modified2024-08-16
ContributorsHarshvardhan J. Pandit
- + - + - + - + - - - - - - - - + + + + @@ -22216,28 +24011,22 @@

Security Breach

- + - - - - + - + - - - - + @@ -22246,7 +24035,7 @@

Security Breach

- @@ -22255,40 +24044,37 @@

Security Breach

- - - - - -
-

Sexual Violence

+
+

Simpson'S Paradox Bias

TermSecurityBreachShareRisk Prefix risk
LabelSecurity BreachShare Risk
IRIhttps://w3id.org/dpv/risk#SecurityBreachhttps://w3id.org/dpv/risk#ShareRisk
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskControl
Broader/Parent types risk:AvailabilityConcept -
Broader/Parent types risk:ConfidentialityConcept -
Broader/Parent types risk:IntegrityConcept -
Broader/Parent types risk:OperationalSecurityRisk - → dpv:RiskConcept + risk:RiskControl + → dpv:RiskMitigationMeasure + → dpv:TechnicalOrganisationalMeasure
Object of relation dpv:hasTechnicalOrganisationalMeasure, + dpv:isMitigatedByMeasure, + risk:hasControl +
DefinitionSomething that acts as or causes Security BreachRisk Mitigation Measure that shares Risk e.g. amongst stakeholders
SourceISO/IEC 27005:2018
Date Created2022-08-172024-05-19
Date Modified2024-08-16
Contributors Harshvardhan J. Pandit
See More: section RISK-CONSEQUENCES in RISK + section RISK-CONTROLS in RISK
- + - + - + - + - @@ -22301,7 +24087,7 @@

Sexual Violence

- + @@ -22310,28 +24096,25 @@

Sexual Violence

- + - + - - - - + - + - @@ -22340,47 +24123,40 @@

Sexual Violence

-
-

Share Risk

+
+

Social Disadvantage

TermSexualViolenceSimpsonsParadoxBias Prefix risk
LabelSexual ViolenceSimpson'S Paradox Bias
IRIhttps://w3id.org/dpv/risk#SexualViolencehttps://w3id.org/dpv/risk#SimpsonsParadoxBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:IndividualRisk + risk:DataBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Sexual ViolenceBias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined
SourceENISA Reference Incident Classification Taxonomy 2018
Date Created2022-08-172024-09-13
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
- + - + - + - + - - - - - + @@ -22389,7 +24165,7 @@

Share Risk

- + @@ -22402,18 +24178,21 @@

Share Risk

- + - + + + + - + - @@ -22422,36 +24201,37 @@

Share Risk

-
-

Social Disadvantage

+
+

Societal Bias

TermShareRiskSocialDisadvantage Prefix risk
LabelShare RiskSocial Disadvantage
IRIhttps://w3id.org/dpv/risk#ShareRiskhttps://w3id.org/dpv/risk#SocialDisadvantage
Typerdfs:Class, skos:Concept, risk:RiskControlrdfs:Class, skos:Concept, dpv:RiskConcept
Broader/Parent types risk:RiskControl - → dpv:RiskMitigationMeasure - → dpv:TechnicalOrganisationalMeasure + risk:SocietalRisk + → dpv:RiskConcept
Object of relation dpv:hasTechnicalOrganisationalMeasure, - dpv:isMitigatedByMeasure, - risk:hasControl -
DefinitionRisk Mitigation Measure that shares Risk e.g. amongst stakeholdersSomething that acts as or causes Social Disadvantage
Date Created2024-05-192022-08-19
Date Modified2024-08-16
ContributorsHarshvardhan J. PanditGeorg P. Krog
See More: section RISK-CONTROLS in RISK + section RISK-CONSEQUENCES in RISK
- + - + - + - + - @@ -22464,34 +24244,34 @@

Social Disadvantage

- + - + + + + - + - - - - + - + - @@ -22807,6 +24587,85 @@

Spoofing

+
+

Statistical Bias

+
TermSocialDisadvantageSocietalBias Prefix risk
LabelSocial DisadvantageSocietal Bias
IRIhttps://w3id.org/dpv/risk#SocialDisadvantagehttps://w3id.org/dpv/risk#SocietalBias
Typerdfs:Class, skos:Concept, dpv:RiskConceptrdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:SocietalRisk - → dpv:RiskConcept + risk:CognitiveBias + → risk:Bias + → risk:RiskConcept
DefinitionSomething that acts as or causes Social DisadvantageBias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society
Source
Date Created2022-08-192024-09-13
Date Modified2024-08-16
ContributorsGeorg P. KrogDaniel Doherty
See More: section RISK-CONSEQUENCES in RISK + section BIAS in RISK
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
TermStatisticalBiasPrefixrisk
LabelStatistical Bias
IRIhttps://w3id.org/dpv/risk#StatisticalBias
Typerdfs:Class, skos:Concept, risk:RiskConcept
Broader/Parent types risk:DataBias + → risk:Bias + → risk:RiskConcept +
DefinitionBias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates
Source
Date Created2024-09-13
ContributorsDaniel Doherty
See More: section BIAS in RISK +
+
+ + +

System Failure

@@ -26016,6 +27875,10 @@

Properties

+ + + + @@ -26200,6 +28063,15 @@

caused by vulnerability

+ + + + + + + + + @@ -26236,6 +28108,18 @@

caused by vulnerability

+ + + + + + + + + + + + @@ -26364,6 +28248,9 @@

exploits vulnerability

+ + + @@ -26756,6 +28643,9 @@

has vulnerability

+ + + @@ -26824,6 +28714,12 @@

has vulnerability

+ + + + + + @@ -27088,6 +28984,15 @@

is vulnerability of

+ + + + + + + + + @@ -27209,6 +29114,9 @@

refers to risk

+ + + @@ -27611,6 +29519,24 @@

refers to risk

+ + + + + + + + + + + + + + + + + + @@ -27768,13 +29694,23 @@

External

+ + + + + + + + + + @@ -27801,9 +29737,12 @@

External

+ + + @@ -27817,6 +29756,18 @@

External

+ + + + + + + + + + + + @@ -27909,6 +29860,11 @@

External

+ + + + + @@ -27917,6 +29873,7 @@

External

+ @@ -28013,16 +29970,31 @@

External

+ + + + + + + + + + + + + + + @@ -28184,6 +30156,9 @@

External

+ + + @@ -28472,10 +30447,28 @@

External

+ + + + + + + + + + + + + + + + + + @@ -28615,6 +30608,7 @@

Contributors

  • Axel Polleres (Vienna University of Economics and Business)
  • Beatriz Esteves (IDLab, IMEC, Ghent University)
  • +
  • Daniel Doherty ()
  • Delaram Golpayegani (ADAPT Centre, Trinity College Dublin)
  • Fajar Ekaputra (Vienna University of Technology)
  • Georg P. Krog (Signatu AS)
  • diff --git a/2.1-dev/risk/risk.jsonld b/2.1-dev/risk/risk.jsonld index c0833c6df..cedfb1f28 100644 --- a/2.1-dev/risk/risk.jsonld +++ b/2.1-dev/risk/risk.jsonld @@ -1,10 +1,10 @@ [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl", + "@id": "https://w3id.org/dpv/risk#Terrorism", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14,7 +14,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ndf05e8ac43fb44f994f8ab3ba8f8b7b6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -30,35 +41,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that uses controls to monitor events" + "@value": "Something that acts as or causes Terrorism" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Terrorism" } + ] + }, + { + "@id": "_:Ndf05e8ac43fb44f994f8ab3ba8f8b7b6", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", + "@id": "https://w3id.org/dpv/risk#Extorsion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -83,7 +104,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N45ea789360bf45b583e4ec132c599510" + "@id": "_:Nb72f9b0d54644d6ab338feaa339c1f40" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -99,13 +120,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Negotiating Capacity" + "@value": "Something that acts as or causes Extorsion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -116,28 +140,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Negotiating Capacity" + "@value": "Extorsion" } ] }, { - "@id": "_:N45ea789360bf45b583e4ec132c599510", + "@id": "_:Nb72f9b0d54644d6ab338feaa339c1f40", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L3", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -156,7 +180,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -172,13 +196,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -189,22 +213,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:3)" + "@value": "Low Risk (RM7x7 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#core-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#MonitorImpact", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -214,7 +232,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -230,48 +253,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Impact" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Impact" + "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L4", + "@id": "https://w3id.org/dpv/risk#isExploitedBy", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk#Threat" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.64,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -285,35 +307,40 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:4)" + "@value": "is exploited by" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRiskSource", + "@id": "https://w3id.org/dpv/risk#IncidentMitigated", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -323,7 +350,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -339,53 +366,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Source" + "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk Source" + "@value": "Incident Mitigated" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L1", + "@id": "https://w3id.org/dpv/risk#IncidentDetectionReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.06,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -396,33 +417,32 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "A report describing the detection of a Incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" + "@value": "Incident Detection Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L6", + "@id": "https://w3id.org/dpv/risk#RiskAnalysis", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { @@ -432,12 +452,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.49,xsd:decimal" + "@id": "_:Na877a19c74e2458baac027fd4dcf4457" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -445,6 +465,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#RiskAssessment" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -453,48 +478,65 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:6)" + "@value": "Risk Analysis" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L1", + "@id": "_:Na877a19c74e2458baac027fd4dcf4457", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "IEC 31010:2019" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/72140.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Benefit", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.11,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -510,48 +552,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Something that acts as or causes benefits" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:1)" + "@value": "Benefit" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L5", + "@id": "https://w3id.org/dpv/risk#Discrimination", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.40,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -567,33 +610,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Something that acts as or causes Discrimination" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:2 L:5)" + "@value": "Discrimination" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L2", + "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SocietalRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Societal Health & Safety" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ChangeImpact", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -603,12 +681,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.04,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -624,29 +697,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ImpactControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Control that changes Impact" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" + "@value": "Change Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#LoseReputation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -671,7 +744,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N88bef5f8213d4c23913c18635bfa944c" + "@id": "_:N25ef844a62984a848306d378b71152be" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -687,16 +760,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Denial of Service Attack (DoS)" + "@value": "Something that acts as or causes Loss of Reputation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -707,12 +777,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Denial of Service Attack (DoS)" + "@value": "Lose of Reputation" } ] }, { - "@id": "_:N88bef5f8213d4c23913c18635bfa944c", + "@id": "_:N25ef844a62984a848306d378b71152be", "@type": [ "https://schema.org/WebPage" ], @@ -728,11 +798,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -745,15 +815,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N0dc4e9d552fa49a791201e58b8357c78" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -769,58 +833,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Malfunction" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here equipment refers to physical equipment" + "@value": "High Risk (RM5x5 S:5 L:3)" } ] }, { - "@id": "_:N0dc4e9d552fa49a791201e58b8357c78", + "@id": "https://w3id.org/dpv/risk#core-properties", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } + "http://www.w3.org/2004/02/skos/core#ConceptScheme" ] }, { - "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -830,18 +875,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nd57e4c70c13c4e6ca8deb7d8c72e0ab0" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -857,48 +891,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Public Order Breach" + "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Public Order Breach" + "@value": "5 Likelihood Levels" } ] }, { - "@id": "_:Nd57e4c70c13c4e6ca8deb7d8c72e0ab0", + "@id": "https://w3id.org/dpv/risk#Privacy", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Privacy" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentStatus", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -908,12 +962,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples#E0069" + "@value": "0.73,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -921,11 +975,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#Status" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -934,48 +983,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Status" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Status associated with an incident" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status" + "@value": "Extremely High Risk (RM7x7 S:6 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L3", + "@id": "https://w3id.org/dpv/risk#DataProcessingBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.48,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -991,60 +1041,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#DataBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:4 L:3)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - HTML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.html" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/specification" + "@value": "Data Processing Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseGoodwill", + "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1069,7 +1088,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N9db39f807c10412abc51d201d124e759" + "@id": "_:Nb1e4985890f24fbab83393e2ff718b69" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1085,13 +1104,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Goodwill" + "@value": "Something that acts as or causes Unwanted Data Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1102,12 +1127,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Goodwill" + "@value": "Unwanted Data Deletion" } ] }, { - "@id": "_:N9db39f807c10412abc51d201d124e759", + "@id": "_:Nb1e4985890f24fbab83393e2ff718b69", "@type": [ "https://schema.org/WebPage" ], @@ -1123,11 +1148,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentStatusUnknown", + "@id": "https://w3id.org/dpv/risk#ModerateRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -1137,7 +1162,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1153,38 +1183,60 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { "@language": "en", - "@value": "The status of a incident is unknown" + "@value": "Level where Risk is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Status Unknown" + "@value": "Moderate Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemedyControl", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1200,33 +1252,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to remedy consequences of event" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remedy Control" + "@value": "Moderate Risk (RM7x7 S:6 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", + "@id": "https://w3id.org/dpv/risk#incident-status-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ExtremelyLowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -1236,18 +1294,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N922c5ae818414586ac107059bd5a8394" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1258,56 +1310,40 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Contractual Obligations" + "@value": "Level where Likelihood is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Contractual Obligation" + "@value": "Extremely Low Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N922c5ae818414586ac107059bd5a8394", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fraud", + "@id": "https://w3id.org/dpv/risk#Renumeration", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1315,13 +1351,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], "http://purl.org/dc/terms/modified": [ @@ -1330,11 +1366,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N28e03fcc1da04ba6b6f8244dc6e99aa3" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -1348,16 +1379,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Fraud" + "@value": "Something that acts as or provides renumeration which is in monetary or financial form" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1368,28 +1396,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fraud" - } - ] - }, - { - "@id": "_:N28e03fcc1da04ba6b6f8244dc6e99aa3", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Remuneration" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemFailure", + "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -1414,7 +1426,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nb9e5507b40ed49e8b865a65f8fdb49f6" + "@id": "_:Nc28ea8a295b445aca739a464f287a77a" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1430,16 +1442,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Failure" + "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1450,38 +1465,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "Brute Force Authorisations" } ] }, { - "@id": "_:Nb9e5507b40ed49e8b865a65f8fdb49f6", + "@id": "_:Nc28ea8a295b445aca739a464f287a77a", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentSuspected", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1491,7 +1500,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1507,47 +1521,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected" + "@value": "Low Risk (RM5x5 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#EnvironmentalIncident", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#Severity" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.01,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -1558,33 +1578,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to environmental factors outside human controls" + "@value": "Level where Severity is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Incident" + "@value": "Extremely Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighLikelihood", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1594,12 +1620,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1615,39 +1641,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Very Low Risk (RM7x7 S:6 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ShareRisk", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1657,7 +1677,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.29,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1673,33 +1698,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Share Risk" + "@value": "Moderate Risk (RM7x7 S:2 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Coercion", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1712,15 +1737,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N3bc2fdc2ddce4051bfcb2a546f54f552" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1736,52 +1755,85 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Coercion" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Coercion" + "@value": "Moderate Risk (RM7x7 S:2 L:6)" } ] }, { - "@id": "_:N3bc2fdc2ddce4051bfcb2a546f54f552", + "@id": "https://w3id.org/dpv/risk#IncidentStatusUnknown", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#IncidentStatus" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IncidentStatus" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "The status of a incident is unknown" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-status-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Status Unknown" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowLikelihood", + "@id": "https://w3id.org/dpv/risk#VeryHighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -1796,7 +1848,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1812,16 +1864,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#5RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very Low" + "@value": "Level where Risk is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -1832,22 +1884,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Likelihood" + "@value": "Very High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -1860,15 +1912,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N0c2266c1ab8c4a7cb0fa518b03d31135" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -1884,60 +1930,74 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Psychological Harm" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Psychological Harm" + "@value": "Low Risk (RM7x7 S:5 L:2)" } ] }, { - "@id": "_:N0c2266c1ab8c4a7cb0fa518b03d31135", + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "accepted" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#AvoidSource", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv#RiskConcept" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@language": "en", + "@value": "Concepts associated with security threats that are likely to originate externally" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "External Security Threat" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ReputationalRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -1952,48 +2012,72 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that avoids the risk source" + "@value": "Risks and issues that affect the reputation of the organisation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Avoid Source" + "@value": "Reputational Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L3", + "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@language": "en", + "@value": "accepted" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "0.37,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Individual Health & Safety" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ThreatSource", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2001,37 +2085,37 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@language": "en", + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Source of threat event, including both agent and non-agent sources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:6 L:3)" + "@value": "Threat Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2050,7 +2134,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2066,13 +2150,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2083,16 +2167,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:6 L:1)" + "@value": "Moderate Risk (RM5x5 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Terrorism", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -2105,15 +2189,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N69ff5198a3ca43fb9593ddca17b43801" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2129,64 +2207,90 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Terrorism" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Terrorism" + "@value": "Low Risk (RM3x3 S:2 L:1)" } ] }, { - "@id": "_:N69ff5198a3ca43fb9593ddca17b43801", + "@id": "https://w3id.org/dpv/risk#JudicialCosts", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#FinancialImpact" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that involves or causes judicial costs to be paid" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Judicial Costs" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix", + "@id": "https://w3id.org/dpv/risk#NonNormalityBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAssessment" + "https://w3id.org/dpv/risk#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5faf38fbf04547d78ccaa2b8c1043b41" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2202,89 +2306,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv/risk#StatisticalBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." + "@value": "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix" - } - ] - }, - { - "@id": "_:N5faf38fbf04547d78ccaa2b8c1043b41", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "IEC 31010:2019" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/72140.html" + "@value": "Non-Normality Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf", + "@id": "https://w3id.org/dpv/risk#DataBias", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - RDF/XML serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.rdf" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Daniel Doherty" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#causedByThreat", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/source": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2298,44 +2362,50 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Bias" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" + "@value": "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "Data Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#causedByVulnerability", + "@id": "https://w3id.org/dpv/risk#LowSeverity", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#Severity" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2349,31 +2419,43 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + "@value": "Level where Severity is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "caused by vulnerability" + "@value": "Low Severity" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#Sabotage", + "@id": "https://w3id.org/dpv/risk#RightsImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2398,7 +2480,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N5cd200693b5a4690bc1b18c36bb0a451" + "@id": "_:N8e471129d82f468fbaa272011c8a10f7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2414,19 +2496,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv#Impact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sabotage" + "@value": "Something that acts as or causes Impact to Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -2437,47 +2516,54 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sabotage" + "@value": "Impact to Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" } ] }, { - "@id": "_:N5cd200693b5a4690bc1b18c36bb0a451", + "@id": "_:N8e471129d82f468fbaa272011c8a10f7", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L1", + "@id": "https://w3id.org/dpv/risk#Payment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2493,33 +2579,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:3 L:1)" + "@value": "Payment" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", + "@id": "https://w3id.org/dpv/risk#SourceControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -2529,18 +2615,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nd02dc641aff04e49a09a2ef6666d05e0" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2551,70 +2626,54 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Ethics Code" + "@value": "Risk Mitigation Measure that controls the Source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Ethics Code" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" - } - ] - }, - { - "@id": "_:Nd02dc641aff04e49a09a2ef6666d05e0", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Source Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRiskControl", + "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2630,33 +2689,55 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors another Control" + "@value": "Something that acts as or causes Prevent Exercising of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Control" + "@value": "Prevent Exercising of Rights" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#LegalRisk", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2671,43 +2752,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their basis in legal requirements and enforcement" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Legal Risk" + "@value": "Very Low Risk (RM7x7 S:1 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Extorsion", + "@id": "https://w3id.org/dpv/risk#RiskSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], "http://purl.org/dc/terms/modified": [ @@ -2716,14 +2791,14 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:N71dc264e6f594f138f1ef30a701d2c4c" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -2734,52 +2809,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Extorsion" + "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extorsion" + "@value": "Risk Source" } ] }, { - "@id": "_:N71dc264e6f594f138f1ef30a701d2c4c", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L4", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.33,xsd:decimal" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -2794,33 +2866,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with security threats that are likely to originate externally" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "External Security Threat" + "@value": "High Risk (RM7x7 S:4 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L3", + "@id": "https://w3id.org/dpv/risk#SystemIntrusion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -2833,9 +2905,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.60,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na8ee3a054aaf49f89103a7f1af68d1c7" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2851,83 +2929,74 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes System Intrusion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:3)" + "@value": "System Intrusion" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalHealthSafety", + "@id": "_:Na8ee3a054aaf49f89103a7f1af68d1c7", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Societal Health & Safety" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L4", + "@id": "https://w3id.org/dpv/risk#OutGroupHomogeneityBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.16,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -2943,29 +3012,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:4)" + "@value": "Out-Group Homogeneity Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsViolation", + "@id": "https://w3id.org/dpv/risk#PhysicalAssault", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -2973,13 +3042,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -2988,6 +3057,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6dd3fbc8f83f432bac55bbdc7b5f2fcc" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3001,13 +3075,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Rights" + "@value": "Something that acts as or causes Physical Assault" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3018,39 +3092,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" + "@value": "Physical Assault" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", + "@id": "_:N6dd3fbc8f83f432bac55bbdc7b5f2fcc", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog" - } + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/name": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/modified": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3065,51 +3132,102 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Unauthorised Re-Identification" + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Unauthorised Re-Identification" - } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L3", + "@id": "https://w3id.org/dpv/risk#bias-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#CrossBorderIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.67,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Incident involving cross-border or multiple jurisdictions" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Cross-Border Incident" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N9017bb64e79f426e9b3be47b09cd93ea" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3125,33 +3243,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Something that acts as or causes Unauthorised Data Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:2 L:3)" + "@value": "Unauthorised Data Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowRisk", + "@id": "_:N9017bb64e79f426e9b3be47b09cd93ea", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#VeryLowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -3182,16 +3319,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" }, { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very Low" + "@value": "Level where Likelihood is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3202,7 +3339,7 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk" + "@value": "Very Low Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ @@ -3213,11 +3350,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L3", + "@id": "https://w3id.org/dpv/risk#EquipmentFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3230,9 +3367,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.33,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N9a05f8103f334714ae1d17fd74ba0730" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3248,48 +3391,63 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Something that acts as or causes Equipment Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:1 L:3)" + "@value": "Equipment Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L2", + "@id": "_:N9a05f8103f334714ae1d17fd74ba0730", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IdentificationControl", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3305,32 +3463,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Control to identify characteristics of event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:3 L:2)" + "@value": "Identification Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskAnalysis", + "@id": "https://w3id.org/dpv/risk#Coercion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3340,22 +3499,23 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "_:N8c7d07a332384427aa20629b184e287b" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "_:Ncae32b67116f4739be7418755cf32050" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -3366,45 +3526,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskAssessment" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures" + "@value": "Something that acts as or causes Coercion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Analysis" + "@value": "Coercion" } ] }, { - "@id": "_:N8c7d07a332384427aa20629b184e287b", + "@id": "_:Ncae32b67116f4739be7418755cf32050", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "IEC 31010:2019" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/72140.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#HumanErrors", + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#CompromiseAccount", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3429,7 +3598,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N175c7a502e7f4e91bae180a2093d115e" + "@id": "_:N2b8d3c26b0564a5aa45b8e322c1f789d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3445,13 +3614,22 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Human Errors" + "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3462,12 +3640,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Human Errors" + "@value": "Compromise Account" } ] }, { - "@id": "_:N175c7a502e7f4e91bae180a2093d115e", + "@id": "_:N2b8d3c26b0564a5aa45b8e322c1f789d", "@type": [ "https://schema.org/WebPage" ], @@ -3483,7 +3661,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L1", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -3502,7 +3680,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.44,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3518,13 +3696,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3535,16 +3713,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:4 L:1)" + "@value": "Moderate Risk (RM3x3 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -3557,6 +3735,11 @@ "@value": "2022-08-18" } ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3570,13 +3753,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Severity Levels from Very High to Very Low" + "@value": "Level where Likelihood is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3587,16 +3770,22 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Severity Levels" + "@value": "Extremely High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7", + "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3609,6 +3798,17 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7b4acd3bba614ee3a2824e835f2e662d" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3622,60 +3822,65 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" + "@value": "Something that acts as or causes Child Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 7x7" + "@value": "Violence against children" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ChildViolence\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#Incident", + "@id": "_:N7b4acd3bba614ee3a2824e835f2e662d", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - }, + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MonitorImpact", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/contributor": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/examples#E0070" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3683,14 +3888,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - }, - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -3699,42 +3896,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An actual or occured event" + "@value": "Control that monitors a Risk Impact" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" - }, - { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Incident is realised or materialised risk" + "@value": "Monitor Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L1", + "@id": "https://w3id.org/dpv/risk#7SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -3744,12 +3932,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3765,51 +3948,34 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" + "@value": "7 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#Payment", + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -3823,13 +3989,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides payment e.g. to access a service or purchase resources" + "@value": "Risks and issues that arise during operational processes" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -3840,16 +4006,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Payment" + "@value": "Operational Security Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L2", + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -3859,12 +4025,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.29,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3880,33 +4041,44 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:7 L:2)" + "@value": "7 Likelihood Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialPenalty", + "@id": "https://w3id.org/dpv/risk#IncidentConcluded", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#IncidentStatus" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -3921,33 +4093,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that involves or causes judicial penalties to be paid" + "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Judicial Penalty" + "@value": "Incident Concluded" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L7", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -3960,9 +4132,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.57,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nbef628fe676e4c9cba3d4a0a1f5c38f0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -3978,33 +4156,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Something that acts as or causes Unauthorised Code Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:4 L:7)" + "@value": "Unauthorised Code Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReduceLikelihood", + "@id": "_:Nbef628fe676e4c9cba3d4a0a1f5c38f0", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#incident-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MalwareAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -4014,7 +4217,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N04c587cd11ad4a1396432371d68b3776" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4030,86 +4244,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReductionControl" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood of an event" + "@value": "Something that acts as or causes Malware Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Likelihood" + "@value": "Malware Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L2", + "@id": "_:N04c587cd11ad4a1396432371d68b3776", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.24,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:2)" + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", + "@id": "https://w3id.org/dpv/risk#UnauthorisedReidentification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4117,13 +4299,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-19" } ], "http://purl.org/dc/terms/modified": [ @@ -4132,11 +4314,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N6622757ba5c74cc185fbe71d83337e6b" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -4152,12 +4329,6 @@ { "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -4165,7 +4336,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malicious Code Attack" + "@value": "Something that acts as or causes Unauthorised Re-Identification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4176,32 +4347,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malicious Code Attack" - } - ] - }, - { - "@id": "_:N6622757ba5c74cc185fbe71d83337e6b", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Unauthorised Re-Identification" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorRisk", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -4211,7 +4366,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4227,29 +4387,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Risk" + "@value": "Very Low Risk (RM5x5 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L6", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4268,7 +4428,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.86,xsd:decimal" + "@value": "0.36,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4284,13 +4444,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4301,26 +4461,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:6)" + "@value": "Moderate Risk (RM5x5 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ChangeConsequence", + "@id": "https://w3id.org/dpv/risk#GroupAttributionBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4336,29 +4502,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Consequence" + "@value": "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Consequence" + "@value": "Group Attribution Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L4", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4377,7 +4543,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.80,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4399,7 +4565,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4410,32 +4576,37 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:4)" + "@value": "High Risk (RM5x5 S:2 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Detriment", + "@id": "https://w3id.org/dpv/risk#risk-levels-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S6L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4451,43 +4622,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Detriment" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detriment" + "@value": "Very High Risk (RM7x7 S:6 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskManagement", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-12" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@language": "en", - "@value": "ISO 31073:2022 Risk management vocabulary" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4495,32 +4671,32 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Management" + "@value": "Very High Risk (RM7x7 S:4 L:6)" } ] }, @@ -4576,10 +4752,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentImpactAssessment", + "@id": "https://w3id.org/dpv/risk#ShareRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -4597,11 +4774,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#ImpactAssessment" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -4610,64 +4782,50 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#ImpactAssessment" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "An impact assessment associated with a incident" + "@value": "Risk Mitigation Measure that shares Risk e.g. amongst stakeholders" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Impact Assessment" + "@value": "Share Risk" } ] }, { - "@id": "https://w3id.org/dpv/primer", + "@id": "https://w3id.org/dpv/risk#StatisticalBias", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Primer for Data Privacy Vocabulary" + "@value": "Daniel Doherty" } ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/primer" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "http://purl.org/dc/terms/source": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@language": "en", + "@value": "ISO 20501:2019" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityBreach", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -4682,24 +4840,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, + "@id": "https://w3id.org/dpv/risk#DataBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@language": "en", + "@value": "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } - ] + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Statistical Bias" + } + ] }, { - "@id": "https://w3id.org/dpv/risk#Blackmail", + "@id": "https://w3id.org/dpv/risk#ChangeConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -4709,18 +4876,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N9366f8ffe19f4903ba26fd616cf61ec5" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4736,58 +4892,106 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ConsequenceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Blackmail" + "@value": "Control that changes Consequence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Blackmail" + "@value": "Change Consequence" } ] }, { - "@id": "_:N9366f8ffe19f4903ba26fd616cf61ec5", + "@id": "https://w3id.org/dpv/risk#RM3x3S2L3", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.67,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "High Risk (RM3x3 S:2 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UserRisks", + "@id": "https://w3id.org/dpv/risk#IncidentReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RecordsOfActivities" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -4796,33 +5000,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Concepts associated with risks that arise due to User or Human use" + "@value": "Documented information about an incident, its handling, assessments,and notifications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "User Risks" + "@value": "Incident Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateRisk", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -4832,12 +5036,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.5,xsd:decimal" + "@value": "0.10,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4853,51 +5057,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Very Low Risk (RM7x7 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IndividualHealthSafety", + "@id": "https://w3id.org/dpv/risk#Threat", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#RiskSource" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -4906,23 +5108,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#RiskSource" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risk source event which causes Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Health & Safety" + "@value": "Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", + "@id": "https://w3id.org/dpv/risk#IdentityTheft", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -4947,7 +5155,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nc1edbcb00b7d4eb2a3a0901453f81dd2" + "@id": "_:Nf35def6f3fcb44a2820a83d08bc67c28" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -4958,18 +5166,21 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Legal Obligations" + "@value": "Something that acts as or causes Identity Theft" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -4980,44 +5191,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Legal Obligations" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" + "@value": "Identity Theft" } ] }, { - "@id": "_:Nc1edbcb00b7d4eb2a3a0901453f81dd2", + "@id": "_:Nf35def6f3fcb44a2820a83d08bc67c28", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Threat Taxonomy 2016" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" } ] }, { - "@id": "https://w3id.org/dpv/risk#incident-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", + "@id": "https://w3id.org/dpv/risk#HighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -5027,18 +5226,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N84cbe552be064fab92740d469954da17" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5049,60 +5242,50 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Statutory Obligations" + "@value": "Level where Risk is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violation of Statutory Obligations" + "@value": "High Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N84cbe552be064fab92740d469954da17", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L1", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5115,9 +5298,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.14,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6d8138abcff943f68df0ab565a04a650" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5133,33 +5322,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" + "@value": "Something that acts as or causes Unauthorised Data Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:7 L:1)" + "@value": "Unauthorised Data Access" } ] }, { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels", + "@id": "_:N6d8138abcff943f68df0ab565a04a650", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IdentityFraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5169,7 +5377,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N27e59086791f4c86980cec9fada4a055" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5185,39 +5404,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Severity" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Severity Levels from High to Low" + "@value": "Something that acts as or causes Identity Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Severity Levels" + "@value": "Identity Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes", + "@id": "_:N27e59086791f4c86980cec9fada4a055", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Taxonomy 2016" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L6", + "@id": "https://w3id.org/dpv/risk#RemoveConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -5227,12 +5459,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.12,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5248,53 +5475,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConsequenceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low" + "@value": "Control that removes Consequence i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:6)" + "@value": "Remove Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L5", + "@id": "https://w3id.org/dpv/risk#EnvironmentalIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.41,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -5305,33 +5526,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Incident caused due to environmental factors outside human controls" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:5)" + "@value": "Environmental Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L7", + "@id": "https://w3id.org/dpv/risk#5RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -5341,12 +5562,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.29,xsd:decimal" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5362,29 +5578,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely High; and Risk Level: Moderate" + "@value": "Scale with 5 Risk Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:7)" + "@value": "5 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", + "@id": "https://w3id.org/dpv/risk#PhysicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5403,16 +5619,7 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Component Malfunction" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5423,22 +5630,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" + "@value": "Physical Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighSeverity", + "@id": "https://w3id.org/dpv/risk#IncidentNearMiss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -5448,12 +5649,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.99,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5469,39 +5665,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely High" + "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Incident Near Miss" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L3", + "@id": "https://w3id.org/dpv/risk#LoseGoodwill", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5514,9 +5704,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.12,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N20794ebbd2e449b2942f8e678d291698" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5532,54 +5728,65 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Something that acts as or causes Loss of Goodwill" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:3)" + "@value": "Lose of Goodwill" } ] }, { - "@id": "https://w3id.org/dpv/risk#core-properties", + "@id": "_:N20794ebbd2e449b2942f8e678d291698", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L5", + "@id": "https://w3id.org/dpv/risk#ConfirmationBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.31,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5595,49 +5802,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" + "@value": "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:5)" + "@value": "Confirmation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowSeverity", + "@id": "https://w3id.org/dpv/risk#SocietalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -5652,66 +5843,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Extremely Low" + "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/json-ld11/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/application/ld+json" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - JSON-LD serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Societal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorVulnerabilities", + "@id": "https://w3id.org/dpv/risk#ReduceLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5741,13 +5895,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#ReductionControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Vulnerability" + "@value": "Control that reduces the likelihood of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5758,16 +5912,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Vulnerabilities" + "@value": "Reduce Likelihood" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L4", + "@id": "https://w3id.org/dpv/risk#ExtremelyLowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -5777,12 +5931,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.48,xsd:decimal" + "@value": "0.01,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5798,29 +5952,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + "@value": "Level where Risk is Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:3 L:4)" + "@value": "Extremely Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L4", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -5839,7 +5999,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.32,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5855,13 +6015,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -5872,15 +6032,21 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:4)" + "@value": "High Risk (RM3x3 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentReport", + "@id": "https://w3id.org/dpv/risk#MonitorRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { @@ -5893,11 +6059,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RecordsOfActivities" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -5906,33 +6067,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Documented information about an incident, its handling, assessments,and notifications" + "@value": "Control that monitors a Risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Report" + "@value": "Monitor Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L7", + "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -5945,9 +6106,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.86,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N62b691f43380412c8a12872ca763719c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -5963,74 +6130,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Erroneous System Use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:7)" + "@value": "Erroneous System Use" } ] }, { - "@id": "https://w3id.org/dpv/risk#JudicialCosts", + "@id": "_:N62b691f43380412c8a12872ca763719c", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that involves or causes judicial costs to be paid" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Judicial Costs" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveSource", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -6040,7 +6182,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6056,33 +6203,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes the risk source" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Source" + "@value": "Low Risk (RM5x5 S:1 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#IncidentSuspected", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -6092,7 +6239,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6108,53 +6255,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Likelihood Levels from High to Low" + "@value": "The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Likelihood Levels" + "@value": "Incident Suspected" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L1", + "@id": "https://w3id.org/dpv/risk#IncidentNotice", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.02,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#Notice" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6165,60 +6306,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#Notice" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Notice associated with an Incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl", - "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/turtle/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/turtle" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - Turtle serialiation" - } - ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ - { - "@id": "https://w3id.org/dpv/risk/risk.ttl" - } - ], - "http://www.w3.org/ns/dx/prof/hasRole": [ - { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "Incident Notice" } ] }, { - "@id": "https://w3id.org/dpv/risk#Scam", + "@id": "https://w3id.org/dpv/risk#ViolatingContractualObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6243,7 +6353,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ned9bbb8f8f3644bc86e6dad333a72f19" + "@id": "_:Nd579b76a185748d39a9c8fd295a32c6b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6254,21 +6364,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Scam" + "@value": "Something that acts as or causes Violation of Contractual Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6279,12 +6386,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Scam" + "@value": "Violation of Contractual Obligation" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationContractualObligations\" in DPV 2.0" } ] }, { - "@id": "_:Ned9bbb8f8f3644bc86e6dad333a72f19", + "@id": "_:Nd579b76a185748d39a9c8fd295a32c6b", "@type": [ "https://schema.org/WebPage" ], @@ -6300,11 +6413,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#DataBreach", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -6317,23 +6430,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N2cc7410ebfac4616a57622b7f5c57fba" - } - ], - "http://purl.org/vocab/vann/example": [ - { - "@id": "https://w3id.org/dpv/examples#E0069" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples#E0071" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6349,58 +6448,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#SecurityBreach" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Data Breach" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Breach" - } - ] - }, - { - "@id": "_:N2cc7410ebfac4616a57622b7f5c57fba", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM3x3 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L2", + "@id": "https://w3id.org/dpv/risk#Spoofing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6413,9 +6487,18 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.08,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N0050e9c8fb8e444391c01a99db38961a" + }, + { + "@id": "_:N2cdfbe07952b4ea9847ac6e4cc259d4e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6431,33 +6514,74 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" + "@value": "Something that acts as or causes Spoofing" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" + "@value": "Spoofing" } ] }, { - "@id": "https://w3id.org/dpv/risk#3RiskLevels", + "@id": "_:N0050e9c8fb8e444391c01a99db38961a", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "_:N2cdfbe07952b4ea9847ac6e4cc259d4e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LoseOpportunity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -6467,7 +6591,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nc55af031139a488e867f0d2fc7f4752c" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6483,29 +6618,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 3 Risk Levels from High to Low" + "@value": "Something that acts as or causes Loss of Opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "3 Risk Levels" + "@value": "Lose of Opportunity" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskAssessment", + "@id": "_:Nc55af031139a488e867f0d2fc7f4752c", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RiskManagement", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -6513,7 +6664,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-06-12" } ], "http://purl.org/dc/terms/source": [ @@ -6529,7 +6680,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#RiskManagement" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -6538,15 +6689,10 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskManagement" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Assessment of risk involving its identification, analysis, and evaluation" + "@value": "Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6557,16 +6703,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Assessment" + "@value": "Risk Management" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDataDeletion", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -6579,15 +6725,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N4ad558cee41543b9a32f4383ffa13ff1" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6603,60 +6743,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Data Deletion" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Data Deletion" + "@value": "Extremely Low Risk (RM7x7 S:4 L:1)" } ] }, { - "@id": "_:N4ad558cee41543b9a32f4383ffa13ff1", + "@id": "https://w3id.org/dpv/risk#IncidentStatus", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#DetectionControl", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/vocab/vann/example": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@id": "https://w3id.org/dpv/examples#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6664,6 +6791,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#Status" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -6672,29 +6804,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv#Status" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to detect event" + "@value": "Status associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Detection Control" + "@value": "Incident Status" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L1", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6713,7 +6845,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.48,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6735,7 +6867,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6746,12 +6878,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:2 L:1)" + "@value": "High Risk (RM5x5 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", + "@id": "https://w3id.org/dpv/risk#EquipmentMalfunction", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -6776,7 +6908,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0047c87eef06445d9cdf9d7d8ebfd324" + "@id": "_:N95637668b675461d9d1c70e1c8be8586" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6792,16 +6924,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Disclosure" + "@value": "Something that acts as or causes Equipment Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -6812,12 +6944,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Disclosure" + "@value": "Equipment Malfunction" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here equipment refers to physical equipment" } ] }, { - "@id": "_:N0047c87eef06445d9cdf9d7d8ebfd324", + "@id": "_:N95637668b675461d9d1c70e1c8be8586", "@type": [ "https://schema.org/WebPage" ], @@ -6833,26 +6971,33 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L4", + "@id": "https://w3id.org/dpv/risk#Fee", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.49,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "DGA 2.10" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6863,42 +7008,42 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Something that acts as or provides fees e.g. for using a service" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:4)" + "@value": "Fee" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighSeverity", + "@id": "https://w3id.org/dpv/risk#RightsViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ @@ -6907,9 +7052,10 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.75,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -6925,257 +7071,235 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is High" + "@value": "Something that acts as or causes Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Severity" + "@value": "Violation of Rights" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "This concept was called \"ViolationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L7", "@type": [ - "http://www.w3.org/2002/07/owl#Ontology", - "http://www.w3.org/ns/dx/prof/Profile" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/bibliographicCitation": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@value": "http://www.w3.org/2000/01/rdf-schema" - }, + "http://purl.org/dc/terms/created": [ { - "@value": "http://www.w3.org/2004/02/skos/core" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Julio Fernandez" - }, - { - "@value": "Delaram Golpayegani" - }, - { - "@value": "Beatriz Esteves" - }, - { - "@value": "Harshvardhan J. Pandit" - }, - { - "@value": "Rob Brennan" - }, - { - "@value": "Fajar Ekaputra" - }, - { - "@value": "Axel Polleres" - }, + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "Julian Flake" - }, + "@value": "0.14,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "Georg P. Krog" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "accepted" } ], - "http://purl.org/dc/terms/creator": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@language": "en", - "@value": "Harshvardhan J. Pandit" - }, + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Georg P. Krog" - }, + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@language": "en", - "@value": "Paul Ryan" - }, + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Rob Brennan" - }, + "@value": "Low Risk (RM7x7 S:1 L:7)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AccidentalIncident", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "Delaram Golpayegani" - }, + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@language": "en", - "@value": "Beatriz Esteves" - }, + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@language": "en", - "@value": "Julian Flake" + "@id": "https://w3id.org/dpv/risk#Incident" } ], - "http://purl.org/dc/terms/description": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + "@value": "accepted" } ], - "http://purl.org/dc/terms/identifier": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "https://w3id.org/dpv/risk" + "@id": "https://w3id.org/dpv/risk#Incident" } ], - "http://purl.org/dc/terms/issued": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "2022-08-14" + "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" } ], - "http://purl.org/dc/terms/license": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://www.w3.org/copyright/document-license-2023/" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "2024-08-18" + "@value": "Accidental Incident" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SystemMalfunction", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/terms/publisher": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://www.w3.org/" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://www.w3.org/groups/cg/dpvcg/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/title": [ + "http://purl.org/dc/terms/modified": [ { - "@language": "en", - "@value": "Risk Concepts" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://purl.org/ontology/bibo/doi": [ + "http://purl.org/dc/terms/source": [ { - "@value": "10.5281/zenodo.12505841" + "@id": "_:N012ac588a7e54adeb3318a3bcf249184" } ], - "http://purl.org/ontology/bibo/status": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "http://purl.org/ontology/bibo/status/published" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "risk" + "@language": "en", + "@value": "accepted" } ], - "http://purl.org/vocab/vann/preferredNamespaceUri": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@value": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], - "http://www.w3.org/2000/01/rdf-schema#Label": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "RISK" + "@value": "Something that acts as or causes System Malfunction" } ], - "http://www.w3.org/2002/07/owl#versionIRI": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/2.1-dev/risk" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], - "http://www.w3.org/2002/07/owl#versionInfo": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "2.1-dev" + "@language": "en", + "@value": "System Malfunction" } ], - "http://www.w3.org/ns/dx/prof/hasResource": [ - { - "@id": "https://w3id.org/dpv/primer" - }, - { - "@id": "https://w3id.org/dpv/guides" - }, + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/examples" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-html" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-rdf" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-ttl" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-n3" - }, - { - "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" - } - ], - "http://www.w3.org/ns/dx/prof/isProfileOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#" - }, - { - "@id": "http://www.w3.org/2004/02/skos/core#" - }, - { - "@id": "https://w3id.org/dpv" + "@language": "en", + "@value": "Here system refers to both hardware and software systems" } + ] + }, + { + "@id": "_:N012ac588a7e54adeb3318a3bcf249184", + "@type": [ + "https://schema.org/WebPage" ], - "http://xmlns.com/foaf/0.1/logo": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/media/logo.png" + "@value": "ISO/IEC 27005:2018" } ], - "https://schema.org/version": [ + "https://schema.org/url": [ { - "@value": "2.1-dev" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccount", + "@id": "https://w3id.org/dpv/risk#AvoidSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -7185,18 +7309,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N1b737c42d90a432cad3eff4cc5cb68da" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7212,74 +7325,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes a compromised account that is then used by the compromiser" + "@value": "Control that avoids the risk source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account" - } - ] - }, - { - "@id": "_:N1b737c42d90a432cad3eff4cc5cb68da", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Avoid Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#Benefit", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-23" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7295,42 +7382,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes benefits" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Benefit" + "@value": "Very Low Risk (RM5x5 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskControl", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples#E0071" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7338,11 +7431,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -7351,38 +7439,54 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskMitigationMeasure" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that modifies risk" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Control" + "@value": "Moderate Risk (RM7x7 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ContainmentControl", + "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N122614f9d61546d49ba0e04b92558751" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7398,54 +7502,65 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to contain event" + "@value": "Something that acts as or causes Loss of Customer Confidence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Containment Control" + "@value": "Lose of Customer Confidence" } ] }, { - "@id": "https://w3id.org/dpv/risk#incident-status-classes", + "@id": "_:N122614f9d61546d49ba0e04b92558751", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L5", + "@id": "https://w3id.org/dpv/risk#CognitiveBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.60,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7461,29 +7576,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#Bias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" + "@value": "Bias that occurs when humans are processing and interpreting information" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:3 L:5)" + "@value": "Cognitive Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L7", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7502,7 +7617,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.43,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7518,13 +7633,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7535,12 +7650,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:3 L:7)" + "@value": "Very High Risk (RM5x5 S:4 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L6", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7559,7 +7674,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.51,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7581,7 +7696,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7592,31 +7707,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:2 L:6)" + "@value": "Very High Risk (RM7x7 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L3", + "@id": "https://w3id.org/dpv/risk#SelectionBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.43,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7632,47 +7748,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#StatisticalBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" + "@value": "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:7 L:3)" + "@value": "Selection Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasThreatSource", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L6", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "Harshvardhan J. Pandit" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#ThreatSource" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7686,87 +7803,35 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) has the indicated source (object)" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has threat source" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Threat" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#ThreatSource" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RecoveryControl", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskControl" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Control to recover from event" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Recovery Control" + "@value": "High Risk (RM7x7 S:3 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#BruteForceAuthorisations", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -7776,18 +7841,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N27a5c73a4a0b4a5f83c54631af64cfa4" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7803,55 +7862,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques" + "@value": "Level where Risk is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Brute Force Authorisations" - } - ] - }, - { - "@id": "_:N27a5c73a4a0b4a5f83c54631af64cfa4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "Extremely High Risk" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -7864,15 +7907,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Necd21215d3724524b55f6804c7b1ff4e" + "@value": "0.18,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7888,48 +7925,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Account Credentials to be compromised" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compromise Account Credentials" - } - ] - }, - { - "@id": "_:Necd21215d3724524b55f6804c7b1ff4e", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Low Risk (RM7x7 S:3 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L3", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -7948,7 +7966,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.40,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -7970,7 +7988,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -7981,26 +7999,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:2 L:3)" + "@value": "High Risk (RM5x5 S:5 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5", + "@id": "https://w3id.org/dpv/risk#Detriment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-23" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8016,29 +8040,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + "@value": "Something that acts as or causes Detriment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 5x5" + "@value": "Detriment" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityTheft", + "@id": "https://w3id.org/dpv/risk#LoseNegotiatingCapacity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8063,7 +8087,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N54d655554a614ff6add6877cf0d8972e" + "@id": "_:N656bab82b34a40c7be08764bd11edd1d" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8079,16 +8103,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Theft" + "@value": "Something that acts as or causes Loss of Negotiating Capacity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8099,32 +8120,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Theft" + "@value": "Lose of Negotiating Capacity" } ] }, { - "@id": "_:N54d655554a614ff6add6877cf0d8972e", + "@id": "_:N656bab82b34a40c7be08764bd11edd1d", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#MaterialDamage", + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -8134,13 +8155,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8156,39 +8171,50 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Material Damage" + "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Material Damage" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "Risk Matrix 3x3" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk", + "@id": "https://w3id.org/dpv/risk#RuleBasedSystemDesign", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -8203,54 +8229,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect the reputation of the organisation" + "@value": "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reputational Risk" + "@value": "Rule-Based System Design" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Rule based system design also potentially introduces various forms of human cognitive bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", + "@id": "https://w3id.org/dpv/risk#hasRiskSource", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv#Risk" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ncc2da5ee1cff4c0eb963b9cb65d28234" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8264,57 +8289,40 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Access" + "@value": "Indicates the risk (subject) has the indicated risk source (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Access" + "@value": "has risk source" } - ] - }, - { - "@id": "_:Ncc2da5ee1cff4c0eb963b9cb65d28234", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "https://schema.org/domainIncludes": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@id": "https://w3id.org/dpv#Risk" } ], - "https://schema.org/url": [ + "https://schema.org/rangeIncludes": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@id": "https://w3id.org/dpv/risk#RiskSource" } ] }, { - "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -8327,15 +8335,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N913a7208f24c44bda9e7b088de9284a6" + "@value": "0.04,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8351,49 +8353,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Personal Safety Endangerment" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Personal Safety Endangerment" + "@value": "Extremely Low Risk (RM7x7 S:1 L:2)" } ] }, { - "@id": "_:N913a7208f24c44bda9e7b088de9284a6", + "@id": "https://w3id.org/dpv/risk#ReductionControl", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -8408,33 +8400,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Control that reduces the likelihood or severity of an event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Misuse" + "@value": "Reduction Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", + "@id": "https://w3id.org/dpv/risk#ModerateSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -8444,13 +8436,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.5,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8466,39 +8457,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Non-Material Damage" + "@value": "Level where Severity is Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Non-Material Damage" + "@value": "Moderate Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", + "@id": "https://w3id.org/dpv/risk#ImpactControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -8508,19 +8505,49 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Risk Mitigation Measure that controls Impacts" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@id": "_:N5c7b07cae062490cae46d699caf36ed7" + "@language": "en", + "@value": "Impact Control" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ComponentMalfunction", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -8538,13 +8565,13 @@ "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" + "@value": "Something that acts as or causes Component Malfunction" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8555,28 +8582,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Distributed Denial of Service Attack (DDoS)" - } - ] - }, - { - "@id": "_:N5c7b07cae062490cae46d699caf36ed7", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Component Malfunction" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L5", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8595,7 +8612,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.99,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8617,7 +8634,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8628,12 +8645,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:5 L:5)" + "@value": "Very Low Risk (RM5x5 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Harm", + "@id": "https://w3id.org/dpv/risk#ViolatingEthicsCode", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8647,7 +8664,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-13" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -8656,6 +8673,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N793f312abfaf4de08ee115cf262f3de4" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -8664,18 +8686,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harm to humans" + "@value": "Something that acts as or causes Violation of Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8686,18 +8708,34 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Harm" + "@value": "Violating Ethics Code" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "This concept refers to the general abstract notion of harm" + "@value": "This concept was called \"ViolationEthicalCode\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L1", + "@id": "_:N793f312abfaf4de08ee115cf262f3de4", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S6L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8716,7 +8754,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.86,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8738,7 +8776,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8749,16 +8787,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" + "@value": "Extremely High Risk (RM7x7 S:6 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L2", + "@id": "https://w3id.org/dpv/risk#PsychologicalHarm", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -8771,9 +8809,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.24,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Ncd20b2bc13904da294945c80012f45d5" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8789,49 +8833,64 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Psychological Harm" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:6 L:2)" + "@value": "Psychological Harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsExercisePrevention", + "@id": "_:Ncd20b2bc13904da294945c80012f45d5", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM5x5S5L1", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.20,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8847,49 +8906,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Prevent Exercising of Rights" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Prevent Exercising of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"PreventExercisingOfRights\" in DPV 2.0" + "@value": "Low Risk (RM5x5 S:5 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#7RiskLevels", + "@id": "https://w3id.org/dpv/risk#hasIncident", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8903,31 +8955,31 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskLevel" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" + "@value": "Indicates an incident is associated with the specified context" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Risk Levels" + "@value": "has incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L5", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -8946,7 +8998,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.51,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -8962,13 +9014,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -8979,16 +9031,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:5 L:5)" + "@value": "Low Risk (RM5x5 S:4 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemMalfunction", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -9001,15 +9053,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nf6cd2565fc384042b628c5975a2b07c1" + "@value": "0.64,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9025,58 +9071,85 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Malfunction" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Malfunction" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Here system refers to both hardware and software systems" + "@value": "Very High Risk (RM5x5 S:4 L:4)" } ] }, { - "@id": "_:Nf6cd2565fc384042b628c5975a2b07c1", + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "A Risk Matrix with 5 Likelihood, 5 Severity, and 5 Risk Level types" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Risk Matrix 5x5" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveImpact", + "@id": "https://w3id.org/dpv/risk#PhishingScam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -9086,7 +9159,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N2efc2f4438a54dda98fe4b524a7e2ec9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9102,60 +9186,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ImpactControl" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Impact i.e. prevents it from materialising" + "@value": "Something that acts as or causes Phishing Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Impact" + "@value": "Phishing Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk#serialisation-n3", + "@id": "_:N2efc2f4438a54dda98fe4b524a7e2ec9", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TeamSubmission/n3/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/n3" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Risk Concepts - N3 serialiation" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk/risk.n3" + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9174,7 +9246,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.57,xsd:decimal" + "@value": "0.02,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9196,7 +9268,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9207,12 +9279,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:7 L:4)" + "@value": "Extremely Low Risk (RM7x7 S:1 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseReputation", + "@id": "https://w3id.org/dpv/risk#PersonalSafetyEndangerment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9237,7 +9309,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Naab93be2fe814b5494d7706349d86ffa" + "@id": "_:N1c8ddcb560fa424ca1fe76db29a31820" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9253,13 +9325,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Reputation" + "@value": "Something that acts as or causes Personal Safety Endangerment" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9270,12 +9342,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Reputation" + "@value": "Personal Safety Endangerment" } ] }, { - "@id": "_:Naab93be2fe814b5494d7706349d86ffa", + "@id": "_:N1c8ddcb560fa424ca1fe76db29a31820", "@type": [ "https://schema.org/WebPage" ], @@ -9291,25 +9363,31 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#CrossBorderIncident", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.86,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -9320,29 +9398,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident involving cross-border or multiple jurisdictions" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cross-Border Incident" + "@value": "Extremely High Risk (RM7x7 S:7 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reidentification", + "@id": "https://w3id.org/dpv/risk#DataBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9356,7 +9434,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -9365,70 +9443,17 @@ "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "accepted" + "@id": "_:Nab5c54b7fa1f4b298dba1eea5aac93db" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/vocab/vann/example": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + "@id": "https://w3id.org/dpv/examples#E0069" }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Re-identification" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Re-identification" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L1", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" + "@id": "https://w3id.org/dpv/examples#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9444,153 +9469,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Low Risk (RM5x5 S:5 L:1)" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { - "@id": "https://w3id.org/dpv#RiskLevel" + "@id": "https://w3id.org/dpv/risk#SecurityBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Risk Levels from Very High to Very Low" + "@value": "Something that acts as or causes Data Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Risk Levels" + "@value": "Data Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels", + "@id": "_:Nab5c54b7fa1f4b298dba1eea5aac93db", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Scale with 7 Severity Levels from Extremely High to Extremely Low" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "7 Severity Levels" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#Discrimination", + "@id": "https://w3id.org/dpv/risk#ConsequenceControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9606,29 +9546,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Discrimination" + "@value": "Risk Mitigation Measure that controls the Consequences" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Discrimination" + "@value": "Consequence Control" } ] }, { - "@id": "https://w3id.org/dpv/guides", + "@id": "https://w3id.org/dpv/primer", "@type": [ "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], @@ -9644,12 +9584,12 @@ ], "http://purl.org/dc/terms/title": [ { - "@value": "Guides for Data Privacy Vocabulary" + "@value": "Primer for Data Privacy Vocabulary" } ], "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/guides" + "@id": "https://w3id.org/dpv/primer" } ], "http://www.w3.org/ns/dx/prof/hasRole": [ @@ -9659,7 +9599,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#LoseTrust", + "@id": "https://w3id.org/dpv/risk#ViolatingLegalObligation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9684,7 +9624,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N7f82aff987014e1ea5c58f22175420d4" + "@id": "_:N2272c3af1d7c4f35878b97cbb8cca1c6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9695,18 +9635,18 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Trust" + "@value": "Something that acts as or causes Violation of Legal Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9717,12 +9657,18 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Trust" + "@value": "Violation of Legal Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationRegulatoryObligations\" in DPV 2.0" } ] }, { - "@id": "_:N7f82aff987014e1ea5c58f22175420d4", + "@id": "_:N2272c3af1d7c4f35878b97cbb8cca1c6", "@type": [ "https://schema.org/WebPage" ], @@ -9738,7 +9684,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", + "@id": "https://w3id.org/dpv/risk#HumanErrors", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -9763,7 +9709,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N120896e83e7a494baca35f01fd1497ac" + "@id": "_:N1a900148ee964d84bdb0f1dbecd9c525" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9779,19 +9725,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Access" + "@value": "Something that acts as or causes Human Errors" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9802,32 +9742,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Access" + "@value": "Human Errors" } ] }, { - "@id": "_:N120896e83e7a494baca35f01fd1497ac", + "@id": "_:N1a900148ee964d84bdb0f1dbecd9c525", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentHalted", + "@id": "https://w3id.org/dpv/risk#7RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -9837,7 +9777,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9853,48 +9793,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" + "@value": "Scale with 7 Risk Levels from Extremely High to Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Halted" + "@value": "7 Risk Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L3", + "@id": "https://w3id.org/dpv/risk#refersToRisk", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv#Incident" + } + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv#Risk" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/vocab/vann/example": [ { - "@value": "0.31,xsd:decimal" + "@id": "https://w3id.org/dpv/examples#E0069" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -9908,36 +9852,63 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:5 L:3)" + "@value": "refers to risk" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv#Incident" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv#Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", + "@id": "https://w3id.org/dpv/risk#DenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N8894f1e1a7aa41ba9422beb0723f99a2" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -9951,13 +9922,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" + "@value": "Something that acts as or causes Denial of Service Attack (DoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -9968,16 +9942,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Policy" + "@value": "Denial of Service Attack (DoS)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L5", + "@id": "_:N8894f1e1a7aa41ba9422beb0723f99a2", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -9990,9 +9980,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.20,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N9f3682987581455e985c74cb431bb163" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10008,59 +10004,69 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low" + "@value": "Something that acts as or causes Illegal Processing of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:5)" + "@value": "Illegal Data Processing" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", + "@id": "_:N9f3682987581455e985c74cb431bb163", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentHandlingReport", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:N91650f68341a48cb89b35d3cc20bba11" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10071,48 +10077,60 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Disclosure" + "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Disclosure" + "@value": "Incident Handling Report" } ] }, { - "@id": "_:N91650f68341a48cb89b35d3cc20bba11", + "@id": "https://w3id.org/dpv/examples", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Examples for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/examples" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" } ] }, { - "@id": "https://w3id.org/dpv/risk#AvailabilityIncident", + "@id": "https://w3id.org/dpv/risk#IncidentPreliminaryReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -10130,7 +10148,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10141,13 +10159,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the availability of information or system has been affected" + "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10158,16 +10176,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Availability Incident" + "@value": "Incident Preliminary Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#ImpactControl", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -10177,7 +10195,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.41,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10193,33 +10216,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls Impacts" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact Control" + "@value": "High Risk (RM7x7 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L3", + "@id": "https://w3id.org/dpv/risk#VeryHighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -10229,12 +10252,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.06,xsd:decimal" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10250,29 +10273,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low" + "@value": "Level where Likelihood is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk (RM7x7 S:1 L:3)" + "@value": "Very High Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhishingScam", + "@id": "https://w3id.org/dpv/risk#MaliciousCodeAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10297,7 +10329,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncf23547c9a484637bcc93168e91c5691" + "@id": "_:N6526b82722164e0ba82d77115e7cee0f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10315,6 +10347,12 @@ { "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -10322,7 +10360,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Phishing Scam" + "@value": "Something that acts as or causes Malicious Code Attack" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10333,32 +10371,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Phishing Scam" + "@value": "Malicious Code Attack" } ] }, { - "@id": "_:Ncf23547c9a484637bcc93168e91c5691", + "@id": "_:N6526b82722164e0ba82d77115e7cee0f", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L4", + "@id": "https://w3id.org/dpv/risk#ExtremelyHighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -10368,12 +10406,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.41,xsd:decimal" + "@value": "0.99,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10389,33 +10427,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Level where Severity is Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:5 L:4)" + "@value": "Extremely High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCredibility", + "@id": "https://w3id.org/dpv/risk#RiskMatrix", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAssessment" ], "http://purl.org/dc/terms/contributor": [ { @@ -10425,18 +10469,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-02-14" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N64ad592beac14296a8c1a10b74e6b130" + "@id": "_:N07141469efbe4cf08bef9803f87f84f2" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10452,63 +10490,75 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#RiskAssessment" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Credibility" + "@value": "Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other." } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Credibility" + "@value": "Risk Matrix" } ] }, { - "@id": "_:N64ad592beac14296a8c1a10b74e6b130", + "@id": "_:N07141469efbe4cf08bef9803f87f84f2", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "IEC 31010:2019" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.iso.org/standard/72140.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityIncident", + "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "_:N942a7e9ba5ea4c138c2a2501ac4c3868" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10519,48 +10569,56 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident where the confidentiality of information or system has been affected" + "@value": "Something that acts as or causes Unwanted Disclosure of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Incident" + "@value": "Unwanted Disclosure of Data" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L5", + "@id": "_:N942a7e9ba5ea4c138c2a2501ac4c3868", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://schema.org/WebPage" ], - "http://purl.org/dc/terms/contributor": [ + "https://schema.org/name": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "ISO/IEC 27005:2018" } ], - "http://purl.org/dc/terms/created": [ + "https://schema.org/url": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityIncident", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.80,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10568,6 +10626,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -10576,53 +10639,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High" + "@value": "Incident where the availability of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM5x5 S:4 L:5)" + "@value": "Availability Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateLikelihood", + "@id": "https://w3id.org/dpv/risk#IncidentSuspectedReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.5,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -10633,41 +10690,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Moderate" + "@value": "A report describing the suspicion of an incident in the past or occuring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Incident Suspected Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#Misuse", + "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10675,13 +10720,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Delaram Golpayegani" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-06-11" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -10690,6 +10735,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N39150275e13e448ba6b444f5156835f5" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -10703,13 +10753,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#DataBreach" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Misuse" + "@value": "Something that acts as or causes Confidentiality Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10720,17 +10773,50 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Misuse" + "@value": "Confidentiality Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", + "@id": "_:N39150275e13e448ba6b444f5156835f5", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Georg P. Krog" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -10744,22 +10830,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Activity" + "@value": "Something that acts as or causes Social Disadvantage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10770,12 +10847,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Activity" + "@value": "Social Disadvantage" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L1", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10794,7 +10871,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.04,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10810,13 +10887,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10827,12 +10904,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:1)" + "@value": "Extremely High Risk (RM7x7 S:5 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L4", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -10851,7 +10928,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10873,7 +10950,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -10884,66 +10961,37 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:3 L:4)" + "@value": "Low Risk (RM7x7 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Privacy", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "accepted" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Privacy" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L3", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/modified": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-08-16" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.18,xsd:decimal" + "@id": "_:N66f90f2dfdfb46e087830f6c7a2c3ad0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -10959,84 +11007,77 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "Something that acts as or causes Unauthorised System Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:3 L:3)" + "@value": "Unauthorised System Access" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentDetectionReport", + "@id": "_:N66f90f2dfdfb46e087830f6c7a2c3ad0", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "accepted" + "@value": "https://www.iso.org/standard/75281.html" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/created": [ { - "@language": "en", - "@value": "A report describing the detection of a Incident" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/source": [ { - "@language": "en", - "@value": "Incident Detection Report" + "@id": "_:N6dc4efe43a844bbe94810084460a3ca2" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -11051,13 +11092,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Something that acts as or causes Unauthorised Information Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11068,71 +11112,47 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intentional Misuse" + "@value": "Unauthorised Information Disclosure" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocietalRisk", + "@id": "_:N6dc4efe43a844bbe94810084460a3ca2", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect society at large or specific groups in society" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Societal Risk" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasControl", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L5", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/examples#E0071" + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11146,49 +11166,55 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the use of specified control" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has control" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@value": "High Risk (RM7x7 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentConcludingReport", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.24,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11199,33 +11225,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluding Report" + "@value": "Moderate Risk (RM5x5 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighRisk", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -11235,12 +11261,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.9,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11256,38 +11282,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Very High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Very Low Risk (RM5x5 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialImpact", + "@id": "https://w3id.org/dpv/risk#JudicialPenalty", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11306,13 +11323,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Things that cause or have the potential to impact financial resources" + "@value": "Something that involves or causes judicial penalties to be paid" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11323,16 +11340,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Financial Impact" + "@value": "Judicial Penalty" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S2L2", + "@id": "https://w3id.org/dpv/risk#IncidentHalted", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -11342,15 +11359,10 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.16,xsd:decimal" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } @@ -11363,32 +11375,55 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + "@value": "The incident has halted or paused with a high likelihood of resuming or recurring" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:2 L:2)" + "@value": "Incident Halted" } ] }, { - "@id": "https://w3id.org/dpv/risk#IndividualRisk", + "@id": "https://w3id.org/dpv/risk#SexualViolence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Na5624c595653415e824cac1cae35b841" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -11401,10 +11436,15 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that affect or have the potential to affect specific individuals" + "@value": "Something that acts as or causes Sexual Violence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11415,30 +11455,53 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Individual Risk" + "@value": "Sexual Violence" } ] }, { - "@id": "https://w3id.org/dpv/risk#ThreatSource", + "@id": "_:Na5624c595653415e824cac1cae35b841", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#InformativenessBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-09-13" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -11447,34 +11510,45 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#EngineeringDecisionBias" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Source of threat event, including both agent and non-agent sources" + "@value": "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat Source" + "@value": "Informativeness Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#Vulnerability", + "@id": "https://w3id.org/dpv/risk#MonitorConsequence", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11482,41 +11556,41 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#MonitorControl" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + "@value": "Control that monitors a Risk Consequence" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Vulnerability" + "@value": "Monitor Consequence" } ] }, { - "@id": "https://w3id.org/dpv/risk#Cryptojacking", + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -11526,18 +11600,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ncf0b963177f841d1b3face4fc3ba47e1" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11553,52 +11616,64 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv#Likelihood" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Cryptojacking" + "@value": "Scale with 3 Likelihood Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Cryptojacking" + "@value": "3 Likelihood Levels" } ] }, { - "@id": "_:Ncf0b963177f841d1b3face4fc3ba47e1", + "@id": "https://w3id.org/dpv/risk#serialisation-html", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "ENISA Threat Landscape 2021" + "@id": "https://www.w3.org/TR/html/" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/format": [ { - "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - HTML serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.html" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/specification" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentOngoing", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -11608,7 +11683,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11624,54 +11704,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident is ongoing i.e. still active" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing" + "@value": "Very High Risk (RM7x7 S:7 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseOpportunity", + "@id": "https://w3id.org/dpv/risk#RemedyControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N27dce26f51994fea8988e93027e5ddfd" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11687,45 +11751,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Opportunity" + "@value": "Control to remedy consequences of event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Opportunity" - } - ] - }, - { - "@id": "_:N27dce26f51994fea8988e93027e5ddfd", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Remedy Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#IllegalDataProcessing", + "@id": "https://w3id.org/dpv/risk#Misuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11733,13 +11781,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Delaram Golpayegani" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-06-11" } ], "http://purl.org/dc/terms/modified": [ @@ -11748,11 +11796,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Na0b38a74d16144e59f544ac1d985df89" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -11766,13 +11809,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Illegal Processing of Data" + "@value": "Something that acts as or causes Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11783,20 +11826,80 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Illegal Data Processing" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"IllegalProcessingData\" in DPV 2.0" + "@value": "Misuse" } ] }, { - "@id": "_:Na0b38a74d16144e59f544ac1d985df89", + "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N23726cdea0d14630a4ffe4716dcd4526" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised Resource Use" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Resource Use" + } + ] + }, + { + "@id": "_:N23726cdea0d14630a4ffe4716dcd4526", + "@type": [ + "https://schema.org/WebPage" ], "https://schema.org/name": [ { @@ -11805,12 +11908,1025 @@ ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IncidentImpactAssessment", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#ImpactAssessment" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#ImpactAssessment" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "An impact assessment associated with a incident" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Incident Impact Assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedActivity", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Unauthorised Activity" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Unauthorised Activity" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ComponentFailure", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Component Failure" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Vulnerability", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Vulnerability" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S7L2", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.29,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Moderate Risk (RM7x7 S:7 L:2)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DeliberateIncident", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Incident caused due to deliberate actions of a human" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#incident-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Deliberate Incident" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM5x5S2L2", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.16,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Low Risk (RM5x5 S:2 L:2)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#VeryLowSeverity", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#Severity" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.1,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Severity is Very Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very Low Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S5L1", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.10,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very Low Risk (RM7x7 S:5 L:1)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#NonMaterialDamage", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-03-30" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#LegalRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Non-Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Non-Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S2L3", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.12,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Very Low Risk (RM7x7 S:2 L:3)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Reidentification", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-19" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Something that acts as or causes Re-identification" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Re-identification" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#hasVulnerability", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-properties" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "has vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ModerateLikelihood", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#Likelihood" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.5,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Level where Likelihood is Moderate" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Moderate Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk", + "@type": [ + "http://www.w3.org/2002/07/owl#Ontology", + "http://www.w3.org/ns/dx/prof/Profile" + ], + "http://purl.org/dc/terms/bibliographicCitation": [ + { + "@value": "Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426" + } + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@value": "http://www.w3.org/2000/01/rdf-schema" + }, + { + "@value": "http://www.w3.org/2004/02/skos/core" + } + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + }, + { + "@value": "Delaram Golpayegani" + }, + { + "@value": "Julian Flake" + }, + { + "@value": "Georg P. Krog" + }, + { + "@value": "Beatriz Esteves" + }, + { + "@value": "Daniel Doherty" + }, + { + "@value": "Fajar Ekaputra" + }, + { + "@value": "Axel Polleres" + }, + { + "@value": "Rob Brennan" + }, + { + "@value": "Julio Fernandez" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/creator": [ + { + "@language": "en", + "@value": "Harshvardhan J. Pandit" + }, + { + "@language": "en", + "@value": "Georg P. Krog" + }, + { + "@language": "en", + "@value": "Paul Ryan" + }, + { + "@language": "en", + "@value": "Rob Brennan" + }, + { + "@language": "en", + "@value": "Delaram Golpayegani" + }, + { + "@language": "en", + "@value": "Beatriz Esteves" + }, + { + "@language": "en", + "@value": "Julian Flake" + } + ], + "http://purl.org/dc/terms/description": [ + { + "@language": "en", + "@value": "Extension to the Data Privacy Vocabulary (DPV) providing concepts for representing information about risk assessment and risk management" + } + ], + "http://purl.org/dc/terms/identifier": [ + { + "@value": "https://w3id.org/dpv/risk" + } + ], + "http://purl.org/dc/terms/issued": [ + { + "@language": "en", + "@value": "2022-08-14" + } + ], + "http://purl.org/dc/terms/license": [ + { + "@id": "https://www.w3.org/copyright/document-license-2023/" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@language": "en", + "@value": "2024-08-18" + } + ], + "http://purl.org/dc/terms/publisher": [ + { + "@id": "https://www.w3.org/" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "https://www.w3.org/groups/cg/dpvcg/" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@language": "en", + "@value": "Risk Concepts" + } + ], + "http://purl.org/ontology/bibo/doi": [ + { + "@value": "10.5281/zenodo.12505841" + } + ], + "http://purl.org/ontology/bibo/status": [ + { + "@value": "http://purl.org/ontology/bibo/status/published" + } + ], + "http://purl.org/vocab/vann/preferredNamespacePrefix": [ + { + "@value": "risk" + } + ], + "http://purl.org/vocab/vann/preferredNamespaceUri": [ + { + "@value": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2000/01/rdf-schema#Label": [ + { + "@language": "en", + "@value": "RISK" + } + ], + "http://www.w3.org/2002/07/owl#versionIRI": [ + { + "@id": "https://w3id.org/dpv/2.1-dev/risk" + } + ], + "http://www.w3.org/2002/07/owl#versionInfo": [ + { + "@value": "2.1-dev" + } + ], + "http://www.w3.org/ns/dx/prof/hasResource": [ + { + "@id": "https://w3id.org/dpv/primer" + }, + { + "@id": "https://w3id.org/dpv/guides" + }, + { + "@id": "https://w3id.org/dpv/examples" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-html" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-rdf" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-ttl" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-n3" + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/isProfileOf": [ + { + "@id": "http://www.w3.org/2000/01/rdf-schema#" + }, + { + "@id": "http://www.w3.org/2004/02/skos/core#" + }, + { + "@id": "https://w3id.org/dpv" + } + ], + "http://xmlns.com/foaf/0.1/logo": [ + { + "@id": "https://w3id.org/dpv/media/logo.png" + } + ], + "https://schema.org/version": [ + { + "@value": "2.1-dev" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L3", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -11829,7 +12945,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.24,xsd:decimal" + "@value": "0.80,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11845,13 +12961,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -11862,16 +12978,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM7x7 S:4 L:3)" + "@value": "Very High Risk (RM5x5 S:5 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolenceAgainstChildren", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -11884,15 +13000,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nee4d48a7cebf4f2cb9b08674eaaf0129" + "@value": "0.14,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11908,55 +13018,84 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Child Violence" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violence against children" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ChildViolence\" in DPV 2.0" + "@value": "Low Risk (RM7x7 S:7 L:1)" } ] }, { - "@id": "_:Nee4d48a7cebf4f2cb9b08674eaaf0129", + "@id": "https://w3id.org/dpv/risk#causedByVulnerability", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "https://schema.org/name": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Indicates the associated context (subject) is caused by the indicated vulnerability (object)" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#core-properties" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "caused by vulnerability" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentConcluded", + "@id": "https://w3id.org/dpv/risk#5SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -11966,7 +13105,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -11982,33 +13121,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring" + "@value": "Scale with 5 Severity Levels from Very High to Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Concluded" + "@value": "5 Severity Levels" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentIdentifier", + "@id": "https://w3id.org/dpv/risk#IncidentRegister", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -12022,7 +13166,7 @@ ], "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + "@id": "https://w3id.org/dpv#RecordsOfActivities" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12031,10 +13175,15 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RecordsOfActivities" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Identifier associated with an incident" + "@value": "A register recording incidentes, their reports, notifications, and other related activities" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12045,40 +13194,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Identifier" + "@value": "Incident Register" } ] }, { - "@id": "https://w3id.org/dpv/risk#Spoofing", + "@id": "https://w3id.org/dpv/risk#ImplicitBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Ncde3f9ef14924e6eb724e4ba1ac0ba22" - }, - { - "@id": "_:N05fc65d1c1bd409d867c9c4d2a8ae1de" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12094,78 +13235,37 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Spoofing" + "@value": "Bias that occurs when a human makes an association or assumption based on their mental models and memories" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Spoofing" - } - ] - }, - { - "@id": "_:Ncde3f9ef14924e6eb724e4ba1ac0ba22", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" - } - ] - }, - { - "@id": "_:N05fc65d1c1bd409d867c9c4d2a8ae1de", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Implicit Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighLikelihood", + "@id": "https://w3id.org/dpv/risk#RightsLimitation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ @@ -12174,9 +13274,10 @@ "@value": "2022-08-18" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.75,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12192,65 +13293,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#SocietalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is High" + "@value": "Something that acts as or causes Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Likelihood" + "@value": "Limitation of Rights" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighLikelihood", + "@id": "https://w3id.org/dpv/risk#IncidentConcludingReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.9,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -12261,38 +13350,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Very High" + "@value": "A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Incident Concluding Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L2", + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -12311,7 +13397,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.16,xsd:decimal" + "@value": "0.06,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12333,7 +13419,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12344,16 +13430,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:4 L:2)" + "@value": "Extremely Low Risk (RM7x7 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RemoveConsequence", + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -12363,7 +13449,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12379,29 +13465,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl" + "@id": "https://w3id.org/dpv/risk#RiskMatrix" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that removes Consequence i.e. prevents it from materialising" + "@value": "A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remove Consequence" + "@value": "Risk Matrix 7x7" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentityFraud", + "@id": "https://w3id.org/dpv/risk#Injury", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -12426,7 +13512,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N2aaba50c99e946a2befb05c464900a11" + "@id": "_:Nb08320fce6334ebaa9882de0de363138" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12442,16 +13528,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#IndividualRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Identity Fraud" + "@value": "Something that acts as or causes Injury" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12462,32 +13545,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identity Fraud" + "@value": "Injury" } ] }, { - "@id": "_:N2aaba50c99e946a2befb05c464900a11", + "@id": "_:Nb08320fce6334ebaa9882de0de363138", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Threat Taxonomy 2016" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L5", + "@id": "https://w3id.org/dpv/risk#PublicOrderBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -12500,9 +13583,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.71,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6e1595afe0144aeea2b1f55d8136d0cc" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12518,33 +13607,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Public Order Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:5)" + "@value": "Public Order Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk#VeryLowSeverity", + "@id": "_:N6e1595afe0144aeea2b1f55d8136d0cc", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S7L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -12554,12 +13659,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.1,xsd:decimal" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12575,38 +13680,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" + "@value": "High Risk (RM7x7 S:7 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", + "@id": "https://w3id.org/dpv/risk#InterceptCommunications", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -12631,7 +13727,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N892cb8aa9dad44ccbe9e88a74e1576d1" + "@id": "_:N27860d33acdb4a848f2b279c6f777606" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12642,12 +13738,12 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" @@ -12656,7 +13752,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised System Modification" + "@value": "Something that acts as or causes Interception of Communications" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -12667,51 +13763,100 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised System Modification" + "@value": "Intercept Communications" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" } ] }, { - "@id": "_:N892cb8aa9dad44ccbe9e88a74e1576d1", + "@id": "_:N27860d33acdb4a848f2b279c6f777606", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#refersToRisk", + "@id": "https://w3id.org/dpv/risk#FinancialImpact", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv#Incident" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@id": "https://w3id.org/dpv#Risk" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Things that cause or have the potential to impact financial resources" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Financial Impact" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" } ], - "http://purl.org/vocab/vann/example": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/examples#E0069" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nbad0a27eb07e4428a3a5c2e24515e416" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12725,55 +13870,71 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SocietalRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the incident (subject) is a materialisation of the indicated risk (object)" + "@value": "Something that acts as or causes Harmful Speech" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "refers to risk" + "@value": "Exposure to Harmful Speech" } ], - "https://schema.org/domainIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv#Incident" + "@language": "en", + "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" } + ] + }, + { + "@id": "_:Nbad0a27eb07e4428a3a5c2e24515e416", + "@type": [ + "https://schema.org/WebPage" ], - "https://schema.org/rangeIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv#Risk" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L5", + "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Threat" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/created": [ { - "@value": "0.20,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12787,49 +13948,56 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:2 L:5)" + "@value": "exploits vulnerability" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#isExploitedBy", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } + ], + "https://schema.org/rangeIncludes": [ { "@id": "https://w3id.org/dpv/risk#Vulnerability" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Harm", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-13" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12843,40 +14011,57 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IndividualRisk" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is exploited by the indicated threat (object)" + "@value": "Something that acts as or causes Harm to humans" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is exploited by" - } - ], - "https://schema.org/domainIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Harm" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk#Threat" + "@language": "en", + "@value": "This concept refers to the general abstract notion of harm" } ] }, { - "@id": "https://w3id.org/dpv/risk#ComponentFailure", + "@id": "https://w3id.org/dpv/risk#VeryLowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskLevel" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.1,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -12891,42 +14076,42 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#5RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Component Failure" + "@value": "Level where Risk is Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Component Failure" + "@value": "Very Low Risk" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of" + "@value": "The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#MonitorConsequence", + "@id": "https://w3id.org/dpv/risk#LoseTrust", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -12936,7 +14121,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N12b3cae72c654fbba38a4121d80d0971" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -12952,33 +14148,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#MonitorControl" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that monitors a Risk Consequence" + "@value": "Something that acts as or causes Loss of Trust" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Monitor Consequence" + "@value": "Lose of Trust" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowLikelihood", + "@id": "_:N12b3cae72c654fbba38a4121d80d0971", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MonitorRiskSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -12988,12 +14200,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.01,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13009,39 +14216,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Extremely Low" + "@value": "Control that monitors a Risk Source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Likelihood" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "Monitor Risk Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowLikelihood", + "@id": "https://w3id.org/dpv/risk#RemoveSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -13051,12 +14252,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.25,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13072,45 +14268,64 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Likelihood is Low" + "@value": "Control that removes the risk source" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Likelihood" + "@value": "Remove Source" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#serialisation-jsonld", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@id": "https://www.w3.org/TR/json-ld11/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/application/ld+json" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Risk Concepts - JSON-LD serialiation" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.jsonld" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L6", + "@id": "https://w3id.org/dpv/risk#UnauthorisedSystemModification", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -13123,9 +14338,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.61,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nce763ffd88464838a749b691f0ba814e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13141,29 +14362,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "Something that acts as or causes Unauthorised System Modification" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:6)" + "@value": "Unauthorised System Modification" } ] }, { - "@id": "https://w3id.org/dpv/risk#SocialDisadvantage", + "@id": "_:Nce763ffd88464838a749b691f0ba814e", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#DistributedDenialServiceAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -13171,13 +14411,13 @@ ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-19" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -13186,6 +14426,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N341572353447495784d70c873b300d32" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -13199,13 +14444,16 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Social Disadvantage" + "@value": "Something that acts as or causes Distributed Denial of Service Attack (DDoS)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13216,38 +14464,48 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Social Disadvantage" + "@value": "Distributed Denial of Service Attack (DDoS)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Fee", + "@id": "_:N341572353447495784d70c873b300d32", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#InGroupBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { "@language": "en", - "@value": "DGA 2.10" + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13258,34 +14516,34 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides fees e.g. for using a service" + "@value": "Bias that occurs when showing partiality to one's own group or own characteristics" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Fee" + "@value": "In-Group Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsImpact", + "@id": "https://w3id.org/dpv/risk#FinancialLoss", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -13310,7 +14568,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Nf99c4629935348c3ab720d412cc821d6" + "@id": "_:Nd42bbf88bc3c4a50bd0d7b206c79060e" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13326,16 +14584,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - }, - { - "@id": "https://w3id.org/dpv#Impact" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Impact to Rights" + "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13346,18 +14601,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Impact to Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ImpactToRights\" in DPV 2.0" + "@value": "Financial Loss" } ] }, { - "@id": "_:Nf99c4629935348c3ab720d412cc821d6", + "@id": "_:Nd42bbf88bc3c4a50bd0d7b206c79060e", "@type": [ "https://schema.org/WebPage" ], @@ -13373,26 +14622,27 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#VeryHighSeverity", + "@id": "https://w3id.org/dpv/risk#CoverageBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv/risk#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.9,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13408,57 +14658,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#SelectionBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Very High" + "@value": "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Severity" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" + "@value": "Coverage Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S3L6", + "@id": "https://w3id.org/dpv/risk#Reward", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.37,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13474,24 +14716,24 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High" + "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:3 L:6)" + "@value": "Reward" } ] }, @@ -13548,7 +14790,7 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeModification", + "@id": "https://w3id.org/dpv/risk#LoseCredibility", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -13573,7 +14815,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3415c4ca116d4f3a915110e560d5a364" + "@id": "_:Nc56cc965e12d4f8a86473ed790bd98d0" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13589,16 +14831,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ReputationalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Code Modification" + "@value": "Something that acts as or causes Loss of Credibility" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13609,28 +14848,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Code Modification" + "@value": "Lose of Credibility" } ] }, { - "@id": "_:N3415c4ca116d4f3a915110e560d5a364", + "@id": "_:Nc56cc965e12d4f8a86473ed790bd98d0", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L7", + "@id": "https://w3id.org/dpv/risk#RM7x7S3L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -13649,7 +14888,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.71,xsd:decimal" + "@value": "0.43,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13671,7 +14910,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13682,16 +14921,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:5 L:7)" + "@value": "Very High Risk (RM7x7 S:3 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReduceSeverity", + "@id": "https://w3id.org/dpv/risk#CopyrightViolation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -13701,7 +14940,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N127f18629c20469393a6ea549f6434c3" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13717,33 +14967,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReductionControl" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the severity of an event" + "@value": "Something that acts as or causes Copyright Violation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduce Severity" + "@value": "Copyright Violation" } ] }, { - "@id": "https://w3id.org/dpv/risk#DataCorruption", + "@id": "_:N127f18629c20469393a6ea549f6434c3", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Reference Incident Classification Taxonomy 2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -13756,15 +15022,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N6fa4299dcf03460280724c2e94188882" + "@value": "0.12,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13775,59 +15035,143 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Corruption of Data" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Data Corruption" + "@value": "Very Low Risk (RM7x7 S:3 L:2)" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S4L5", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.41,xsd:decimal" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "High Risk (RM7x7 S:4 L:5)" } ] }, { - "@id": "_:N6fa4299dcf03460280724c2e94188882", + "@id": "https://w3id.org/dpv/risk#ReduceSeverity", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ReductionControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control that reduces the severity of an event" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Reduce Severity" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataModification", + "@id": "https://w3id.org/dpv/risk#UnauthorisedDataDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -13852,7 +15196,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N137f5be6462a45b986df12e19ae9cc05" + "@id": "_:N67d2f9f89fab439b8d5965d26bb49159" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -13868,7 +15212,7 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" @@ -13877,7 +15221,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Modification" + "@value": "Something that acts as or causes Unauthorised Data Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -13888,52 +15232,46 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Modification" + "@value": "Unauthorised Data Disclosure" } ] }, { - "@id": "_:N137f5be6462a45b986df12e19ae9cc05", + "@id": "_:N67d2f9f89fab439b8d5965d26bb49159", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L6", + "@id": "https://w3id.org/dpv/risk#IncidentOngoingReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "0.73,xsd:decimal" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -13944,33 +15282,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#IncidentReport" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High" + "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:6 L:6)" + "@value": "Incident Ongoing Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L1", + "@id": "https://w3id.org/dpv/risk#MonitorVulnerabilities", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -13980,12 +15318,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.33,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14001,33 +15334,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Control that monitors a Risk Vulnerability" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM3x3 S:3 L:1)" + "@value": "Monitor Vulnerabilities" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S4L4", + "@id": "https://w3id.org/dpv/risk#SecurityBreach", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14040,9 +15373,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.33,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Neaf661678b58453aa79ac68fa97e26ba" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14058,54 +15397,74 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High" + "@value": "Something that acts as or causes Security Breach" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM7x7 S:4 L:4)" + "@value": "Security Breach" } ] }, { - "@id": "https://w3id.org/dpv/risk#SystemIntrusion", + "@id": "_:Neaf661678b58453aa79ac68fa97e26ba", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SamplingBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-09-13" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N6f228adb05c443d496bdac1d6538a994" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14121,74 +15480,80 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#SelectionBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes System Intrusion" + "@value": "Bias that occurs when data records are not collected randomly from the intended population" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "System Intrusion" + "@value": "Sampling Bias" } ] }, { - "@id": "_:N6f228adb05c443d496bdac1d6538a994", + "@id": "https://w3id.org/dpv/risk#IntegrityBreach", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], - "https://schema.org/name": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/risk#" } ], - "https://schema.org/url": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#DataBreach" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ] }, { - "@id": "https://w3id.org/dpv/risk#Reward", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.67,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14204,29 +15569,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reward" + "@value": "High Risk (RM3x3 S:3 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ErroneousSystemUse", + "@id": "https://w3id.org/dpv/risk#Damage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14240,7 +15605,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -14249,11 +15614,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nc3f8a288471847e5ab6093affab89a5d" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -14267,13 +15627,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#UserRisks" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Erroneous System Use" + "@value": "Something that acts as or causes Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14284,32 +15644,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Erroneous System Use" - } - ] - }, - { - "@id": "_:Nc3f8a288471847e5ab6093affab89a5d", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Damage" } ] }, { - "@id": "https://w3id.org/dpv/risk#ModerateSeverity", + "@id": "https://w3id.org/dpv/risk#SystemFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14319,12 +15663,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.5,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nca552bddc5ac4825af27bacd7089da63" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14340,51 +15690,58 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" }, { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Moderate" + "@value": "Something that acts as or causes System Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Severity" + "@value": "System Failure" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1" + "@value": "Here system refers to both hardware and software systems" + } + ] + }, + { + "@id": "_:Nca552bddc5ac4825af27bacd7089da63", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Landscape for Ransomware Attacks 2022" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L4", + "@id": "https://w3id.org/dpv/risk#MonitorControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -14394,12 +15751,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.08,xsd:decimal" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14415,29 +15767,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" + "@value": "Risk Mitigation Measure that uses controls to monitor events" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:4)" + "@value": "Monitor Control" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised." } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentHandlingReport", + "@id": "https://w3id.org/dpv/risk#IncidentAssessmentReport", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class" @@ -14472,7 +15830,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the response to or handling of an incident regarding the mitigation of its effects and the prevention of its recurrence" + "@value": "A report describing the assessment of an incident in terms of its effects or impacts" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14483,16 +15841,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Handling Report" + "@value": "Incident Assessment Report" } ] }, { - "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#Scam", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14502,7 +15860,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N755a8b0a576543d3877fe747628c7919" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14518,33 +15887,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 7 Likelihood Levels from Extremely High to Extremely Low" + "@value": "Something that acts as or causes Scam" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "7 Likelihood Levels" + "@value": "Scam" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedDataAccess", + "@id": "_:N755a8b0a576543d3877fe747628c7919", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#RM7x7S5L6", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -14557,15 +15945,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:Nee1e1ea5436e45f49bbc543deaaa2881" + "@value": "0.61,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14581,68 +15963,47 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Data Access" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Data Access" - } - ] - }, - { - "@id": "_:Nee1e1ea5436e45f49bbc543deaaa2881", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Extremely High Risk (RM7x7 S:5 L:6)" } ] }, { - "@id": "https://w3id.org/dpv/risk#Compensation", + "@id": "https://w3id.org/dpv/risk#hasControl", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/rangeIncludes": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2024-02-14" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/vocab/vann/example": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/examples#E0071" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14656,31 +16017,31 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" + "@value": "Indicates the use of specified control" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Compensation" + "@value": "has control" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" } ] }, { - "@id": "https://w3id.org/dpv/risk#InterceptCommunications", + "@id": "https://w3id.org/dpv/risk#CompromiseAccountCredentials", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -14705,7 +16066,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N3755806b712d4625aee915fe4dd1c3dd" + "@id": "_:N50b49b49a3fe4b1ea591c004b74b4453" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14716,7 +16077,7 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ @@ -14724,13 +16085,13 @@ "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" }, { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Interception of Communications" + "@value": "Something that acts as or causes Account Credentials to be compromised" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -14741,59 +16102,46 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Intercept Communications" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"InterceptionCommunications\" in DPV 2.0" + "@value": "Compromise Account Credentials" } ] }, { - "@id": "_:N3755806b712d4625aee915fe4dd1c3dd", + "@id": "_:N50b49b49a3fe4b1ea591c004b74b4453", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], "https://schema.org/url": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RightsLimitation", + "@id": "https://w3id.org/dpv/risk#IncidentIdentifier", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -14802,41 +16150,30 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Limitation of Rights" + "@value": "Identifier associated with an incident" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Limitation of Rights" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"LimitationOfRights\" in DPV 2.0" + "@value": "Incident Identifier" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L2", + "@id": "https://w3id.org/dpv/risk#DataCorruption", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14849,9 +16186,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.44,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb67e1cacb9d546a69a306d5c1e8456d9" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14862,38 +16205,80 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Something that acts as or causes Corruption of Data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Data Corruption" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"Corruption Data\" in DPV 2.0" + } + ] + }, + { + "@id": "_:Nb67e1cacb9d546a69a306d5c1e8456d9", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "https://schema.org/url": [ { - "@language": "en", - "@value": "Moderate Risk (RM3x3 S:2 L:2)" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk", + "@id": "https://w3id.org/dpv/risk#SocietalBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -14908,33 +16293,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#CognitiveBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that arise during operational processes" + "@value": "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Operational Security Risk" + "@value": "Societal Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentMitigated", + "@id": "https://w3id.org/dpv/risk#core-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -14944,7 +16335,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N7c1ceabcaad149f28fb40302094cf3a4" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -14960,33 +16362,55 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring" + "@value": "Something that acts as or causes Unwanted Code Deletion" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Mitigated" + "@value": "Unwanted Code Deletion" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentNearMiss", + "@id": "_:N7c1ceabcaad149f28fb40302094cf3a4", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#HaltSource", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#IncidentStatus" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -14996,7 +16420,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15012,43 +16436,46 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentStatus" + "@id": "https://w3id.org/dpv/risk#SourceControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The state where an incident was almost successful in taking place i.e. \"it came very close\"" + "@value": "Control that halts the risk source or prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-status-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Near Miss" + "@value": "Halt Source" } ] }, { - "@id": "https://w3id.org/dpv/risk#Injury", + "@id": "https://w3id.org/dpv/risk#Incident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-02-14" + }, + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://purl.org/dc/terms/modified": [ @@ -15057,9 +16484,12 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ + "http://purl.org/vocab/vann/example": [ + { + "@id": "https://w3id.org/dpv/examples#E0069" + }, { - "@id": "_:N11ef6111bd434368998efddbfabd98b2" + "@id": "https://w3id.org/dpv/examples#E0070" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15067,6 +16497,14 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv#RiskConcept" + }, + { + "@id": "http://www.w3.org/2000/01/rdf-schema#Class" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -15075,65 +16513,57 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Injury" + "@value": "An actual or occured event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#core-classes" + }, + { + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Injury" - } - ] - }, - { - "@id": "_:N11ef6111bd434368998efddbfabd98b2", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" + "@value": "Incident" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Incident is realised or materialised risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#Renumeration", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Georg P. Krog, Harshvardhan J. Pandit" + "@value": "Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-04-14" + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.22,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15149,33 +16579,64 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or provides renumeration which is in monetary or financial form" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Remuneration" + "@value": "Low Risk (RM3x3 S:1 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S4L2", + "@id": "https://w3id.org/dpv/guides", + "@type": [ + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" + ], + "http://purl.org/dc/terms/conformsTo": [ + { + "@id": "https://www.w3.org/TR/html/" + } + ], + "http://purl.org/dc/terms/format": [ + { + "@id": "https://www.iana.org/assignments/media-types/text/html" + } + ], + "http://purl.org/dc/terms/title": [ + { + "@value": "Guides for Data Privacy Vocabulary" + } + ], + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/guides" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#Sabotage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -15188,9 +16649,15 @@ "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.32,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N42dd6eab89e5476c8ce82ee556bb8a47" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15206,64 +16673,55 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" + "@value": "Something that acts as or causes Sabotage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:4 L:2)" + "@value": "Sabotage" } ] }, { - "@id": "https://w3id.org/dpv/examples", + "@id": "_:N42dd6eab89e5476c8ce82ee556bb8a47", "@type": [ - "http://www.w3.org/ns/dx/prof/ResourceDescriptor" - ], - "http://purl.org/dc/terms/conformsTo": [ - { - "@id": "https://www.w3.org/TR/html/" - } - ], - "http://purl.org/dc/terms/format": [ - { - "@id": "https://www.iana.org/assignments/media-types/text/html" - } - ], - "http://purl.org/dc/terms/title": [ - { - "@value": "Examples for Data Privacy Vocabulary" - } + "https://schema.org/WebPage" ], - "http://www.w3.org/ns/dx/prof/hasArtifact": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/examples" + "@value": "ENISA Reference Incident Classification Taxonomy 2018" } ], - "http://www.w3.org/ns/dx/prof/hasRole": [ + "https://schema.org/url": [ { - "@id": "http://www.w3.org/ns/dx/prof/role/guidance" + "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S2L3", + "@id": "https://w3id.org/dpv/risk#VeryHighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -15273,12 +16731,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.12,xsd:decimal" + "@value": "0.9,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15294,29 +16752,38 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Level where Severity is Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:2 L:3)" + "@value": "Very High Severity" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S3L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15335,7 +16802,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.67,xsd:decimal" + "@value": "0.37,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15351,13 +16818,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15368,7 +16835,7 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM3x3 S:3 L:2)" + "@value": "High Risk (RM7x7 S:6 L:3)" } ] }, @@ -15424,11 +16891,11 @@ ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S3L3", + "@id": "https://w3id.org/dpv/risk#LowRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -15438,12 +16905,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-08-18" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.36,xsd:decimal" + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15459,29 +16926,41 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#7RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5RiskLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3RiskLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate" + "@value": "Level where Risk is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Moderate Risk (RM5x5 S:3 L:3)" + "@value": "Low Risk" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S1L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S1L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15500,7 +16979,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.22,xsd:decimal" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15516,13 +16995,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15533,37 +17012,57 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:1 L:2)" + "@value": "Very Low Risk (RM7x7 S:1 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", + "@id": "https://w3id.org/dpv/risk#serialisation-ttl", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://www.w3.org/TR/turtle/" } ], - "http://purl.org/dc/terms/created": [ + "http://purl.org/dc/terms/format": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://www.iana.org/assignments/media-types/text/turtle" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/dc/terms/title": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "Risk Concepts - Turtle serialiation" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ + { + "@id": "https://w3id.org/dpv/risk/risk.ttl" + } + ], + "http://www.w3.org/ns/dx/prof/hasRole": [ + { + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#MonitorRiskControl", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ { - "@id": "_:N52bb23017ca543f68135684c023c7974" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15574,86 +17073,104 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "modified" + "@value": "accepted" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#MonitorControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Violation of Code of Conduct" + "@value": "Control that monitors another Control" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Violating Code of Conduct" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" + "@value": "Monitor Control" } ] }, { - "@id": "_:N52bb23017ca543f68135684c023c7974", + "@id": "https://w3id.org/dpv/risk#ContainmentControl", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/created": [ { - "@value": "ISO/IEC 27005:2018" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-05-19" } ], - "https://schema.org/url": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskControl" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Control to contain event" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + } + ], + "http://www.w3.org/2004/02/skos/core#prefLabel": [ + { + "@language": "en", + "@value": "Containment Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", + "@id": "https://w3id.org/dpv/risk#RiskControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-05-19" } ], - "http://purl.org/dc/terms/modified": [ + "http://purl.org/vocab/vann/example": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@id": "https://w3id.org/dpv/examples#E0071" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "_:N5d034c9d7907485f93dfa97a87822b46" + "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -15664,74 +17181,91 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv#RiskMitigationMeasure" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Access to Premises" + "@value": "Control that modifies risk" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Access to Premises" + "@value": "Risk Control" } ] }, { - "@id": "_:N5d034c9d7907485f93dfa97a87822b46", + "@id": "https://w3id.org/dpv/risk#NonResponseBias", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Daniel Doherty" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-09-13" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S7L7", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/terms/source": [ { - "@value": "Harshvardhan J. Pandit" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" + } + ], + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + { + "@language": "en", + "@value": "accepted" + } + ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#SelectionBias" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias" + } + ], + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "0.99,xsd:decimal" + "@language": "en", + "@value": "Non-Response Bias" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#LegalRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -15746,29 +17280,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" + "@value": "Risks and issues that have their basis in legal requirements and enforcement" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk (RM7x7 S:7 L:7)" + "@value": "Legal Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedResourceUse", + "@id": "https://w3id.org/dpv/risk#MaterialDamage", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -15782,7 +17316,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2022-03-30" } ], "http://purl.org/dc/terms/modified": [ @@ -15791,11 +17325,6 @@ "@value": "2024-08-16" } ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Ndedca3b0c6384342a3aa4083c53dcf74" - } - ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -15809,16 +17338,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Resource Use" + "@value": "Something that acts as or causes Material Damage" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -15829,32 +17355,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Resource Use" + "@value": "Material Damage" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The criteria for what is considered material damage is based in jurisdictional laws and norms" } ] }, { - "@id": "_:Ndedca3b0c6384342a3aa4083c53dcf74", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L1", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.04,xsd:decimal" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#SecurityAttack", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -15869,47 +17401,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes an attack on security with the aim of undermining it" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Extremely Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Attack" + "@value": "Extremely Low Risk (RM7x7 S:2 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ReductionControl", + "@id": "https://w3id.org/dpv/risk#LowLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#Likelihood" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-18" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.25,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -15925,49 +17458,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that reduces the likelihood or severity of an event" + "@value": "Level where Likelihood is Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Reduction Control" + "@value": "Low Likelihood" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S5L2", + "@id": "https://w3id.org/dpv/risk#SecurityAttack", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.40,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -15982,47 +17511,63 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High" + "@value": "Something that acts as or causes an attack on security with the aim of undermining it" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "High Risk (RM5x5 S:5 L:2)" + "@value": "Security Attack" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentPreliminaryReport", + "@id": "https://w3id.org/dpv/risk#ConfoundingVariablesBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv/risk#" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -16033,48 +17578,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#StatisticalBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known" + "@value": "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Preliminary Report" + "@value": "Confounding Variables Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L1", + "@id": "https://w3id.org/dpv/risk#Compensation", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Georg P. Krog, Harshvardhan J. Pandit" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-04-14" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.10,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16090,33 +17636,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#FinancialImpact" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low" + "@value": "Something that acts as or provides compensation - which can be monetary and financial or in other forms" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:5 L:1)" + "@value": "Compensation" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalAssault", + "@id": "https://w3id.org/dpv/risk#3RiskLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#RiskLevel" ], "http://purl.org/dc/terms/contributor": [ { @@ -16126,18 +17672,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N5ee0d7c3985247d790e452d1e55314af" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16153,58 +17688,48 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv#RiskLevel" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Physical Assault" + "@value": "Scale with 3 Risk Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Assault" + "@value": "3 Risk Levels" } ] }, { - "@id": "_:N5ee0d7c3985247d790e452d1e55314af", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L2", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#hasIncident", - "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "http://purl.org/dc/terms/created": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/created": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "0.16,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16218,35 +17743,51 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates an incident is associated with the specified context" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has incident" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" + "@value": "Low Risk (RM7x7 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#PhysicalHarm", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.48,xsd:decimal" + } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -16261,34 +17802,56 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + } + ], + "http://www.w3.org/2004/02/skos/core#definition": [ + { + "@language": "en", + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Physical Harm" + "@value": "High Risk (RM5x5 S:3 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes", - "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" - ] - }, - { - "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeAccess", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv#RiskConcept" ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } + ], + "http://purl.org/dc/terms/created": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nf44facc76ca548efac72ec065d8591cd" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -16302,13 +17865,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risks and issues that have their origin in environment or can affect the environment at large" + "@value": "Something that acts as or causes Unauthorised Code Access" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16319,37 +17888,41 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Environmental Risk" + "@value": "Unauthorised Code Access" } ] }, { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes", + "@id": "_:Nf44facc76ca548efac72ec065d8591cd", "@type": [ - "http://www.w3.org/2004/02/skos/core#ConceptScheme" + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S6L5", + "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" ], - "http://purl.org/dc/terms/contributor": [ + "http://purl.org/dc/dcam/domainIncludes": [ { - "@value": "Harshvardhan J. Pandit" + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.61,xsd:decimal" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16363,35 +17936,35 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High" + "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very High Risk (RM7x7 S:6 L:5)" + "@value": "is vulnerability of" + } + ], + "https://schema.org/domainIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Vulnerability" } ] }, { - "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels", + "@id": "https://w3id.org/dpv/risk#RM7x7S5L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Likelihood" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -16401,7 +17974,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.31,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16417,33 +17995,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Likelihood" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Scale with 5 Likelihood Levels from Very High to Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "5 Likelihood Levels" + "@value": "Moderate Risk (RM7x7 S:5 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3", + "@id": "https://w3id.org/dpv/risk#ViolatingStatutoryObligations", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -16456,6 +18034,17 @@ "@value": "2022-08-17" } ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nb78ad830eb9c4d65a06a2a0dac398849" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -16464,38 +18053,60 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types" + "@value": "Something that acts as or causes Violation of Statutory Obligations" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Matrix 3x3" + "@value": "Violation of Statutory Obligations" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationStatutoryObligations\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowSeverity", + "@id": "_:Nb78ad830eb9c4d65a06a2a0dac398849", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#HighLikelihood", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#Severity" + "https://w3id.org/dpv#Likelihood" ], "http://purl.org/dc/terms/contributor": [ { @@ -16510,7 +18121,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.25,xsd:decimal" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16526,19 +18137,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7SeverityLevels" + "@id": "https://w3id.org/dpv/risk#7LikelihoodLevels" }, { - "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + "@id": "https://w3id.org/dpv/risk#5LikelihoodLevels" }, { - "@id": "https://w3id.org/dpv/risk#3SeverityLevels" + "@id": "https://w3id.org/dpv/risk#3LikelihoodLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Severity is Low" + "@value": "Level where Likelihood is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16549,28 +18160,23 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Severity" + "@value": "High Likelihood" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#HaltSource", + "@id": "https://w3id.org/dpv/risk#DetectionControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", "https://w3id.org/dpv/risk#RiskControl" ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", @@ -16590,13 +18196,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SourceControl" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that halts the risk source or prevents it from materialising" + "@value": "Control to detect event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16607,32 +18213,15 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Halt Source" + "@value": "Detection Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S5L2", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.20,xsd:decimal" - } + "@id": "https://w3id.org/dpv/risk#IndividualRisk", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -16645,31 +18234,26 @@ "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low" + "@value": "Risks and issues that affect or have the potential to affect specific individuals" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:5 L:2)" + "@value": "Individual Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#CopyrightViolation", + "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16694,7 +18278,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N11267ca2734e4dc7a63139ac1d11565e" + "@id": "_:Nf54ab9e109634d149cb207471dd2ffc5" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16710,13 +18294,19 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#LegalRisk" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#IntegrityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Copyright Violation" + "@value": "Something that acts as or causes Authorisation Failure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16727,28 +18317,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Copyright Violation" + "@value": "Authorisation Failure" } ] }, { - "@id": "_:N11267ca2734e4dc7a63139ac1d11565e", + "@id": "_:Nf54ab9e109634d149cb207471dd2ffc5", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@value": "ENISa Trust Services Security Incidents 2021" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" } ] }, { - "@id": "https://w3id.org/dpv/risk#MalwareAttack", + "@id": "https://w3id.org/dpv/risk#Blackmail", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16773,7 +18363,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N03874414264842fc8cc46cf8f23f6b61" + "@id": "_:N8bc9357378f0418c87e2c89b8f5a58b6" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16791,12 +18381,6 @@ { "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, { "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } @@ -16804,7 +18388,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Malware Attack" + "@value": "Something that acts as or causes Blackmail" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16815,28 +18399,28 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Malware Attack" + "@value": "Blackmail" } ] }, { - "@id": "_:N03874414264842fc8cc46cf8f23f6b61", + "@id": "_:N8bc9357378f0418c87e2c89b8f5a58b6", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM3x3S2L1", + "@id": "https://w3id.org/dpv/risk#RM3x3S3L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16855,7 +18439,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.22,xsd:decimal" + "@value": "0.33,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16877,7 +18461,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16888,12 +18472,12 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM3x3 S:2 L:1)" + "@value": "Moderate Risk (RM3x3 S:3 L:1)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L7", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -16912,7 +18496,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.14,xsd:decimal" + "@value": "0.71,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -16934,7 +18518,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -16945,15 +18529,16 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM7x7 S:1 L:7)" + "@value": "Extremely High Risk (RM7x7 S:7 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentNotice", + "@id": "https://w3id.org/dpv/risk#RecoveryControl", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/created": [ { @@ -16966,11 +18551,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#Notice" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -16979,33 +18559,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#Notice" + "@id": "https://w3id.org/dpv/risk#RiskControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Notice associated with an Incident" + "@value": "Control to recover from event" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Notice" + "@value": "Recovery Control" } ] }, { - "@id": "https://w3id.org/dpv/risk#AuthorisationFailure", + "@id": "https://w3id.org/dpv/risk#RM5x5S3L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -17018,89 +18598,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N0038d7d16b3c40cab05b307669151fd9" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" - } - ], - "http://www.w3.org/2004/02/skos/core#definition": [ - { - "@language": "en", - "@value": "Something that acts as or causes Authorisation Failure" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Authorisation Failure" - } - ] - }, - { - "@id": "_:N0038d7d16b3c40cab05b307669151fd9", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISa Trust Services Security Incidents 2021" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021" - } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RiskSource", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://purl.org/dc/terms/modified": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "0.60,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17108,11 +18608,6 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv#RiskConcept" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -17121,33 +18616,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RiskConcept" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Risk Source" + "@value": "Very High Risk (RM5x5 S:3 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SexualViolence", + "@id": "https://w3id.org/dpv/risk#RM5x5S4L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -17160,15 +18655,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N2c2797b2d2814ac4b88d4fe007d95c73" + "@value": "0.32,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17184,49 +18673,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IndividualRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Sexual Violence" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Sexual Violence" - } - ] - }, - { - "@id": "_:N2c2797b2d2814ac4b88d4fe007d95c73", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Moderate Risk (RM5x5 S:4 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExposureToHarmfulSpeech", + "@id": "https://w3id.org/dpv/risk#RM7x7S2L2", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -17239,15 +18712,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N03dc75f8e29a4749b1e898749ee78d6f" + "@value": "0.08,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17263,55 +18730,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#SocietalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Harmful Speech" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "Exposure to Harmful Speech" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "This concept was called \"HarmfulSpeech\" in DPV 2.0" - } - ] - }, - { - "@id": "_:N03dc75f8e29a4749b1e898749ee78d6f", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@language": "en", + "@value": "Extremely Low Risk (RM7x7 S:2 L:2)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SecurityBreach", + "@id": "https://w3id.org/dpv/risk#IncidentOngoing", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#IncidentStatus" ], "http://purl.org/dc/terms/contributor": [ { @@ -17321,18 +18766,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nd9cbf002fd5a43f29d232510925095c4" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17348,73 +18782,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#IncidentStatus" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Security Breach" + "@value": "The incident is ongoing i.e. still active" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#incident-status-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Security Breach" - } - ] - }, - { - "@id": "_:Nd9cbf002fd5a43f29d232510925095c4", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Incident Ongoing" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L4", + "@id": "https://w3id.org/dpv/risk#DataAggregationBias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" + "https://w3id.org/dpv/risk#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "@value": "2024-09-13" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/source": [ { - "@value": "0.16,xsd:decimal" + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17430,47 +18840,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#DataBias" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low" + "@value": "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk (RM5x5 S:1 L:4)" + "@value": "Data Aggregation Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentOngoingReport", + "@id": "https://w3id.org/dpv/risk#RM5x5S1L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Harshvardhan J. Pandit" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.12,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -17481,29 +18897,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Ongoing Report" + "@value": "Very Low Risk (RM5x5 S:1 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#exploitsVulnerability", + "@id": "https://w3id.org/dpv/risk#hasThreatSource", "@type": [ "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", "http://www.w3.org/2004/02/skos/core#Concept" @@ -17515,7 +18931,7 @@ ], "http://purl.org/dc/dcam/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@id": "https://w3id.org/dpv/risk#ThreatSource" } ], "http://purl.org/dc/terms/created": [ @@ -17538,7 +18954,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the threat (subject) exploits the indicated vulnerability (object)" + "@value": "Indicates the threat (subject) has the indicated source (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17549,7 +18965,7 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "exploits vulnerability" + "@value": "has threat source" } ], "https://schema.org/domainIncludes": [ @@ -17559,84 +18975,53 @@ ], "https://schema.org/rangeIncludes": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@id": "https://w3id.org/dpv/risk#ThreatSource" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConsequenceControl", + "@id": "https://w3id.org/dpv/risk#serialisation-rdf", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "accepted" + "@id": "http://www.w3.org/1999/02/22-rdf-syntax-ns#" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://www.iana.org/assignments/media-types/application/rdf+xml" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "Risk Mitigation Measure that controls the Consequences" + "@value": "Risk Concepts - RDF/XML serialiation" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk/risk.rdf" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@language": "en", - "@value": "Consequence Control" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#Threat", + "@id": "https://w3id.org/dpv/risk#ViolatingPolicy", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#RiskSource" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -17645,33 +19030,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "https://w3id.org/dpv/risk#LegalRisk" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk source event which causes Risk" + "@value": "Something that acts as or causes violation of policy which can be either internal or external policy" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Threat" + "@value": "Violating Policy" } ] }, { - "@id": "https://w3id.org/dpv/risk#ConfidentialityBreach", + "@id": "https://w3id.org/dpv/risk#3SeverityLevels", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -17681,18 +19066,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:Nbfd3027ac8ad4b9d9258659777a2e3c6" + "@value": "2022-08-18" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17708,52 +19082,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#DataBreach" + "@id": "https://w3id.org/dpv#Severity" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Confidentiality Breach" + "@value": "Scale with 3 Severity Levels from High to Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Confidentiality Breach" + "@value": "3 Severity Levels" } ] }, { - "@id": "_:Nbfd3027ac8ad4b9d9258659777a2e3c6", + "@id": "https://w3id.org/dpv/risk#RM7x7S7L7", "@type": [ - "https://schema.org/WebPage" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/name": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "ISO/IEC 27005:2018" + "@value": "Harshvardhan J. Pandit" } ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/created": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2022-08-17" + } + ], + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + { + "@value": "0.99,xsd:decimal" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IntegrityBreach", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -17768,40 +19139,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IntegrityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#DataBreach" - } - ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#RM7x7S1L5", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskAnalysis" ], - "http://purl.org/dc/terms/contributor": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { - "@value": "Harshvardhan J. Pandit" + "@language": "en", + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High" } ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" + "http://www.w3.org/2004/02/skos/core#inScheme": [ + { + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "0.10,xsd:decimal" + "@language": "en", + "@value": "Extremely High Risk (RM7x7 S:7 L:7)" } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#IntentionalMisuse", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -17816,33 +19180,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low" + "@value": "Intentional Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM7x7 S:1 L:5)" + "@value": "Intentional Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedDisclosureData", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L3", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -17855,15 +19219,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N46071c56632d48699e134320440c38d8" + "@value": "0.24,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17879,48 +19237,29 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Disclosure of Data" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Disclosure of Data" - } - ] - }, - { - "@id": "_:N46071c56632d48699e134320440c38d8", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Moderate Risk (RM7x7 S:4 L:3)" } ] }, { - "@id": "https://w3id.org/dpv/risk#RM5x5S1L2", + "@id": "https://w3id.org/dpv/risk#RM7x7S6L4", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -17939,7 +19278,7 @@ ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.08,xsd:decimal" + "@value": "0.49,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -17955,13 +19294,13 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -17972,26 +19311,32 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Very Low Risk (RM5x5 S:1 L:2)" + "@value": "Very High Risk (RM7x7 S:6 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#SourceControl", + "@id": "https://w3id.org/dpv/risk#Bias", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv/risk#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { - "@value": "Harshvardhan J. Pandit" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18007,33 +19352,32 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Risk Mitigation Measure that controls the Source" + "@value": "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Source Control" + "@value": "Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#IdentificationControl", + "@id": "https://w3id.org/dpv/risk#ConfidentialityIncident", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { @@ -18046,6 +19390,11 @@ "@id": "https://w3id.org/dpv/risk#" } ], + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + { + "@id": "https://w3id.org/dpv/risk#Incident" + } + ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -18054,33 +19403,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#RiskControl" + "@id": "https://w3id.org/dpv/risk#Incident" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control to identify characteristics of event" + "@value": "Incident where the confidentiality of information or system has been affected" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#incident-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Identification Control" + "@value": "Confidentiality Incident" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnauthorisedInformationDisclosure", + "@id": "https://w3id.org/dpv/risk#RemoveImpact", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskControl" ], "http://purl.org/dc/terms/contributor": [ { @@ -18090,18 +19439,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ - { - "@id": "_:N7d02088c4d08486489d3d220523edc6a" + "@value": "2024-05-19" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18117,52 +19455,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" - }, - { - "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" + "@id": "https://w3id.org/dpv/risk#ImpactControl" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unauthorised Information Disclosure" + "@value": "Control that removes Impact i.e. prevents it from materialising" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-controls-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unauthorised Information Disclosure" - } - ] - }, - { - "@id": "_:N7d02088c4d08486489d3d220523edc6a", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ENISA Reference Incident Classification Taxonomy 2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/" + "@value": "Remove Impact" } ] }, { - "@id": "https://w3id.org/dpv/risk#LowRisk", + "@id": "https://w3id.org/dpv/risk#RM7x7S4L7", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -18172,12 +19491,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@value": "0.25,xsd:decimal" + "@value": "0.57,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18193,45 +19512,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix7x7" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Low" + "@value": "Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Low Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1" + "@value": "Very High Risk (RM7x7 S:4 L:7)" } ] }, { - "@id": "https://w3id.org/dpv/risk#EquipmentFailure", + "@id": "https://w3id.org/dpv/risk#HighSeverity", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv#Severity" ], "http://purl.org/dc/terms/contributor": [ { @@ -18241,18 +19548,12 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2022-08-18" } ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N48b854e63ef14c98a8ab82b4ad5581d1" + "@value": "0.75,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18268,74 +19569,45 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + "@id": "https://w3id.org/dpv/risk#7SeverityLevels" }, { - "@id": "https://w3id.org/dpv/risk#OperationalSecurityRisk" + "@id": "https://w3id.org/dpv/risk#5SeverityLevels" + }, + { + "@id": "https://w3id.org/dpv/risk#3SeverityLevels" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Equipment Failure" + "@value": "Level where Severity is High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-levels-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Equipment Failure" + "@value": "High Severity" } ], "http://www.w3.org/2004/02/skos/core#scopeNote": [ { "@language": "en", - "@value": "Here equipment refers to physical equipment" - } - ] - }, - { - "@id": "_:N48b854e63ef14c98a8ab82b4ad5581d1", - "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } - ], - "https://schema.org/url": [ - { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" } ] }, { - "@id": "https://w3id.org/dpv/risk#HighRisk", + "@id": "https://w3id.org/dpv/risk#UserRisks", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" - } - ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ - { - "@value": "0.75,xsd:decimal" - } + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { @@ -18350,41 +19622,35 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#5RiskLevels" - }, - { - "@id": "https://w3id.org/dpv/risk#3RiskLevels" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is High" + "@value": "Concepts associated with risks that arise due to User or Human use" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ - { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" - } - ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ - { - "@language": "en", - "@value": "High Risk" + { + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1" + "@value": "User Risks" } ] }, { - "@id": "https://w3id.org/dpv/risk#UnwantedCodeDeletion", + "@id": "https://w3id.org/dpv/risk#risk-controls-classes", + "@type": [ + "http://www.w3.org/2004/02/skos/core#ConceptScheme" + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedAccesstoPremises", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -18409,7 +19675,7 @@ ], "http://purl.org/dc/terms/source": [ { - "@id": "_:Na99643aeefed4bbaad265b5261f04adf" + "@id": "_:N96a4e2b7a71b485fae480316787e987b" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18424,6 +19690,9 @@ } ], "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, { "@id": "https://w3id.org/dpv/risk#IntegrityConcept" }, @@ -18437,7 +19706,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Unwanted Code Deletion" + "@value": "Something that acts as or causes Unauthorised Access to Premises" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18448,48 +19717,38 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Unwanted Code Deletion" + "@value": "Unauthorised Access to Premises" } ] }, { - "@id": "_:Na99643aeefed4bbaad265b5261f04adf", + "@id": "_:N96a4e2b7a71b485fae480316787e987b", "@type": [ "https://schema.org/WebPage" ], "https://schema.org/name": [ { - "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + "@value": "ISO/IEC 27005:2018" } ], "https://schema.org/url": [ { - "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" + "@value": "https://www.iso.org/standard/75281.html" } ] }, { - "@id": "https://w3id.org/dpv/risk#AccidentalIncident", + "@id": "https://w3id.org/dpv/risk#AccidentalMisuse", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -18498,42 +19757,49 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#Incident" + "@id": "https://w3id.org/dpv/risk#UserRisks" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to accidental actions arising from human or human-controlled situations" + "@value": "Accidental Misuse" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Accidental Incident" + "@value": "Accidental Misuse" } ] }, { - "@id": "https://w3id.org/dpv/risk#isVulnerabilityOf", + "@id": "https://w3id.org/dpv/risk#RequirementsBias", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" ], - "http://purl.org/dc/dcam/domainIncludes": [ + "http://purl.org/dc/terms/contributor": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18547,31 +19813,37 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#CognitiveBias" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the vulnerability (subject) is associated with indicated context (object)" + "@value": "Bias that occurs in or during requirements creation" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "is vulnerability of" + "@value": "Requirements Bias" } ], - "https://schema.org/domainIncludes": [ + "http://www.w3.org/2004/02/skos/core#scopeNote": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@language": "en", + "@value": "Requirements bias also represents occasions for the human cognitive biases to manifest" } ] }, { - "@id": "https://w3id.org/dpv/risk#Damage", + "@id": "https://w3id.org/dpv/risk#ViolatingCodeOfConduct", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", @@ -18585,7 +19857,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-03-30" + "@value": "2022-08-17" } ], "http://purl.org/dc/terms/modified": [ @@ -18594,6 +19866,11 @@ "@value": "2024-08-16" } ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N6e579543453b456ab0c95e8740b1351e" + } + ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" @@ -18602,7 +19879,7 @@ "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "accepted" + "@value": "modified" } ], "http://www.w3.org/2004/02/skos/core#broader": [ @@ -18613,7 +19890,7 @@ "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Damage" + "@value": "Something that acts as or causes Violation of Code of Conduct" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ @@ -18624,20 +19901,47 @@ "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Damage" + "@value": "Violating Code of Conduct" + } + ], + "http://www.w3.org/2004/02/skos/core#scopeNote": [ + { + "@language": "en", + "@value": "This concept was called \"ViolationCodeConduct\" in DPV 2.0" } ] }, { - "@id": "https://w3id.org/dpv/risk#DeliberateIncident", + "@id": "_:N6e579543453b456ab0c95e8740b1351e", "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#causedByThreat", + "@type": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", + "http://www.w3.org/2004/02/skos/core#Concept" + ], + "http://purl.org/dc/dcam/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" + } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2024-02-14" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18645,46 +19949,41 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#broader": [ - { - "@id": "https://w3id.org/dpv/risk#Incident" - } - ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Incident caused due to deliberate actions of a human" + "@value": "Indicates the cause of associated context (subject) was the indicated threat (object)" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#core-properties" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Deliberate Incident" + "@value": "caused by threat" + } + ], + "https://schema.org/rangeIncludes": [ + { + "@id": "https://w3id.org/dpv/risk#Threat" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyHighRisk", + "@id": "https://w3id.org/dpv/risk#RM5x5S5L5", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -18694,7 +19993,7 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ @@ -18715,121 +20014,74 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely High" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely High Risk" - } - ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ - { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1" + "@value": "Very High Risk (RM5x5 S:5 L:5)" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasRiskSource", + "@id": "https://w3id.org/dpv/risk#serialisation-n3", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" - ], - "http://purl.org/dc/dcam/domainIncludes": [ - { - "@id": "https://w3id.org/dpv#Risk" - } - ], - "http://purl.org/dc/dcam/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#RiskSource" - } - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" - } - ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ - { - "@id": "https://w3id.org/dpv/risk#" - } - ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } + "http://www.w3.org/ns/dx/prof/ResourceDescriptor" ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://purl.org/dc/terms/conformsTo": [ { - "@language": "en", - "@value": "Indicates the risk (subject) has the indicated risk source (object)" + "@id": "https://www.w3.org/TeamSubmission/n3/" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://purl.org/dc/terms/format": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://www.iana.org/assignments/media-types/text/n3" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://purl.org/dc/terms/title": [ { - "@language": "en", - "@value": "has risk source" + "@value": "Risk Concepts - N3 serialiation" } ], - "https://schema.org/domainIncludes": [ + "http://www.w3.org/ns/dx/prof/hasArtifact": [ { - "@id": "https://w3id.org/dpv#Risk" + "@id": "https://w3id.org/dpv/risk/risk.n3" } ], - "https://schema.org/rangeIncludes": [ + "http://www.w3.org/ns/dx/prof/hasRole": [ { - "@id": "https://w3id.org/dpv/risk#RiskSource" + "@id": "http://www.w3.org/ns/dx/prof/role/vocabulary" } ] }, { - "@id": "https://w3id.org/dpv/risk#FinancialLoss", + "@id": "https://w3id.org/dpv/risk#RiskAssessment", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" - ], - "http://purl.org/dc/terms/contributor": [ - { - "@value": "Harshvardhan J. Pandit" - } + "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-17" - } - ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" + "@value": "2024-02-14" } ], "http://purl.org/dc/terms/source": [ { - "@id": "_:N0d61726294a941cbbddda5bb7085a37c" + "@language": "en", + "@value": "ISO 31073:2022 Risk management vocabulary" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18837,57 +20089,46 @@ "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ - { - "@language": "en", - "@value": "accepted" - } - ], - "http://www.w3.org/2004/02/skos/core#broader": [ + "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ { - "@id": "https://w3id.org/dpv/risk#FinancialImpact" + "@id": "https://w3id.org/dpv/risk#RiskManagement" } ], - "http://www.w3.org/2004/02/skos/core#definition": [ + "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", - "@value": "Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity" + "@value": "accepted" } ], - "http://www.w3.org/2004/02/skos/core#inScheme": [ + "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#RiskManagement" } ], - "http://www.w3.org/2004/02/skos/core#prefLabel": [ + "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Financial Loss" + "@value": "Assessment of risk involving its identification, analysis, and evaluation" } - ] - }, - { - "@id": "_:N0d61726294a941cbbddda5bb7085a37c", - "@type": [ - "https://schema.org/WebPage" ], - "https://schema.org/name": [ + "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@value": "ISO/IEC 27005:2018" + "@id": "https://w3id.org/dpv/risk#core-classes" } ], - "https://schema.org/url": [ + "http://www.w3.org/2004/02/skos/core#prefLabel": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@language": "en", + "@value": "Risk Assessment" } ] }, { - "@id": "https://w3id.org/dpv/risk#LoseCustomerConfidence", + "@id": "https://w3id.org/dpv/risk#RM3x3S1L1", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskConcept" + "https://w3id.org/dpv/risk#RiskAnalysis" ], "http://purl.org/dc/terms/contributor": [ { @@ -18900,15 +20141,9 @@ "@value": "2022-08-17" } ], - "http://purl.org/dc/terms/modified": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-08-16" - } - ], - "http://purl.org/dc/terms/source": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "_:N30989a8f2dde48dca1fdb1fce2fde24a" + "@value": "0.11,xsd:decimal" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -18924,63 +20159,53 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ReputationalRisk" + "@id": "https://w3id.org/dpv/risk#RiskMatrix3x3" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Something that acts as or causes Loss of Customer Confidence" + "@value": "Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Lose of Customer Confidence" + "@value": "Low Risk (RM3x3 S:1 L:1)" } ] }, { - "@id": "_:N30989a8f2dde48dca1fdb1fce2fde24a", + "@id": "https://w3id.org/dpv/risk#RM5x5S2L4", "@type": [ - "https://schema.org/WebPage" - ], - "https://schema.org/name": [ - { - "@value": "ISO/IEC 27005:2018" - } + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskAnalysis" ], - "https://schema.org/url": [ + "http://purl.org/dc/terms/contributor": [ { - "@value": "https://www.iso.org/standard/75281.html" + "@value": "Harshvardhan J. Pandit" } - ] - }, - { - "@id": "https://w3id.org/dpv/risk#IncidentSuspectedReport", - "@type": [ - "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ { - "@id": "https://w3id.org/dpv/risk#" + "@value": "0.32,xsd:decimal" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -18991,49 +20216,39 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv/risk#RiskMatrix5x5" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the suspicion of an incident in the past or occuring" + "@value": "Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-matrix-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Suspected Report" + "@value": "Moderate Risk (RM5x5 S:2 L:4)" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentAssessmentReport", + "@id": "https://w3id.org/dpv/risk#EnvironmentalRisk", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" - ], - "http://purl.org/dc/terms/created": [ - { - "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" - } + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ { "@id": "https://w3id.org/dpv/risk#" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ - { - "@id": "https://w3id.org/dpv/risk#IncidentReport" - } - ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ { "@language": "en", @@ -19042,32 +20257,33 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#IncidentReport" + "@id": "https://w3id.org/dpv#RiskConcept" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A report describing the assessment of an incident in terms of its effects or impacts" + "@value": "Risks and issues that have their origin in environment or can affect the environment at large" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Assessment Report" + "@value": "Environmental Risk" } ] }, { - "@id": "https://w3id.org/dpv/risk#IncidentRegister", + "@id": "https://w3id.org/dpv/risk#Fraud", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", - "http://www.w3.org/2000/01/rdf-schema#Class" + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -19077,17 +20293,23 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" } ], - "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + "http://purl.org/dc/terms/modified": [ { - "@id": "https://w3id.org/dpv/risk#" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" } ], - "http://www.w3.org/2000/01/rdf-schema#subClassOf": [ + "http://purl.org/dc/terms/source": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "_:Na49aef6e701446fe912e1e7c19c0f7f0" + } + ], + "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ + { + "@id": "https://w3id.org/dpv/risk#" } ], "http://www.w3.org/2003/06/sw-vocab-status/ns#term_status": [ @@ -19098,42 +20320,68 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv#RecordsOfActivities" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "A register recording incidentes, their reports, notifications, and other related activities" + "@value": "Something that acts as or causes Fraud" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#incident-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Incident Register" + "@value": "Fraud" } ] }, { - "@id": "https://w3id.org/dpv/risk#hasVulnerability", + "@id": "_:Na49aef6e701446fe912e1e7c19c0f7f0", "@type": [ - "http://www.w3.org/1999/02/22-rdf-syntax-ns#Property", - "http://www.w3.org/2004/02/skos/core#Concept" + "https://schema.org/WebPage" ], - "http://purl.org/dc/dcam/rangeIncludes": [ + "https://schema.org/name": [ { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "ISO/IEC 27005:2018" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.iso.org/standard/75281.html" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#SimpsonsParadoxBias", + "@type": [ + "http://www.w3.org/2004/02/skos/core#Concept", + "http://www.w3.org/2000/01/rdf-schema#Class", + "https://w3id.org/dpv/risk#RiskConcept" + ], + "http://purl.org/dc/terms/contributor": [ + { + "@value": "Daniel Doherty" } ], "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-02-14" + "@value": "2024-09-13" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@language": "en", + "@value": "ISO/IEC 24027:2021" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19147,35 +20395,35 @@ "@value": "accepted" } ], + "http://www.w3.org/2004/02/skos/core#broader": [ + { + "@id": "https://w3id.org/dpv/risk#DataBias" + } + ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Indicates the associated context (subject) has indicated vulnerability (object)" + "@value": "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#core-properties" + "@id": "https://w3id.org/dpv/risk#bias-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "has vulnerability" - } - ], - "https://schema.org/rangeIncludes": [ - { - "@id": "https://w3id.org/dpv/risk#Vulnerability" + "@value": "Simpson'S Paradox Bias" } ] }, { - "@id": "https://w3id.org/dpv/risk#ChangeImpact", + "@id": "https://w3id.org/dpv/risk#Cryptojacking", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv/risk#RiskControl" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -19185,7 +20433,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2024-05-19" + "@value": "2022-08-17" + } + ], + "http://purl.org/dc/terms/modified": [ + { + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:N37489c12dfc848018493bc0b4ca8a3a2" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19201,33 +20460,52 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#ImpactControl" + "@id": "https://w3id.org/dpv/risk#AvailabilityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Control that changes Impact" + "@value": "Something that acts as or causes Cryptojacking" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-controls-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Change Impact" + "@value": "Cryptojacking" } ] }, { - "@id": "https://w3id.org/dpv/risk#ExtremelyLowRisk", + "@id": "_:N37489c12dfc848018493bc0b4ca8a3a2", + "@type": [ + "https://schema.org/WebPage" + ], + "https://schema.org/name": [ + { + "@value": "ENISA Threat Landscape 2021" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021" + } + ] + }, + { + "@id": "https://w3id.org/dpv/risk#UnauthorisedCodeDisclosure", "@type": [ "http://www.w3.org/2004/02/skos/core#Concept", "http://www.w3.org/2000/01/rdf-schema#Class", - "https://w3id.org/dpv#RiskLevel" + "https://w3id.org/dpv#RiskConcept" ], "http://purl.org/dc/terms/contributor": [ { @@ -19237,12 +20515,18 @@ "http://purl.org/dc/terms/created": [ { "@type": "http://www.w3.org/2001/XMLSchema#date", - "@value": "2022-08-18" + "@value": "2022-08-17" } ], - "http://www.w3.org/1999/02/22-rdf-syntax-ns#value": [ + "http://purl.org/dc/terms/modified": [ { - "@value": "0.01,xsd:decimal" + "@type": "http://www.w3.org/2001/XMLSchema#date", + "@value": "2024-08-16" + } + ], + "http://purl.org/dc/terms/source": [ + { + "@id": "_:Nef4bef8d59b941d3948be26790d5a59f" } ], "http://www.w3.org/2000/01/rdf-schema#isDefinedBy": [ @@ -19258,30 +20542,43 @@ ], "http://www.w3.org/2004/02/skos/core#broader": [ { - "@id": "https://w3id.org/dpv/risk#7RiskLevels" + "@id": "https://w3id.org/dpv/risk#ConfidentialityConcept" + }, + { + "@id": "https://w3id.org/dpv/risk#ExternalSecurityThreat" } ], "http://www.w3.org/2004/02/skos/core#definition": [ { "@language": "en", - "@value": "Level where Risk is Extremely Low" + "@value": "Something that acts as or causes Unauthorised Code Disclosure" } ], "http://www.w3.org/2004/02/skos/core#inScheme": [ { - "@id": "https://w3id.org/dpv/risk#risk-levels-classes" + "@id": "https://w3id.org/dpv/risk#risk-consequences-classes" } ], "http://www.w3.org/2004/02/skos/core#prefLabel": [ { "@language": "en", - "@value": "Extremely Low Risk" + "@value": "Unauthorised Code Disclosure" } + ] + }, + { + "@id": "_:Nef4bef8d59b941d3948be26790d5a59f", + "@type": [ + "https://schema.org/WebPage" ], - "http://www.w3.org/2004/02/skos/core#scopeNote": [ + "https://schema.org/name": [ { - "@language": "en", - "@value": "The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1" + "@value": "ENISA Methodology for Sectoral Cybersecurity Assessments" + } + ], + "https://schema.org/url": [ + { + "@value": "https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment" } ] } diff --git a/2.1-dev/risk/risk.n3 b/2.1-dev/risk/risk.n3 index 77b4ed346..f2f9ba46b 100644 --- a/2.1-dev/risk/risk.n3 +++ b/2.1-dev/risk/risk.n3 @@ -208,6 +208,19 @@ risk:Benefit a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Benefit"@en . +risk:Bias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RiskConcept ; + skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Bias"@en . + risk:Blackmail a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -284,6 +297,19 @@ risk:Coercion a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Coercion"@en . +risk:CognitiveBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Cognitive Bias"@en . + risk:Compensation a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -385,6 +411,32 @@ risk:ConfidentialityIncident a rdfs:Class, skos:inScheme risk:incident-classes ; skos:prefLabel "Confidentiality Incident"@en . +risk:ConfirmationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Confirmation Bias"@en . + +risk:ConfoundingVariablesBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Confounding Variables Bias"@en . + risk:ConsequenceControl a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -424,6 +476,19 @@ risk:CopyrightViolation a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Copyright Violation"@en . +risk:CoverageBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Coverage Bias"@en . + risk:CrossBorderIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -465,6 +530,32 @@ risk:Damage a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Damage"@en . +risk:DataAggregationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Data Aggregation Bias"@en . + +risk:DataBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Data Bias"@en . + risk:DataBreach a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -504,6 +595,19 @@ risk:DataCorruption a rdfs:Class, skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . +risk:DataProcessingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Data Processing Bias"@en . + risk:DeliberateIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -844,6 +948,19 @@ risk:Fraud a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fraud"@en . +risk:GroupAttributionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Group Attribution Bias"@en . + risk:HaltSource a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -1008,6 +1125,32 @@ risk:ImpactControl a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Impact Control"@en . +risk:ImplicitBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Implicit Bias"@en . + +risk:InGroupBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "In-Group Bias"@en . + risk:Incident a rdfs:Class, skos:Concept ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; @@ -1297,6 +1440,19 @@ risk:IndividualRisk a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Individual Risk"@en . +risk:InformativenessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:EngineeringDecisionBias ; + skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Informativeness Bias"@en . + risk:Injury a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -1763,6 +1919,32 @@ risk:NonMaterialDamage a rdfs:Class, skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk:NonNormalityBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Non-Normality Bias"@en . + +risk:NonResponseBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Non-Response Bias"@en . + risk:OperationalSecurityRisk a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -1773,6 +1955,19 @@ risk:OperationalSecurityRisk a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Operational Security Risk"@en . +risk:OutGroupHomogeneityBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Out-Group Homogeneity Bias"@en . + risk:Payment a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -3095,6 +3290,20 @@ risk:ReputationalRisk a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Reputational Risk"@en . +risk:RequirementsBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs in or during requirements creation"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Requirements Bias"@en ; + skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . + risk:Reward a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -3281,6 +3490,20 @@ risk:RiskSource a rdfs:Class, skos:inScheme risk:core-classes ; skos:prefLabel "Risk Source"@en . +risk:RuleBasedSystemDesign a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Rule-Based System Design"@en ; + skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . + risk:Sabotage a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -3299,6 +3522,19 @@ risk:Sabotage a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sabotage"@en . +risk:SamplingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Sampling Bias"@en . + risk:Scam a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -3348,6 +3584,19 @@ risk:SecurityBreach a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Breach"@en . +risk:SelectionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Selection Bias"@en . + risk:SexualViolence a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -3376,6 +3625,19 @@ risk:ShareRisk a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Share Risk"@en . +risk:SimpsonsParadoxBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Simpson'S Paradox Bias"@en . + risk:SocialDisadvantage a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -3389,6 +3651,19 @@ risk:SocialDisadvantage a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Social Disadvantage"@en . +risk:SocietalBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Societal Bias"@en . + risk:SocietalHealthSafety a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -3442,6 +3717,19 @@ risk:Spoofing a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Spoofing"@en . +risk:StatisticalBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO 20501:2019"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Statistical Bias"@en . + risk:SystemFailure a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -4034,6 +4322,7 @@ risk:Vulnerability a rdfs:Class, "http://www.w3.org/2004/02/skos/core" ; dct:contributor "Axel Polleres", "Beatriz Esteves", + "Daniel Doherty", "Delaram Golpayegani", "Fajar Ekaputra", "Georg P. Krog", @@ -4275,6 +4564,8 @@ risk:core-properties a skos:ConceptScheme . risk:incident-classes a skos:ConceptScheme . +risk:bias-classes a skos:ConceptScheme . + risk:risk-controls-classes a skos:ConceptScheme . risk:risk-levels-classes a skos:ConceptScheme . diff --git a/2.1-dev/risk/risk.rdf b/2.1-dev/risk/risk.rdf index 5127ad1f1..9dadc7d76 100644 --- a/2.1-dev/risk/risk.rdf +++ b/2.1-dev/risk/risk.rdf @@ -13,128 +13,88 @@ xmlns:sw="http://www.w3.org/2003/06/sw-vocab-status/ns#" xmlns:vann="http://purl.org/vocab/vann/" > - - - - - Moderate Likelihood - Level where Likelihood is Moderate - - - - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - - - - - External Security Threat - Concepts associated with security threats that are likely to originate externally - - accepted - - - - - - - Threat - Risk source event which causes Risk - - - 2024-02-14 - accepted - - - - + - Low Risk (RM7x7 S:7 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low + Moderate Risk (RM7x7 S:6 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate - 0.14,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Social Disadvantage - Something that acts as or causes Social Disadvantage - - 2022-08-19 + Sabotage + Something that acts as or causes Sabotage + + + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog + Harshvardhan J. Pandit - + - - Extremely High Risk (RM7x7 S:5 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.71,xsd:decimal - 2022-08-17 + + Non-Normality Bias + Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty - + - + - Extremely Low Severity - Level where Severity is Extremely Low + Extremely High Severity + Level where Severity is Extremely High - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - - High Severity - Level where Severity is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 2022-08-18 + Deliberate Incident + Incident caused due to deliberate actions of a human + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - Public Order Breach - Something that acts as or causes Public Order Breach - - + Unauthorised System Access + Something that acts as or causes Unauthorised System Access + + + + 2022-08-17 2024-08-16 accepted @@ -142,103 +102,98 @@ - + - - Detection Control - Control to detect event - + Incident Detection Report + A report describing the detection of a Incident + + 2024-05-19 accepted - + - + - High Risk (RM7x7 S:3 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + Low Risk (RM7x7 S:3 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - 0.37,xsd:decimal + 0.18,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Impact to Rights - Something that acts as or causes Impact to Rights - - - This concept was called "ImpactToRights" in DPV 2.0 - + + High Risk (RM7x7 S:3 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High + + 0.31,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - High Likelihood - Level where Likelihood is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 2022-08-18 + + Unauthorised Data Modification + Something that acts as or causes Unauthorised Data Modification + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - High Risk (RM7x7 S:6 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - - 0.37,xsd:decimal - 2022-08-17 + + Statistical Bias + Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates + + ISO 20501:2019 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty - + - + - Low Risk (RM7x7 S:4 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low - - 0.16,xsd:decimal + High Risk (RM5x5 S:4 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.48,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Unauthorised Resource Use - Something that acts as or causes Unauthorised Resource Use - - - + Lose of Opportunity + Something that acts as or causes Loss of Opportunity + + 2022-08-17 2024-08-16 accepted @@ -246,134 +201,119 @@ - + - - Low Risk - Level where Risk is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + + Extremely High Likelihood + Level where Likelihood is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - Low Risk (RM5x5 S:2 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.16,xsd:decimal + Very High Risk (RM7x7 S:6 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + + 0.61,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - is exploited by - Indicates the vulnerability (subject) is exploited by the indicated threat (object) - - - - - 2024-02-14 - accepted - - - - + - Benefit - Something that acts as or causes benefits - - 2022-03-23 + Sexual Violence + Something that acts as or causes Sexual Violence + + + 2022-08-17 2024-08-16 accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres + Harshvardhan J. Pandit - + + - - - Unwanted Data Deletion - Something that acts as or causes Unwanted Data Deletion - - - - - 2022-08-17 - 2024-08-16 + has threat source + Indicates the threat (subject) has the indicated source (object) + + + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + - - Moderate Risk (RM3x3 S:2 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - - 0.44,xsd:decimal - 2022-08-17 + + Very Low Severity + Level where Severity is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - High Risk (RM7x7 S:3 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: High - - 0.31,xsd:decimal + + Violating Ethics Code + Something that acts as or causes Violation of Ethics Code + + This concept was called "ViolationEthicalCode" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - + - + - Very Low Risk (RM7x7 S:5 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low + Low Risk (RM7x7 S:7 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely Low; and Risk Level: Low - 0.10,xsd:decimal + 0.14,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Unauthorised Code Access - Something that acts as or causes Unauthorised Code Access + Identity Theft + Something that acts as or causes Identity Theft - - - + + 2022-08-17 2024-08-16 accepted @@ -381,55 +321,76 @@ - + + + + Availability Incident + Incident where the availability of information or system has been affected + + + 2024-05-19 + accepted + + + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - Phishing Scam - Something that acts as or causes Phishing Scam - - - - 2022-08-17 - 2024-08-16 + Accidental Misuse + Accidental Misuse + accepted - Harshvardhan J. Pandit - - - - - - - Risk Concepts - RDF/XML serialiation + + + + + Informativeness Bias + Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - Low Likelihood - Level where Likelihood is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 2022-08-18 + + Psychological Harm + Something that acts as or causes Psychological Harm + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Very High Risk - Level where Risk is Very High - - + + Very High Severity + Level where Severity is Very High + + 0.9,xsd:decimal The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 2022-08-18 @@ -438,202 +399,325 @@ - + - High Risk (RM5x5 S:3 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + Very High Risk (RM5x5 S:5 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - 0.48,xsd:decimal + 0.80,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Unauthorised System Access - Something that acts as or causes Unauthorised System Access - - - - + + Extremely Low Risk (RM7x7 S:3 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + + 0.06,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Legal Risk - Risks and issues that have their basis in legal requirements and enforcement - + Compromise Account Credentials + Something that acts as or causes Account Credentials to be compromised + + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - - Copyright Violation - Something that acts as or causes Copyright Violation - - - 2022-08-17 - 2024-08-16 + + Data Bias + Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty - + - + - Financial Loss - Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity - - + Violating Code of Conduct + Something that acts as or causes Violation of Code of Conduct + + This concept was called "ViolationCodeConduct" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - - Moderate Risk (RM5x5 S:4 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.32,xsd:decimal - 2022-08-17 + + Societal Health & Safety + accepted - Harshvardhan J. Pandit - + - + - - Very High Likelihood - Level where Likelihood is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + + Prevent Exercising of Rights + Something that acts as or causes Prevent Exercising of Rights + + This concept was called "PreventExercisingOfRights" in DPV 2.0 2022-08-18 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - + - - Moderate Risk (RM7x7 S:7 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - - 0.29,xsd:decimal + + Physical Assault + Something that acts as or causes Physical Assault + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Security Breach - Something that acts as or causes Security Breach - + Data Corruption + Something that acts as or causes Corruption of Data - - + This concept was called "Corruption Data" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:2 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate - - 0.24,xsd:decimal + Very Low Risk (RM5x5 S:2 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Moderate Risk (RM7x7 S:5 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + Very Low Risk (RM7x7 S:1 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - 0.31,xsd:decimal + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Authorisation Failure - Something that acts as or causes Authorisation Failure + Intercept Communications + Something that acts as or causes Interception of Communications - - - + + This concept was called "InterceptionCommunications" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + 3 Severity Levels + Scale with 3 Severity Levels from High to Low + + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + Moderate Risk (RM5x5 S:4 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.32,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Extremely High Risk (RM7x7 S:5 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely High; and Risk Level: Extremely High + + 0.71,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Extremely Low Risk (RM7x7 S:1 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low + + 0.06,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + - Impact Control - Risk Mitigation Measure that controls Impacts - + Monitor Control + Control that monitors another Control + 2024-05-19 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + exploits vulnerability + Indicates the threat (subject) exploits the indicated vulnerability (object) + + + + + 2024-02-14 + accepted + + + + + + + + Very Low Risk (RM7x7 S:5 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Extremely Low; and Risk Level: Very Low + + 0.10,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Lose of Trust + Something that acts as or causes Loss of Trust + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + Risk Control + Control that modifies risk + + + 2024-05-19 + accepted + + + + + + + + + Requirements Bias + Bias that occurs in or during requirements creation + + Requirements bias also represents occasions for the human cognitive biases to manifest + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + @@ -663,15 +747,16 @@ Data Privacy Vocabulary (DPV) -- Version 2. Harshvardhan J. Pandit, Beatriz Esteves, Georg P. Krog, Paul Ryan, Delaram Golpayegani, Julian Flake https://doi.org/10.48550/arXiv.2404.13426 - Julio Fernandez + Harshvardhan J. Pandit Delaram Golpayegani + Julian Flake + Georg P. Krog Beatriz Esteves - Harshvardhan J. Pandit - Rob Brennan + Daniel Doherty Fajar Ekaputra Axel Polleres - Julian Flake - Georg P. Krog + Rob Brennan + Julio Fernandez risk https://w3id.org/dpv/risk# @@ -687,72 +772,100 @@ - + - - Identification Control - Control to identify characteristics of event - - 2024-05-19 + + Very High Risk (RM5x5 S:3 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + + 0.60,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - Unauthorised Re-Identification - Something that acts as or causes Unauthorised Re-Identification + Authorisation Failure + Something that acts as or causes Authorisation Failure + + + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + Scam + Something that acts as or causes Scam - 2022-08-19 + + 2022-08-17 2024-08-16 accepted - Georg P. Krog + Harshvardhan J. Pandit - + - - Incident Status Unknown - The status of a incident is unknown - - 2024-02-14 + Incident Impact Assessment + An impact assessment associated with a incident + + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + + + + Incident Report + Documented information about an incident, its handling, assessments,and notifications + + + 2024-05-19 + accepted + + + + - Unauthorised Data Modification - Something that acts as or causes Unauthorised Data Modification + Unauthorised Activity + Something that acts as or causes Unauthorised Activity + + - - 2022-08-17 - 2024-08-16 accepted - Harshvardhan J. Pandit - + - Equipment Failure - Something that acts as or causes Equipment Failure - - - Here equipment refers to physical equipment - + Lose of Goodwill + Something that acts as or causes Loss of Goodwill + + 2022-08-17 2024-08-16 accepted @@ -760,231 +873,267 @@ - + - Discrimination - Something that acts as or causes Discrimination - - 2022-08-19 + Illegal Data Processing + Something that acts as or causes Illegal Processing of Data + + This concept was called "IllegalProcessingData" in DPV 2.0 + + 2022-08-17 2024-08-16 accepted - Georg P. Krog + Harshvardhan J. Pandit - + - Very High Risk (RM7x7 S:6 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High + Very Low Risk (RM7x7 S:6 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low - 0.61,xsd:decimal + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Extremely High Severity - Level where Severity is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 2022-08-18 + + Non-Response Bias + Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Very Low Risk (RM7x7 S:3 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.12,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + + + + + Reduce Likelihood + Control that reduces the likelihood of an event + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + - Denial of Service Attack (DoS) - Something that acts as or causes Denial of Service Attack (DoS) - - - - 2022-08-17 + Social Disadvantage + Something that acts as or causes Social Disadvantage + + 2022-08-19 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog - + + + + + Extremely Low Likelihood + Level where Likelihood is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + + + + + Examples for Data Privacy Vocabulary + + + + - High Risk (RM3x3 S:3 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - - 0.67,xsd:decimal + Very High Risk (RM7x7 S:5 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + + 0.51,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Monitor Risk Source - Control that monitors a Risk Source - - 2024-05-19 + + Financial Impact + Things that cause or have the potential to impact financial resources + accepted - Harshvardhan J. Pandit - + - + - Moderate Risk - Level where Risk is Moderate + High Risk + Level where Risk is High - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - - Compromise Account - Something that acts as or causes a compromised account that is then used by the compromiser - - - - - + + Moderate Risk (RM7x7 S:5 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.31,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Remove Source - Control that removes the risk source - - 2024-05-19 + + Individual Health & Safety + accepted - Harshvardhan J. Pandit - + - + - Lose of Trust - Something that acts as or causes Loss of Trust - - - 2022-08-17 - 2024-08-16 + + accepted - Harshvardhan J. Pandit - + - - Intercept Communications - Something that acts as or causes Interception of Communications - - - This concept was called "InterceptionCommunications" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit + Threat + Risk source event which causes Risk + + + 2024-02-14 + accepted - + - + - Risk Matrix 7x7 - A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types - + Very High Risk (RM7x7 S:3 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High + + 0.43,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Violating Policy - Something that acts as or causes violation of policy which can be either internal or external policy - + + Monitor Vulnerabilities + Control that monitors a Risk Vulnerability + + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - Incident Identifier - Identifier associated with an incident - - 2024-05-19 + + Copyright Violation + Something that acts as or causes Copyright Violation + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - Share Risk - Risk Mitigation Measure that shares Risk e.g. amongst stakeholders + Monitor Control + Risk Mitigation Measure that uses controls to monitor events + Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. 2024-05-19 accepted Harshvardhan J. Pandit - + - Unauthorised Access to Premises - Something that acts as or causes Unauthorised Access to Premises + Confidentiality Breach + Something that acts as or causes Confidentiality Breach - - - - + + 2022-08-17 2024-08-16 accepted @@ -992,203 +1141,209 @@ - + - Unauthorised Data Disclosure - Something that acts as or causes Unauthorised Data Disclosure - - - - 2022-08-17 - 2024-08-16 + Judicial Penalty + Something that involves or causes judicial penalties to be paid + accepted - Harshvardhan J. Pandit - + - - Incident Concluded - The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring - - 2024-02-14 + + Reputational Risk + Risks and issues that affect the reputation of the organisation + accepted - Harshvardhan J. Pandit - + - + - Incident Mitigation Measure - A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again - - - 2024-05-19 + Risk Source + The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk + + + 2024-02-14 + 2024-08-16 accepted - + - - + - is vulnerability of - Indicates the vulnerability (subject) is associated with indicated context (object) - - - 2024-02-14 + + + In-Group Bias + Bias that occurs when showing partiality to one's own group or own characteristics + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty - + - + - Low Risk (RM7x7 S:2 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - - 0.20,xsd:decimal + Moderate Risk (RM3x3 S:1 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + + 0.33,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Limitation of Rights - Something that acts as or causes Limitation of Rights - - This concept was called "LimitationOfRights" in DPV 2.0 - 2022-08-18 + Remuneration + Something that acts as or provides renumeration which is in monetary or financial form + + 2024-04-14 2024-08-16 accepted Georg P. Krog, Harshvardhan J. Pandit - + - Remuneration - Something that acts as or provides renumeration which is in monetary or financial form - - 2024-04-14 + Malicious Code Attack + Something that acts as or causes Malicious Code Attack + + + + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - - Risk Matrix - Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. - - - 2024-02-14 + + Brute Force Authorisations + Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques + + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + + + + is exploited by + Indicates the vulnerability (subject) is exploited by the indicated threat (object) + + + + + 2024-02-14 + accepted + + + + - - Very Low Risk (RM5x5 S:2 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - - 0.08,xsd:decimal - 2022-08-17 + Environmental Incident + Incident caused due to environmental factors outside human controls + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - Extremely Low Risk (RM7x7 S:1 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Low; and Risk Level: Extremely Low - - 0.06,xsd:decimal + Very Low Risk (RM5x5 S:3 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low + + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Extremely High Risk (RM7x7 S:6 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High - - 0.86,xsd:decimal - 2022-08-17 + + Bias + Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty - + - + - Extremely Low Risk (RM7x7 S:3 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + Extremely High Risk (RM7x7 S:6 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High - 0.06,xsd:decimal + 0.73,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Security Attack - Something that acts as or causes an attack on security with the aim of undermining it - - - - + + Simpson'S Paradox Bias + Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty - - - - - - - - - Risk Concepts - JSON-LD serialiation + - + - Exposure to Harmful Speech - Something that acts as or causes Harmful Speech - - This concept was called "HarmfulSpeech" in DPV 2.0 - + Distributed Denial of Service Attack (DDoS) + Something that acts as or causes Distributed Denial of Service Attack (DDoS) + + + 2022-08-17 2024-08-16 accepted @@ -1196,82 +1351,77 @@ - - - - Risk Analysis - A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures - - - - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - + - Violation of Statutory Obligations - Something that acts as or causes Violation of Statutory Obligations - - This concept was called "ViolationStatutoryObligations" in DPV 2.0 - - 2022-08-17 + Fee + Something that acts as or provides fees e.g. for using a service + + DGA 2.10 + 2024-04-14 2024-08-16 modified - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - Incident Impact Assessment - An impact assessment associated with a incident - - - 2024-05-19 + + Identity Fraud + Something that acts as or causes Identity Fraud + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - 5 Likelihood Levels - Scale with 5 Likelihood Levels from Very High to Very Low - - 2022-08-18 + + Denial of Service Attack (DoS) + Something that acts as or causes Denial of Service Attack (DoS) + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Environmental Incident - Incident caused due to environmental factors outside human controls - - - 2024-05-19 + + Moderate Risk (RM3x3 S:2 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + 0.44,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - Human Errors - Something that acts as or causes Human Errors - - + Equipment Malfunction + Something that acts as or causes Equipment Malfunction + + + Here equipment refers to physical equipment + 2022-08-17 2024-08-16 accepted @@ -1279,178 +1429,147 @@ - - - - + - - Moderate Risk (RM5x5 S:3 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate - - 0.36,xsd:decimal - 2022-08-17 + + Re-identification + Something that acts as or causes Re-identification + + + Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification + 2022-08-19 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Low Risk (RM5x5 S:1 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low + Very High Risk (RM5x5 S:4 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - 0.20,xsd:decimal + 0.64,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Illegal Data Processing - Something that acts as or causes Illegal Processing of Data + Damage + Something that acts as or causes Damage - This concept was called "IllegalProcessingData" in DPV 2.0 - - 2022-08-17 + 2022-03-30 2024-08-16 accepted Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - - - - - - Risk Concepts - HTML serialiation - - + - - Very Low Risk (RM7x7 S:1 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - - 0.10,xsd:decimal + + Exposure to Harmful Speech + Something that acts as or causes Harmful Speech + + This concept was called "HarmfulSpeech" in DPV 2.0 + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - - - - - - Incident Concluding Report - A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known - - - 2024-05-19 - accepted - - + - + - Very Low Risk (RM5x5 S:1 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low - - 0.12,xsd:decimal + High Risk (RM3x3 S:3 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High + + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Identity Fraud - Something that acts as or causes Identity Fraud + Security Attack + Something that acts as or causes an attack on security with the aim of undermining it - - - 2022-08-17 - 2024-08-16 + + + accepted - Harshvardhan J. Pandit - + - Violating Code of Conduct - Something that acts as or causes Violation of Code of Conduct - - This concept was called "ViolationCodeConduct" in DPV 2.0 - + Blackmail + Something that acts as or causes Blackmail + + + 2022-08-17 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - - High Risk (RM5x5 S:5 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High - - 0.60,xsd:decimal - 2022-08-17 + + Halt Source + Control that halts the risk source or prevents it from materialising + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Malicious Code Attack - Something that acts as or causes Malicious Code Attack - - - - - + + Low Risk (RM3x3 S:1 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low + + 0.22,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Lose of Customer Confidence - Something that acts as or causes Loss of Customer Confidence - - + Unauthorised Code Access + Something that acts as or causes Unauthorised Code Access + + + + 2022-08-17 2024-08-16 accepted @@ -1458,36 +1577,25 @@ - - - - - Societal Risk - Risks and issues that affect or have the potential to affect society at large or specific groups in society - - accepted - - - - + - Low Risk (RM5x5 S:4 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - - 0.16,xsd:decimal + Extremely High Risk (RM7x7 S:7 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High + + 0.99,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Integrity Incident - Incident where the integrity of information or system has been affected + Confidentiality Incident + Incident where the confidentiality of information or system has been affected 2024-05-19 @@ -1495,22 +1603,6 @@ - - - - - Cryptojacking - Something that acts as or causes Cryptojacking - - - - 2022-08-17 - 2024-08-16 - accepted - Harshvardhan J. Pandit - - - @@ -1523,140 +1615,136 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + - - - Very High Risk (RM5x5 S:4 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High - - 0.80,xsd:decimal - 2022-08-17 + caused by vulnerability + Indicates the associated context (subject) is caused by the indicated vulnerability (object) + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + + - - - Data Breach - Something that acts as or causes Data Breach - - - - - - 2022-08-17 - 2024-08-16 + is vulnerability of + Indicates the vulnerability (subject) is associated with indicated context (object) + + + 2024-02-14 accepted - Harshvardhan J. Pandit - - - + - + + + ENISa Trust Services Security Incidents 2021 + https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 + + - Scam - Something that acts as or causes Scam - - - - 2022-08-17 + Material Damage + Something that acts as or causes Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 2024-08-16 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Judicial Penalty - Something that involves or causes judicial penalties to be paid - - accepted - - - - + - - Moderate Risk (RM3x3 S:3 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate - - 0.33,xsd:decimal - 2022-08-17 + + Incident Concluded + The incident has stopped or finished or concluded without any active mitigation and with a low likelihood of resuming or recurring + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - - Monitor Control - Risk Mitigation Measure that uses controls to monitor events - - Monitoring can be associated with characteristics such as assessing or detecting whether something is active, operational, performant, effective, has potential to materialise, is materialising, or has already materialised. - 2024-05-19 + + Data Breach + Something that acts as or causes Data Breach + + + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit + + - + - + - Erroneous System Use - Something that acts as or causes Erroneous System Use - - - 2022-08-17 + Violation of Rights + Something that acts as or causes Violation of Rights + + This concept was called "ViolationOfRights" in DPV 2.0 + 2022-08-18 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - - Accidental Misuse - Accidental Misuse - + + Out-Group Homogeneity Bias + Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty - + - + - Moderate Risk (RM5x5 S:2 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + Low Risk (RM5x5 S:1 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - 0.32,xsd:decimal + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + @@ -1664,7 +1752,7 @@ Lose of Reputation Something that acts as or causes Loss of Reputation - + 2022-08-17 2024-08-16 accepted @@ -1672,87 +1760,105 @@ - + - Lose of Goodwill - Something that acts as or causes Loss of Goodwill - - + Violation of Legal Obligations + Something that acts as or causes Violation of Legal Obligations + + This concept was called "ViolationRegulatoryObligations" in DPV 2.0 + 2022-08-17 2024-08-16 - accepted + modified Harshvardhan J. Pandit - + - Privacy - + Impact to Rights + Something that acts as or causes Impact to Rights + + + This concept was called "ImpactToRights" in DPV 2.0 + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Cross-Border Incident - Incident involving cross-border or multiple jurisdictions - - - 2024-05-19 + Risk Assessment + Assessment of risk involving its identification, analysis, and evaluation + + + ISO 31073:2022 Risk management vocabulary + 2024-02-14 accepted - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - Prevent Exercising of Rights - Something that acts as or causes Prevent Exercising of Rights - - This concept was called "PreventExercisingOfRights" in DPV 2.0 + + 5 Risk Levels + Scale with 5 Risk Levels from Very High to Very Low + 2022-08-18 - 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + - + - - Very High Severity - Level where Severity is Very High - - - 0.9,xsd:decimal - The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + + Low Risk (RM3x3 S:1 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 0.11,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + 3 Risk Levels + Scale with 3 Risk Levels from High to Low + 2022-08-18 accepted Harshvardhan J. Pandit - + - Lose of Opportunity - Something that acts as or causes Loss of Opportunity + Lose of Customer Confidence + Something that acts as or causes Loss of Customer Confidence - + 2022-08-17 2024-08-16 accepted @@ -1760,203 +1866,185 @@ - - - - has threat source - Indicates the threat (subject) has the indicated source (object) - - - - - 2024-02-14 - accepted - - - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - Violation of Contractual Obligation - Something that acts as or causes Violation of Contractual Obligations - - This concept was called "ViolationContractualObligations" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified + + 5 Likelihood Levels + Scale with 5 Likelihood Levels from Very High to Very Low + + 2022-08-18 + accepted Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + - - Very High Risk (RM5x5 S:5 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: High; and Risk Level: Very High - - 0.80,xsd:decimal - 2022-08-17 + + 3 Likelihood Levels + Scale with 3 Likelihood Levels from High to Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - Financial Impact - Things that cause or have the potential to impact financial resources - + + Low Likelihood + Level where Likelihood is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - - Reduce Severity - Control that reduces the severity of an event - + Incident Identifier + Identifier associated with an incident + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Data Corruption - Something that acts as or causes Corruption of Data - - - This concept was called "Corruption Data" in DPV 2.0 - + + High Risk (RM7x7 S:5 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.41,xsd:decimal 2022-08-17 - 2024-08-16 - modified + accepted Harshvardhan J. Pandit - + - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - - Moderate Severity - Level where Severity is Moderate - - - - 0.5,xsd:decimal - The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 - 2022-08-18 + + Monitor Risk Source + Control that monitors a Risk Source + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Lose of Negotiating Capacity - Something that acts as or causes Loss of Negotiating Capacity - - + + High Risk (RM5x5 S:5 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: High + + 0.60,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit + + + + + + + + + accepted + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + + + + + Misuse + Something that acts as or causes Misuse + + 2024-06-11 + 2024-08-16 + accepted + Delaram Golpayegani + + - + - - Low Risk (RM3x3 S:1 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.11,xsd:decimal - 2022-08-17 + + Incident Status Unknown + The status of a incident is unknown + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - Very Low Risk (RM7x7 S:1 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low + Moderate Risk (RM7x7 S:3 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - 0.12,xsd:decimal + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - High Risk (RM3x3 S:3 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: High - - 0.99,xsd:decimal + Extremely Low Risk (RM7x7 S:1 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low + + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - - - Component Failure - Something that acts as or causes Component Failure - - - Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of - accepted - - - - + - Unwanted Code Deletion - Something that acts as or causes Unwanted Code Deletion - + Cryptojacking + Something that acts as or causes Cryptojacking - + 2022-08-17 2024-08-16 accepted @@ -1964,72 +2052,64 @@ - + - Risk Source - The 'cause' or 'source', which by itself or with another source has the potential to give rise to risk - - - 2024-02-14 - 2024-08-16 + + Moderate Risk (RM5x5 S:2 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate + + 0.24,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - - Extremely High Risk - Level where Risk is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 + + Very High Likelihood + Level where Likelihood is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + - - High Risk (RM7x7 S:5 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High - - 0.41,xsd:decimal - 2022-08-17 + + Societal Risk + Risks and issues that affect or have the potential to affect society at large or specific groups in society + accepted - Harshvardhan J. Pandit - + - + - Unauthorised Activity - Something that acts as or causes Unauthorised Activity - + Unwanted Code Deletion + Something that acts as or causes Unwanted Code Deletion + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - ENISa Trust Services Security Incidents 2021 - https://www.enisa.europa.eu/publications/trust-services-security-incidents-2021 - @@ -2040,8 +2120,8 @@ - - + + 2022-08-17 2024-08-16 accepted @@ -2049,103 +2129,104 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - High Risk - Level where Risk is High - - - - 0.75,xsd:decimal - The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 - 2022-08-18 + + Very Low Risk (RM5x5 S:1 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low + + 0.08,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Blackmail - Something that acts as or causes Blackmail - - - + + Moderate Risk (RM5x5 S:2 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate + + 0.32,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Component Malfunction - Something that acts as or causes Component Malfunction - - - Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of + + Moderate Risk (RM5x5 S:3 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: Moderate + + 0.36,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - - 5 Risk Levels - Scale with 5 Risk Levels from Very High to Very Low - - 2022-08-18 - accepted - Harshvardhan J. Pandit - - + + Extremely High Risk (RM7x7 S:6 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely High; and Risk Level: Extremely High + + 0.86,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + - + - - Change Impact - Control that changes Impact - - 2024-05-19 + + Extremely Low Severity + Level where Severity is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Accidental Incident - Incident caused due to accidental actions arising from human or human-controlled situations - - - 2024-05-19 + + Unauthorised Resource Use + Something that acts as or causes Unauthorised Resource Use + + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - Lose of Credibility - Something that acts as or causes Loss of Credibility - - + Unauthorised Access to Premises + Something that acts as or causes Unauthorised Access to Premises + + + + + 2022-08-17 2024-08-16 accepted @@ -2153,72 +2234,84 @@ - + + + + + Coverage Bias + Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + - Very High Risk (RM7x7 S:3 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Extremely High; and Risk Level: Very High - - 0.43,xsd:decimal + High Risk (RM3x3 S:2 L:3) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + 0.67,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Very High Risk (RM7x7 S:4 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - 0.49,xsd:decimal + High Risk (RM3x3 S:3 L:2) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + + 0.67,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Recovery Control - Control to recover from event - - 2024-05-19 + + Incident Near Miss + The state where an incident was almost successful in taking place i.e. "it came very close" + + 2024-02-14 accepted + Harshvardhan J. Pandit - + - + - - Very Low Severity - Level where Severity is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 + + Financial Loss + Something that acts as or causes Financial Loss which may be actual loss of existing financial assets or hypothetical loss of financial opportunity + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - System Failure - Something that acts as or causes System Failure - - - Here system refers to both hardware and software systems - + Lose of Negotiating Capacity + Something that acts as or causes Loss of Negotiating Capacity + + 2022-08-17 2024-08-16 accepted @@ -2226,401 +2319,415 @@ - + - Unauthorised Data Access - Something that acts as or causes Unauthorised Data Access - - - - 2022-08-17 + Detriment + Something that acts as or causes Detriment + + 2022-03-23 2024-08-16 accepted - Harshvardhan J. Pandit + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves - + - Incident Suspected Report - A report describing the suspicion of an incident in the past or occuring - - - 2024-05-19 + + Extremely High Risk (RM7x7 S:7 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + + 0.86,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - Physical Assault - Something that acts as or causes Physical Assault + Harm + Something that acts as or causes Harm to humans - - 2022-08-17 + This concept refers to the general abstract notion of harm + 2022-08-13 2024-08-16 accepted Harshvardhan J. Pandit - + - - Avoid Source - Control that avoids the risk source - - 2024-05-19 + + Lose of Credibility + Something that acts as or causes Loss of Credibility + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - refers to risk - Indicates the incident (subject) is a materialisation of the indicated risk (object) - - - - - 2024-02-14 + + + Moderate Severity + Level where Severity is Moderate + + + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 2022-08-18 accepted - + Harshvardhan J. Pandit - + - + - - Low Risk (RM7x7 S:3 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low - - 0.18,xsd:decimal - 2022-08-17 + + Data Aggregation Bias + Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty - + - + - Extremely Low Risk (RM7x7 S:1 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low - - 0.02,xsd:decimal + Low Risk (RM5x5 S:2 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Low; and Risk Level: Low + + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Low Risk (RM5x5 S:1 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low - - 0.16,xsd:decimal + + Violence against children + Something that acts as or causes Child Violence + + This concept was called "ChildViolence" in DPV 2.0 + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - Deliberate Incident - Incident caused due to deliberate actions of a human - - + + Remedy Control + Control to remedy consequences of event + 2024-05-19 accepted - + - + - - Incident Mitigated - The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring - - 2024-02-14 + Risk Management + Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk + + ISO 31073:2022 Risk management vocabulary + 2024-06-12 accepted - Harshvardhan J. Pandit - - - - - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + - + - Risk Matrix 3x3 - A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types - + Low Risk (RM7x7 S:2 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: High; and Risk Level: Low + + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - Extremely Low Risk (RM7x7 S:2 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low - - 0.08,xsd:decimal - 2022-08-17 + + Containment Control + Control to contain event + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Unauthorised Code Disclosure - Something that acts as or causes Unauthorised Code Disclosure - - - - 2022-08-17 - 2024-08-16 + + Incident Halted + The incident has halted or paused with a high likelihood of resuming or recurring + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + - - Malware Attack - Something that acts as or causes Malware Attack - - - - - - 2022-08-17 - 2024-08-16 + Incident Register + A register recording incidentes, their reports, notifications, and other related activities + + + 2024-05-19 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - - 7 Severity Levels - Scale with 7 Severity Levels from Extremely High to Extremely Low - - 2022-08-18 + + Group Attribution Bias + Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty - + - + - Extremely High Risk (RM7x7 S:6 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Extremely High + Very Low Risk (RM7x7 S:1 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: High; and Risk Level: Very Low - 0.73,xsd:decimal + 0.10,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Low Risk (RM7x7 S:1 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low + Moderate Risk (RM7x7 S:7 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very Low; and Risk Level: Moderate - 0.14,xsd:decimal + 0.29,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - - + Discrimination + Something that acts as or causes Discrimination + + 2022-08-19 + 2024-08-16 accepted + Georg P. Krog - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + - - - Incident Suspected - The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing - + caused by threat + Indicates the cause of associated context (subject) was the indicated threat (object) + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + - Very Low Risk (RM5x5 S:3 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Very Low - - 0.12,xsd:decimal + Low Risk (RM3x3 S:2 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low + + 0.22,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Monitor Impact - Control that monitors a Risk Impact - - 2024-05-19 + + Extremely High Risk (RM7x7 S:7 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High + + 0.71,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + - + - - Unauthorised System Modification - Something that acts as or causes Unauthorised System Modification - - - - 2022-08-17 - 2024-08-16 + Risk Analysis + A technique or method used to analyse and identify risk levels, sources, likelihoods, severities, and other necessary information required to conduct risk management procedures + + + + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Very High Risk (RM5x5 S:5 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High + High Risk (RM5x5 S:5 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - 0.99,xsd:decimal + 0.40,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Incident Assessment Report - A report describing the assessment of an incident in terms of its effects or impacts - - - 2024-05-19 + + Very High Risk + Level where Risk is Very High + + + 0.9,xsd:decimal + The suggested quantitative value for this concept is 0.9 on a scale of 0 to 1 + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - High Risk (RM7x7 S:4 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.41,xsd:decimal + Low Risk (RM5x5 S:4 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - Non-Material Damage - Something that acts as or causes Non-Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 + Fraud + Something that acts as or causes Fraud + + + + 2022-08-17 2024-08-16 accepted Harshvardhan J. Pandit - + + + + + Extremely Low Risk (RM7x7 S:1 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely Low; and Risk Level: Extremely Low + + 0.02,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + - Violence against children - Something that acts as or causes Child Violence - - This concept was called "ChildViolence" in DPV 2.0 - + System Malfunction + Something that acts as or causes System Malfunction + + + Here system refers to both hardware and software systems + 2022-08-17 2024-08-16 accepted @@ -2628,50 +2735,14 @@ - - - - has vulnerability - Indicates the associated context (subject) has indicated vulnerability (object) - - - 2024-02-14 - accepted - - - - - - - - Incident Halted - The incident has halted or paused with a high likelihood of resuming or recurring - - 2024-02-14 - accepted - Harshvardhan J. Pandit - - - - - - - Vulnerability - Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk - - 2024-02-14 - accepted - - - - + - Personal Safety Endangerment - Something that acts as or causes Personal Safety Endangerment - - + Erroneous System Use + Something that acts as or causes Erroneous System Use + + 2022-08-17 2024-08-16 accepted @@ -2679,30 +2750,17 @@ - - - - Incident Register - A register recording incidentes, their reports, notifications, and other related activities - - - 2024-05-19 - accepted - Harshvardhan J. Pandit - - - - + - System Intrusion - Something that acts as or causes System Intrusion + Compromise Account + Something that acts as or causes a compromised account that is then used by the compromiser - - + + 2022-08-17 2024-08-16 accepted @@ -2710,82 +2768,99 @@ - + - - Distributed Denial of Service Attack (DDoS) - Something that acts as or causes Distributed Denial of Service Attack (DDoS) - - - - 2022-08-17 - 2024-08-16 + + Remove Consequence + Control that removes Consequence i.e. prevents it from materialising + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Consequence Control - Risk Mitigation Measure that controls the Consequences - + Incident Ongoing Report + A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated + + 2024-05-19 accepted + + + + + + + + Incident Mitigated + The incident has been mitigated against future recurrences i.e. a measure has been applied to prevent the same or similar incident from recurring + + 2024-02-14 + accepted Harshvardhan J. Pandit - + - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + - - Reduction Control - Control that reduces the likelihood or severity of an event - - 2024-05-19 + + Societal Bias + Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society + + ISO/IEC 24027:2021 + 2024-09-13 accepted + Daniel Doherty - + - + - caused by vulnerability - Indicates the associated context (subject) is caused by the indicated vulnerability (object) - - + refers to risk + Indicates the incident (subject) is a materialisation of the indicated risk (object) + + + + 2024-02-14 accepted + - + - - Very Low Risk (RM7x7 S:1 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Moderate; and Risk Level: Very Low - - 0.08,xsd:decimal - 2022-08-17 + + Avoid Source + Control that avoids the risk source + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - Unauthorised Code Modification - Something that acts as or causes Unauthorised Code Modification - - - + Human Errors + Something that acts as or causes Human Errors + + 2022-08-17 2024-08-16 accepted @@ -2793,15 +2868,14 @@ - + - Fraud - Something that acts as or causes Fraud - - - + Personal Safety Endangerment + Something that acts as or causes Personal Safety Endangerment + + 2022-08-17 2024-08-16 accepted @@ -2809,208 +2883,254 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Individual Health & Safety - + + 7 Severity Levels + Scale with 7 Severity Levels from Extremely High to Extremely Low + + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - - Material Damage - Something that acts as or causes Material Damage - - The criteria for what is considered material damage is based in jurisdictional laws and norms - 2022-03-30 - 2024-08-16 + + Reduce Severity + Control that reduces the severity of an event + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - - Very Low Risk (RM7x7 S:2 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - - 0.12,xsd:decimal - 2022-08-17 + Incident Preliminary Report + A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - Fee - Something that acts as or provides fees e.g. for using a service - - DGA 2.10 - 2024-04-14 + Equipment Failure + Something that acts as or causes Equipment Failure + + + Here equipment refers to physical equipment + + 2022-08-17 2024-08-16 - modified - Georg P. Krog, Harshvardhan J. Pandit + accepted + Harshvardhan J. Pandit - + - Individual Risk - Risks and issues that affect or have the potential to affect specific individuals + + High Risk (RM5x5 S:2 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + + 0.40,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - - Halt Source - Control that halts the risk source or prevents it from materialising - - 2024-05-19 + + Very High Risk (RM7x7 S:6 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + + 0.49,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Low Severity - Level where Severity is Low - - - - 0.25,xsd:decimal - The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 - 2022-08-18 + + High Risk (RM5x5 S:3 L:4) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + 0.48,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - exploits vulnerability - Indicates the threat (subject) exploits the indicated vulnerability (object) - - - - + + + Violating Policy + Something that acts as or causes violation of policy which can be either internal or external policy + + accepted + + + + + + + Vulnerability + Intrinsic property of a system or asset that is utilised by the Threat Source in a Threat event to cause Risk + 2024-02-14 accepted - + - + - - Confidentiality Breach - Something that acts as or causes Confidentiality Breach - - - - 2022-08-17 - 2024-08-16 + + Monitor Impact + Control that monitors a Risk Impact + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + + + + + Very Low Risk + Level where Risk is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + - Extremely Low Risk (RM7x7 S:4 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low + Very Low Risk (RM7x7 S:1 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very High; and Risk Level: Very Low - 0.08,xsd:decimal + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html + + - - Environmental Risk - Risks and issues that have their origin in environment or can affect the environment at large - + + High Risk (RM7x7 S:3 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High + + 0.37,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + + Very Low Risk (RM5x5 S:1 L:3) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Very Low + + 0.12,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + - + - Risk Assessment - Assessment of risk involving its identification, analysis, and evaluation - - - ISO 31073:2022 Risk management vocabulary - 2024-02-14 + + Coercion + Something that acts as or causes Coercion + + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - 3 Risk Levels - Scale with 3 Risk Levels from High to Low - + Extremely High Risk + Level where Risk is Extremely High + + 0.99,xsd:decimal + The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 2022-08-18 accepted Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Moderate Risk (RM3x3 S:1 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: High; and Risk Level: Moderate - - 0.33,xsd:decimal - 2022-08-17 + + Incident Terminated + The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring + + 2024-02-14 accepted Harshvardhan J. Pandit - + @@ -3026,35 +3146,175 @@ - + + + + has risk source + Indicates the risk (subject) has the indicated risk source (object) + + + + + 2024-02-14 + accepted + + + + + + + + Rule-Based System Design + Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design + + Rule based system design also potentially introduces various forms of human cognitive bias + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Low Risk (RM5x5 S:1 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Low + + 0.20,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + - Violation of Legal Obligations - Something that acts as or causes Violation of Legal Obligations + Unauthorised Re-Identification + Something that acts as or causes Unauthorised Re-Identification + + + 2022-08-19 + 2024-08-16 + accepted + Georg P. Krog + + + + + + + + Violation of Contractual Obligation + Something that acts as or causes Violation of Contractual Obligations - This concept was called "ViolationRegulatoryObligations" in DPV 2.0 - + This concept was called "ViolationContractualObligations" in DPV 2.0 + 2022-08-17 2024-08-16 modified Harshvardhan J. Pandit - + + + + + + + Unauthorised Data Access + Something that acts as or causes Unauthorised Data Access + + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + Terrorism + Something that acts as or causes Terrorism + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + + + + + + + Monitor Risk + Control that monitors a Risk + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + + + + + + + Extremely High Risk (RM7x7 S:5 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High + + 0.61,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + + + Low Severity + Level where Severity is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + - + + + + + + + Risk Concepts - Turtle serialiation + + - - Extremely High Risk (RM7x7 S:5 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Extremely High - - 0.61,xsd:decimal - 2022-08-17 + + 5 Severity Levels + Scale with 5 Severity Levels from Very High to Very Low + + 2022-08-18 accepted Harshvardhan J. Pandit - + @@ -3070,97 +3330,94 @@ - + - - Harm - Something that acts as or causes Harm to humans - - This concept refers to the general abstract notion of harm - 2022-08-13 - 2024-08-16 + + Risk Matrix + Compares individual risks by selecting a consequence/ likelihood pair and displaying them on a matrix with consequence on one axis and likelihood on the other. + + + 2024-02-14 accepted Harshvardhan J. Pandit - - - - - - - - - Risk Concepts - Turtle serialiation + - + - - Intentional Misuse - Intentional Misuse - + + Moderate Risk (RM3x3 S:3 L:1) + Node in a 3x3 Risk Matrix with Risk Severity: High; Likelihood: Low; and Risk Level: Moderate + + 0.33,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - Sexual Violence - Something that acts as or causes Sexual Violence + Privacy - - 2022-08-17 - 2024-08-16 accepted - Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Monitor Vulnerabilities - Control that monitors a Risk Vulnerability - - 2024-05-19 + + High Likelihood + Level where Likelihood is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + - + - - Very Low Risk (RM5x5 S:1 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low - - 0.04,xsd:decimal - 2022-08-17 + + Cognitive Bias + Bias that occurs when humans are processing and interpreting information + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty - + - + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + - Equipment Malfunction - Something that acts as or causes Equipment Malfunction - - - Here equipment refers to physical equipment - + Extorsion + Something that acts as or causes Extorsion + + + 2022-08-17 2024-08-16 accepted @@ -3168,150 +3425,196 @@ - - - - Threat Source - Source of threat event, including both agent and non-agent sources - - 2024-02-14 - accepted - - - - + - Extremely High Risk (RM7x7 S:7 L:6) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Very High; and Risk Level: Extremely High + Very Low Risk (RM7x7 S:2 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - 0.86,xsd:decimal + 0.12,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + Primer for Data Privacy Vocabulary + + + + - - 7 Risk Levels - Scale with 7 Risk Levels from Extremely High to Extremely Low - + + Limitation of Rights + Something that acts as or causes Limitation of Rights + + This concept was called "LimitationOfRights" in DPV 2.0 2022-08-18 + 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - + - - Moderate Risk (RM7x7 S:3 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - - 0.24,xsd:decimal - 2022-08-17 + + Component Failure + Something that acts as or causes Component Failure + + + Here component refers to both physical and virtual components. The failure of a component may or may not also cause a failure in other related components or the systems they are part of accepted - Harshvardhan J. Pandit - + - + - - High Risk (RM7x7 S:7 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - - 0.43,xsd:decimal + + Violation of Statutory Obligations + Something that acts as or causes Violation of Statutory Obligations + + This concept was called "ViolationStatutoryObligations" in DPV 2.0 + 2022-08-17 - accepted + 2024-08-16 + modified Harshvardhan J. Pandit - + - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Unwanted Disclosure of Data - Something that acts as or causes Unwanted Disclosure of Data - - - - 2022-08-17 + Reward + Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee + + 2024-04-14 2024-08-16 accepted - Harshvardhan J. Pandit + Georg P. Krog, Harshvardhan J. Pandit - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - - Very Low Likelihood - Level where Likelihood is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 + + Data Processing Bias + Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Extremely Low Risk (RM7x7 S:4 L:1) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Extremely Low; and Risk Level: Extremely Low + + 0.08,xsd:decimal + 2022-08-17 + accepted + Harshvardhan J. Pandit + + + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + + + Sampling Bias + Bias that occurs when data records are not collected randomly from the intended population + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + + + + + Confounding Variables Bias + Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Harshvardhan J. Pandit + Daniel Doherty - + - + - Moderate Risk (RM5x5 S:3 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate - - 0.24,xsd:decimal + Low Risk (RM7x7 S:5 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low + + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - - Reward - Something that acts as or provides rewards i.e. a benefit given for some service or activity that is not a payment or fee - - 2024-04-14 - 2024-08-16 + + Confirmation Bias + Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information + + ISO/IEC 24027:2021 + 2024-09-13 accepted - Georg P. Krog, Harshvardhan J. Pandit + Daniel Doherty - + - + - Psychological Harm - Something that acts as or causes Psychological Harm - - + Security Breach + Something that acts as or causes Security Breach + + + + + 2022-08-17 2024-08-16 accepted @@ -3319,57 +3622,25 @@ - + - Incident - An actual or occured event - - - - Incident is realised or materialised risk - 2024-02-14 + Incident Suspected Report + A report describing the suspicion of an incident in the past or occuring + + 2024-05-19 - 2024-08-16 accepted - Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez - - - - - - - - - - Risk Concepts - N3 serialiation - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Operational Security Risk - Risks and issues that arise during operational processes - - accepted - - - - + - Change Consequence - Control that changes Consequence - + Change Impact + Control that changes Impact + 2024-05-19 accepted Harshvardhan J. Pandit @@ -3389,217 +3660,228 @@ - + - High Risk (RM3x3 S:2 L:3) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High - - 0.67,xsd:decimal + Very High Risk (RM7x7 S:4 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High + + 0.49,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Re-identification - Something that acts as or causes Re-identification - - - Use this concept for reidentification in an internal context. For reidentification performed by external entities see concept UnauthorisedReidentification - 2022-08-19 - 2024-08-16 + + Remove Impact + Control that removes Impact i.e. prevents it from materialising + + 2024-05-19 accepted Harshvardhan J. Pandit - - - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + - + - - Damage - Something that acts as or causes Damage - - 2022-03-30 - 2024-08-16 + + Very Low Likelihood + Level where Likelihood is Very Low + + + 0.1,xsd:decimal + The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit + + + + + + Individual Risk + Risks and issues that affect or have the potential to affect specific individuals + accepted + - - + - has control - Indicates the use of specified control - - - 2024-02-14 + + + Unwanted Data Deletion + Something that acts as or causes Unwanted Data Deletion + + + + + 2022-08-17 + 2024-08-16 accepted - + Harshvardhan J. Pandit - + - + + + + - Very Low Risk (RM7x7 S:6 L:1) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Extremely Low; and Risk Level: Very Low - - 0.12,xsd:decimal + Very Low Risk (RM5x5 S:1 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Very Low + + 0.04,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Confidentiality Incident - Incident where the confidentiality of information or system has been affected - - - 2024-05-19 + + 7 Risk Levels + Scale with 7 Risk Levels from Extremely High to Extremely Low + + 2022-08-18 accepted + Harshvardhan J. Pandit - + - + - - + Unwanted Disclosure of Data + Something that acts as or causes Unwanted Disclosure of Data + + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - Societal Health & Safety - + Compensation + Something that acts as or provides compensation - which can be monetary and financial or in other forms + + 2024-04-14 + 2024-08-16 accepted + Georg P. Krog, Harshvardhan J. Pandit - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - + - Moderate Risk (RM7x7 S:6 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Moderate + High Risk (RM7x7 S:7 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Low; and Risk Level: High - 0.24,xsd:decimal + 0.43,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Misuse - Something that acts as or causes Misuse - - 2024-06-11 - 2024-08-16 - accepted - Delaram Golpayegani - - - - + - Injury - Something that acts as or causes Injury - - - 2022-08-17 - 2024-08-16 + External Security Threat + Concepts associated with security threats that are likely to originate externally + accepted - Harshvardhan J. Pandit - + - - Very Low Risk - Level where Risk is Very Low - - - 0.1,xsd:decimal - The suggested quantitative value for this concept is 0.1 on a scale of 0 to 1 - 2022-08-18 + + High Risk (RM7x7 S:4 L:5) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: High; and Risk Level: High + + 0.41,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - + - + - - Compromise Account Credentials - Something that acts as or causes Account Credentials to be compromised - - - - 2022-08-17 + Incident + An actual or occured event + + + + Incident is realised or materialised risk + 2024-02-14 + 2024-05-19 2024-08-16 accepted - Harshvardhan J. Pandit + Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez + + - + + - + - Very High Risk (RM5x5 S:3 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Very High; and Risk Level: Very High - - 0.60,xsd:decimal + Extremely Low Risk (RM7x7 S:2 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very Low; and Risk Level: Extremely Low + + 0.08,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ENISA Threat Taxonomy 2016 - https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + + + + Phishing Scam + Something that acts as or causes Phishing Scam + + + + 2022-08-17 + 2024-08-16 + accepted + Harshvardhan J. Pandit + + @@ -3615,64 +3897,104 @@ - + - Violation of Rights - Something that acts as or causes Violation of Rights - - This concept was called "ViolationOfRights" in DPV 2.0 - 2022-08-18 + Benefit + Something that acts as or causes benefits + + 2022-03-23 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves, Axel Polleres - + + + + has incident + Indicates an incident is associated with the specified context + + + 2024-02-14 + accepted + + + + - Incident Ongoing Report - A report describing on ongoing investigation regarding a Incident where facts and extent of the investigation are being investigated - - + + Change Consequence + Control that changes Consequence + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + - IEC 31010:2019 - https://www.iso.org/standard/72140.html + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + - - 3 Likelihood Levels - Scale with 3 Likelihood Levels from High to Low - - 2022-08-18 + Incident Status + Status associated with an incident + + + 2024-02-14 accepted Harshvardhan J. Pandit + - + - + - - Low Risk (RM3x3 S:2 L:1) - Node in a 3x3 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Low - - 0.22,xsd:decimal + + System Failure + Something that acts as or causes System Failure + + + Here system refers to both hardware and software systems + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + + + + + + + Judicial Costs + Something that involves or causes judicial costs to be paid + + accepted + + + + + + + + Monitor Consequence + Control that monitors a Risk Consequence + + 2024-05-19 + accepted + Harshvardhan J. Pandit + + @@ -3688,345 +4010,326 @@ - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Compensation - Something that acts as or provides compensation - which can be monetary and financial or in other forms - - 2024-04-14 + Unauthorised Information Disclosure + Something that acts as or causes Unauthorised Information Disclosure + + + + 2022-08-17 2024-08-16 accepted - Georg P. Krog, Harshvardhan J. Pandit + Harshvardhan J. Pandit - + + + + + + + Risk Concepts - N3 serialiation + + - - Judicial Costs - Something that involves or causes judicial costs to be paid - + Incident Concluding Report + A report describing the conclusion of an investigation regarding a Incident where all relevant facts are known + + + 2024-05-19 accepted - + - - + - caused by threat - Indicates the cause of associated context (subject) was the indicated threat (object) - - - 2024-02-14 + + + Remove Source + Control that removes the risk source + + 2024-05-19 accepted + Harshvardhan J. Pandit - + - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + - Moderate Risk (RM5x5 S:2 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Moderate - - 0.24,xsd:decimal + Low Risk (RM7x7 S:1 L:7) + Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Extremely High; and Risk Level: Low + + 0.14,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - Availability Incident - Incident where the availability of information or system has been affected - - - 2024-05-19 - accepted - - - - + - - User Risks - Concepts associated with risks that arise due to User or Human use - + + Detection Control + Control to detect event + + 2024-05-19 accepted - + - + - Incident Notice - Notice associated with an Incident - - + Incident Mitigation Measure + A mitigation measure taken in response specifically to mitigate an incident and prevent it from occurring again + + 2024-05-19 accepted - + - - 3 Severity Levels - Scale with 3 Severity Levels from High to Low - - 2022-08-18 + + Unauthorised Code Modification + Something that acts as or causes Unauthorised Code Modification + + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - High Risk (RM5x5 S:2 L:5) - Node in a 5x5 Risk Matrix with Risk Severity: Low; Likelihood: Very High; and Risk Level: High - - 0.40,xsd:decimal - 2022-08-17 + + Low Risk + Level where Risk is Low + + + + 0.25,xsd:decimal + The suggested quantitative value for this concept is 0.25 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - - 5 Severity Levels - Scale with 5 Severity Levels from Very High to Very Low - + + 7 Likelihood Levels + Scale with 7 Likelihood Levels from Extremely High to Extremely Low + 2022-08-18 accepted Harshvardhan J. Pandit - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + + - Very High Risk (RM7x7 S:6 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Moderate; and Risk Level: Very High + Low Risk (RM7x7 S:4 L:2) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Very Low; and Risk Level: Low - 0.49,xsd:decimal + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - + - - Remedy Control - Control to remedy consequences of event - - 2024-05-19 + + Intentional Misuse + Intentional Misuse + accepted - + - + - - Extorsion - Something that acts as or causes Extorsion - - - - 2022-08-17 - 2024-08-16 + Integrity Incident + Incident where the integrity of information or system has been affected + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Physical Harm - + + Incident Suspected + The state where a incident is suspected, but has not yet been confirmed. This can be due to lack of information, or because the process of detection and investigation is still ongoing + + 2024-02-14 accepted + Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - Sabotage - Something that acts as or causes Sabotage - - - - - 2022-08-17 - 2024-08-16 + Environmental Risk + Risks and issues that have their origin in environment or can affect the environment at large + accepted - Harshvardhan J. Pandit - + - - Incident Terminated - The incident has been stopped or terminated through the use of a mitigation or deterrent measure with a low likelihood of resuming or recurring - - 2024-02-14 + Incident Assessment Report + A report describing the assessment of an incident in terms of its effects or impacts + + + 2024-05-19 accepted - Harshvardhan J. Pandit - + - + - - Source Control - Risk Mitigation Measure that controls the Source - - 2024-05-19 + + Moderate Likelihood + Level where Likelihood is Moderate + + + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + - - Remove Consequence - Control that removes Consequence i.e. prevents it from materialising - + Accidental Incident + Incident caused due to accidental actions arising from human or human-controlled situations + + 2024-05-19 accepted - Harshvardhan J. Pandit - - - - - - - Guides for Data Privacy Vocabulary - - + - + - - Extremely Low Risk (RM7x7 S:1 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely Low; Likelihood: Very Low; and Risk Level: Extremely Low - - 0.04,xsd:decimal + + Public Order Breach + Something that acts as or causes Public Order Breach + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - - Very High Risk (RM5x5 S:4 L:4) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High - - 0.64,xsd:decimal - 2022-08-17 + + Non-Material Damage + Something that acts as or causes Non-Material Damage + + The criteria for what is considered material damage is based in jurisdictional laws and norms + 2022-03-30 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - - ENISA Threat Landscape 2021 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - 7 Likelihood Levels - Scale with 7 Likelihood Levels from Extremely High to Extremely Low - - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - + - - Low Risk (RM5x5 S:5 L:1) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - - 0.20,xsd:decimal - 2022-08-17 + + Share Risk + Risk Mitigation Measure that shares Risk e.g. amongst stakeholders + + 2024-05-19 accepted Harshvardhan J. Pandit - + - + - Extremely High Risk (RM7x7 S:7 L:7) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: Extremely High; and Risk Level: Extremely High - + Very High Risk (RM5x5 S:5 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very High; and Risk Level: Very High + 0.99,xsd:decimal 2022-08-17 accepted @@ -4034,20 +4337,15 @@ - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Coercion - Something that acts as or causes Coercion + Unauthorised Code Disclosure + Something that acts as or causes Unauthorised Code Disclosure - + 2022-08-17 2024-08-16 accepted @@ -4055,178 +4353,159 @@ - - - - - Extremely Low Likelihood - Level where Likelihood is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 - accepted - Harshvardhan J. Pandit - - - - + - - High Risk (RM5x5 S:5 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - - 0.40,xsd:decimal + + Unauthorised Data Disclosure + Something that acts as or causes Unauthorised Data Disclosure + + + 2022-08-17 + 2024-08-16 accepted Harshvardhan J. Pandit - + - + - High Risk (RM5x5 S:4 L:3) - Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Moderate; and Risk Level: High + Low Risk (RM5x5 S:5 L:1) + Node in a 5x5 Risk Matrix with Risk Severity: Very High; Likelihood: Very Low; and Risk Level: Low - 0.48,xsd:decimal + 0.20,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - - Very Low Risk (RM7x7 S:3 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: Low; Likelihood: Very Low; and Risk Level: Very Low - - 0.12,xsd:decimal - 2022-08-17 + + Extremely Low Risk + Level where Risk is Extremely Low + + 0.01,xsd:decimal + The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 + 2022-08-18 accepted Harshvardhan J. Pandit - + - + - Containment Control - Control to contain event + Consequence Control + Risk Mitigation Measure that controls the Consequences 2024-05-19 accepted + Harshvardhan J. Pandit - - + - has risk source - Indicates the risk (subject) has the indicated risk source (object) - - - - - 2024-02-14 + + + System Intrusion + Something that acts as or causes System Intrusion + + + + + + 2022-08-17 + 2024-08-16 accepted + Harshvardhan J. Pandit - + - + - - Low Risk (RM7x7 S:2 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - - 0.16,xsd:decimal - 2022-08-17 + + Physical Harm + accepted - Harshvardhan J. Pandit - + - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + + + + Risk Concepts - JSON-LD serialiation - + - - Low Risk (RM7x7 S:5 L:2) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: Very Low; and Risk Level: Low - - 0.20,xsd:decimal - 2022-08-17 + + Recovery Control + Control to recover from event + + 2024-05-19 accepted - Harshvardhan J. Pandit - - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + - + - - Low Risk (RM3x3 S:1 L:2) - Node in a 3x3 Risk Matrix with Risk Severity: Low; Likelihood: Moderate; and Risk Level: Low - - 0.22,xsd:decimal - 2022-08-17 + + Incident Ongoing + The incident is ongoing i.e. still active + + 2024-02-14 accepted Harshvardhan J. Pandit - + - + + + + has control + Indicates the use of specified control + + + 2024-02-14 + accepted + + + + + - Very Low Risk (RM5x5 S:1 L:2) - Node in a 5x5 Risk Matrix with Risk Severity: Very Low; Likelihood: Low; and Risk Level: Very Low - - 0.08,xsd:decimal + Risk Matrix 7x7 + A Risk Matrix with 7 Likelihood, 7 Severity, and 7 Risk Level types + 2022-08-17 accepted Harshvardhan J. Pandit - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - + - Terrorism - Something that acts as or causes Terrorism - - + Injury + Something that acts as or causes Injury + + 2022-08-17 2024-08-16 accepted @@ -4234,68 +4513,48 @@ - + - - Monitor Control - Control that monitors another Control - - 2024-05-19 + + High Risk (RM7x7 S:4 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High + + 0.33,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - - Risk Control - Control that modifies risk - - - 2024-05-19 - accepted - - - - - - - - Incident Detection Report - A report describing the detection of a Incident - - - 2024-05-19 - accepted - - + - + - Very High Risk (RM7x7 S:5 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: High; Likelihood: High; and Risk Level: Very High + Low Risk (RM7x7 S:2 L:4) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Moderate; and Risk Level: Low - 0.51,xsd:decimal + 0.16,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + + + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view + + - Brute Force Authorisations - Something that acts as or causes Brute Force Authorisations i.e. bypassing authorisations through brute forcing techniques - + Unauthorised System Modification + Something that acts as or causes Unauthorised System Modification - + 2022-08-17 2024-08-16 accepted @@ -4303,35 +4562,78 @@ - + + + + + Moderate Risk + Level where Risk is Moderate + + + + 0.5,xsd:decimal + The suggested quantitative value for this concept is 0.5 on a scale of 0 to 1 + 2022-08-18 + accepted + Harshvardhan J. Pandit + + + + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Threat Taxonomy 2016 + https://www.enisa.europa.eu/topics/threat-risk-management/threats-and-trends/enisa-threat-landscape/threat-taxonomy/view - - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - has incident - Indicates an incident is associated with the specified context - - - 2024-02-14 + + + Very High Risk (RM5x5 S:4 L:5) + Node in a 5x5 Risk Matrix with Risk Severity: High; Likelihood: Very High; and Risk Level: Very High + + 0.80,xsd:decimal + 2022-08-17 accepted + Harshvardhan J. Pandit - + - + - - Incident Near Miss - The state where an incident was almost successful in taking place i.e. "it came very close" - - 2024-02-14 + + Risk Matrix 3x3 + A Risk Matrix with 3 Likelihood, 3 Severity, and 3 Risk Level types + + 2022-08-17 accepted Harshvardhan J. Pandit - + + + + + + + Selection Bias + Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + @@ -4347,243 +4649,232 @@ - + - - Detriment - Something that acts as or causes Detriment - - 2022-03-23 - 2024-08-16 + + High Severity + Level where Severity is High + + + + 0.75,xsd:decimal + The suggested quantitative value for this concept is 0.75 on a scale of 0 to 1 + 2022-08-18 accepted - Harshvardhan J. Pandit, Julian Flake, Georg P. Krog, Fajar Ekaputra, Beatriz Esteves + Harshvardhan J. Pandit - + + + + + + + + + Risk Concepts - RDF/XML serialiation + + + + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - - Examples for Data Privacy Vocabulary - - + + + IEC 31010:2019 + https://www.iso.org/standard/72140.html - - - - - Incident Ongoing - The incident is ongoing i.e. still active - - 2024-02-14 - accepted - Harshvardhan J. Pandit - - + + + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - Monitor Consequence - Control that monitors a Risk Consequence - + Reduction Control + Control that reduces the likelihood or severity of an event + 2024-05-19 accepted - Harshvardhan J. Pandit - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + + - - - High Risk (RM7x7 S:4 L:4) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Moderate; and Risk Level: High - - 0.33,xsd:decimal - 2022-08-17 + has vulnerability + Indicates the associated context (subject) has indicated vulnerability (object) + + + 2024-02-14 accepted - Harshvardhan J. Pandit - + - + - Unauthorised Information Disclosure - Something that acts as or causes Unauthorised Information Disclosure - - - - 2022-08-17 - 2024-08-16 + Operational Security Risk + Risks and issues that arise during operational processes + accepted - Harshvardhan J. Pandit - + - - Identity Theft - Something that acts as or causes Identity Theft - - - + + Moderate Risk (RM7x7 S:2 L:6) + Node in a 7x7 Risk Matrix with Risk Severity: Very Low; Likelihood: Very High; and Risk Level: Moderate + + 0.24,xsd:decimal 2022-08-17 - 2024-08-16 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + - + - - Extremely High Likelihood - Level where Likelihood is Extremely High - - 0.99,xsd:decimal - The suggested quantitative value for this concept is 0.99 on a scale of 0 to 1 - 2022-08-18 + + Moderate Risk (RM7x7 S:4 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + + 0.24,xsd:decimal + 2022-08-17 accepted Harshvardhan J. Pandit - - - - - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html - - - - - - Reputational Risk - Risks and issues that affect the reputation of the organisation - - accepted - - + - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - Moderate Risk (RM7x7 S:4 L:3) - Node in a 7x7 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + High Risk (RM7x7 S:6 L:3) + Node in a 7x7 Risk Matrix with Risk Severity: Very High; Likelihood: Low; and Risk Level: High - 0.24,xsd:decimal + 0.37,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - Risk Management - Systematic application of management policies, procedures, and practices for communicating, consulting, establishing context, and identifying, analysing, evaluating, treating, monitoring and reviewing risk. ISO 31000 definition: coordinated activities to direct and control an organization with regard to risk - - ISO 31073:2022 Risk management vocabulary - 2024-06-12 + + Identification Control + Control to identify characteristics of event + + 2024-05-19 accepted - + - + - Extremely High Risk (RM7x7 S:7 L:5) - Node in a 7x7 Risk Matrix with Risk Severity: Extremely High; Likelihood: High; and Risk Level: Extremely High - - 0.71,xsd:decimal + Moderate Risk (RM5x5 S:3 L:2) + Node in a 5x5 Risk Matrix with Risk Severity: Moderate; Likelihood: Low; and Risk Level: Moderate + + 0.24,xsd:decimal 2022-08-17 accepted Harshvardhan J. Pandit - + - Violating Ethics Code - Something that acts as or causes Violation of Ethics Code - - This concept was called "ViolationEthicalCode" in DPV 2.0 - - 2022-08-17 - 2024-08-16 - modified - Harshvardhan J. Pandit + User Risks + Concepts associated with risks that arise due to User or Human use + + accepted - + - Remove Impact - Control that removes Impact i.e. prevents it from materialising - + Impact Control + Risk Mitigation Measure that controls Impacts + 2024-05-19 accepted Harshvardhan J. Pandit - - - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + + Guides for Data Privacy Vocabulary + + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - System Malfunction - Something that acts as or causes System Malfunction + Malware Attack + Something that acts as or causes Malware Attack + + - - Here system refers to both hardware and software systems - + + 2022-08-17 2024-08-16 accepted @@ -4591,97 +4882,107 @@ - + + + ENISA Threat Landscape 2021 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-2021 + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html + + - - Extremely Low Risk - Level where Risk is Extremely Low - - 0.01,xsd:decimal - The suggested quantitative value for this concept is 0.01 on a scale of 0 to 1 - 2022-08-18 + + Legal Risk + Risks and issues that have their basis in legal requirements and enforcement + accepted - Harshvardhan J. Pandit - + - + + + + - Incident Report - Documented information about an incident, its handling, assessments,and notifications - - + Incident Notice + Notice associated with an Incident + + 2024-05-19 accepted - - - IEC 31010:2019 - https://www.iso.org/standard/72140.html - - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - - Monitor Risk - Control that monitors a Risk - - 2024-05-19 + + Component Malfunction + Something that acts as or causes Component Malfunction + + + Here component refers to both physical and virtual components. The malfunction of a component may or may not also cause a malfunction in other related components or the systems they are part of accepted - Harshvardhan J. Pandit - + - - - - - Primer for Data Privacy Vocabulary - - + + + + Threat Source + Source of threat event, including both agent and non-agent sources + + 2024-02-14 + accepted + + - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ENISA Methodology for Sectoral Cybersecurity Assessments + https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - - Incident Preliminary Report - A report describing the preliminary investigation regarding a Incident where the complete facts or extent of the incident may not be known - - - 2024-05-19 - accepted - - + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment + ENISA Threat Landscape for Ransomware Attacks 2022 + https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + + + + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html @@ -4689,125 +4990,144 @@ - + + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - Reduce Likelihood - Control that reduces the likelihood of an event - + Source Control + Risk Mitigation Measure that controls the Source + 2024-05-19 accepted Harshvardhan J. Pandit - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - - Incident Status - Status associated with an incident - - - 2024-02-14 - accepted - Harshvardhan J. Pandit - - - + + + + + + + Risk Concepts - HTML serialiation - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - + + + + + Implicit Bias + Bias that occurs when a human makes an association or assumption based on their mental models and memories + + ISO/IEC 24027:2021 + 2024-09-13 + accepted + Daniel Doherty + + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + - ISO/IEC 27005:2018 - https://www.iso.org/standard/75281.html + ENISA Reference Incident Classification Taxonomy 2018 + https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + + + + Cross-Border Incident + Incident involving cross-border or multiple jurisdictions + + + 2024-05-19 + accepted + + + + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - - + - ENISA Threat Landscape for Ransomware Attacks 2022 - https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-ransomware-attacks + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - - - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + + - + - ENISA Reference Incident Classification Taxonomy 2018 - https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html - + + + + ENISA Reference Incident Classification Taxonomy 2018 https://www.enisa.europa.eu/publications/reference-incident-classification-taxonomy/ - + - ENISA Methodology for Sectoral Cybersecurity Assessments - https://www.enisa.europa.eu/publications/methodology-for-a-sectoral-cybersecurity-assessment - - - + ISO/IEC 27005:2018 + https://www.iso.org/standard/75281.html - + ISO/IEC 27005:2018 https://www.iso.org/standard/75281.html @@ -4815,10 +5135,4 @@ - - - - - - diff --git a/2.1-dev/risk/risk.ttl b/2.1-dev/risk/risk.ttl index 77b4ed346..f2f9ba46b 100644 --- a/2.1-dev/risk/risk.ttl +++ b/2.1-dev/risk/risk.ttl @@ -208,6 +208,19 @@ risk:Benefit a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Benefit"@en . +risk:Bias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:RiskConcept ; + skos:definition "Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Bias"@en . + risk:Blackmail a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -284,6 +297,19 @@ risk:Coercion a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Coercion"@en . +risk:CognitiveBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias that occurs when humans are processing and interpreting information"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Cognitive Bias"@en . + risk:Compensation a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -385,6 +411,32 @@ risk:ConfidentialityIncident a rdfs:Class, skos:inScheme risk:incident-classes ; skos:prefLabel "Confidentiality Incident"@en . +risk:ConfirmationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Confirmation Bias"@en . + +risk:ConfoundingVariablesBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Confounding Variables Bias"@en . + risk:ConsequenceControl a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -424,6 +476,19 @@ risk:CopyrightViolation a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Copyright Violation"@en . +risk:CoverageBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Coverage Bias"@en . + risk:CrossBorderIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -465,6 +530,32 @@ risk:Damage a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Damage"@en . +risk:DataAggregationBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Data Aggregation Bias"@en . + +risk:DataBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:Bias ; + skos:definition "Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Data Bias"@en . + risk:DataBreach a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -504,6 +595,19 @@ risk:DataCorruption a rdfs:Class, skos:prefLabel "Data Corruption"@en ; skos:scopeNote "This concept was called \"Corruption Data\" in DPV 2.0"@en . +risk:DataProcessingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Data Processing Bias"@en . + risk:DeliberateIncident a rdfs:Class, skos:Concept ; dct:created "2024-05-19"^^xsd:date ; @@ -844,6 +948,19 @@ risk:Fraud a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Fraud"@en . +risk:GroupAttributionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Group Attribution Bias"@en . + risk:HaltSource a rdfs:Class, skos:Concept, risk:RiskControl ; @@ -1008,6 +1125,32 @@ risk:ImpactControl a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Impact Control"@en . +risk:ImplicitBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when a human makes an association or assumption based on their mental models and memories"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Implicit Bias"@en . + +risk:InGroupBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when showing partiality to one's own group or own characteristics"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "In-Group Bias"@en . + risk:Incident a rdfs:Class, skos:Concept ; dct:contributor "Rob Brennan, Harshvardhan J. Pandit, Delaram Golpayegani, Julio Fernandez" ; @@ -1297,6 +1440,19 @@ risk:IndividualRisk a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Individual Risk"@en . +risk:InformativenessBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:EngineeringDecisionBias ; + skos:definition "Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Informativeness Bias"@en . + risk:Injury a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -1763,6 +1919,32 @@ risk:NonMaterialDamage a rdfs:Class, skos:prefLabel "Non-Material Damage"@en ; skos:scopeNote "The criteria for what is considered material damage is based in jurisdictional laws and norms"@en . +risk:NonNormalityBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Non-Normality Bias"@en . + +risk:NonResponseBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Non-Response Bias"@en . + risk:OperationalSecurityRisk a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -1773,6 +1955,19 @@ risk:OperationalSecurityRisk a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Operational Security Risk"@en . +risk:OutGroupHomogeneityBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Out-Group Homogeneity Bias"@en . + risk:Payment a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -3095,6 +3290,20 @@ risk:ReputationalRisk a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Reputational Risk"@en . +risk:RequirementsBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs in or during requirements creation"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Requirements Bias"@en ; + skos:scopeNote "Requirements bias also represents occasions for the human cognitive biases to manifest"@en . + risk:Reward a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -3281,6 +3490,20 @@ risk:RiskSource a rdfs:Class, skos:inScheme risk:core-classes ; skos:prefLabel "Risk Source"@en . +risk:RuleBasedSystemDesign a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Rule-Based System Design"@en ; + skos:scopeNote "Rule based system design also potentially introduces various forms of human cognitive bias"@en . + risk:Sabotage a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -3299,6 +3522,19 @@ risk:Sabotage a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Sabotage"@en . +risk:SamplingBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:SelectionBias ; + skos:definition "Bias that occurs when data records are not collected randomly from the intended population"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Sampling Bias"@en . + risk:Scam a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -3348,6 +3584,19 @@ risk:SecurityBreach a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Security Breach"@en . +risk:SelectionBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:StatisticalBias ; + skos:definition "Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Selection Bias"@en . + risk:SexualViolence a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -3376,6 +3625,19 @@ risk:ShareRisk a rdfs:Class, skos:inScheme risk:risk-controls-classes ; skos:prefLabel "Share Risk"@en . +risk:SimpsonsParadoxBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Simpson'S Paradox Bias"@en . + risk:SocialDisadvantage a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -3389,6 +3651,19 @@ risk:SocialDisadvantage a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Social Disadvantage"@en . +risk:SocietalBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO/IEC 24027:2021"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:CognitiveBias ; + skos:definition "Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Societal Bias"@en . + risk:SocietalHealthSafety a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -3442,6 +3717,19 @@ risk:Spoofing a rdfs:Class, skos:inScheme risk:risk-consequences-classes ; skos:prefLabel "Spoofing"@en . +risk:StatisticalBias a rdfs:Class, + skos:Concept, + risk:RiskConcept ; + dct:contributor "Daniel Doherty" ; + dct:created "2024-09-13"^^xsd:date ; + dct:source "ISO 20501:2019"@en ; + rdfs:isDefinedBy risk: ; + sw:term_status "accepted"@en ; + skos:broader risk:DataBias ; + skos:definition "Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates"@en ; + skos:inScheme risk:bias-classes ; + skos:prefLabel "Statistical Bias"@en . + risk:SystemFailure a rdfs:Class, skos:Concept, dpv:RiskConcept ; @@ -4034,6 +4322,7 @@ risk:Vulnerability a rdfs:Class, "http://www.w3.org/2004/02/skos/core" ; dct:contributor "Axel Polleres", "Beatriz Esteves", + "Daniel Doherty", "Delaram Golpayegani", "Fajar Ekaputra", "Georg P. Krog", @@ -4275,6 +4564,8 @@ risk:core-properties a skos:ConceptScheme . risk:incident-classes a skos:ConceptScheme . +risk:bias-classes a skos:ConceptScheme . + risk:risk-controls-classes a skos:ConceptScheme . risk:risk-levels-classes a skos:ConceptScheme . diff --git a/code/100_download_CSV.py b/code/100_download_CSV.py index d86f61b5f..1563de251 100755 --- a/code/100_download_CSV.py +++ b/code/100_download_CSV.py @@ -181,6 +181,7 @@ 'ai-capabilities', 'ai-risks', 'ai-measures', + 'ai-bias', ), }, # Sheets for Risk extension @@ -199,6 +200,7 @@ 'Incident', 'IncidentStatus', 'RiskConsequences', + 'Bias', ), }, # Sheets for Rights extension diff --git a/code/jinja2_resources/template_ai.jinja2 b/code/jinja2_resources/template_ai.jinja2 index d8bd03034..e06463ecd 100644 --- a/code/jinja2_resources/template_ai.jinja2 +++ b/code/jinja2_resources/template_ai.jinja2 @@ -112,13 +112,21 @@

    Risks

    See examples of Risks in VAIR.

    -
    + +
    +

    Bias

    +

    Note: These are intended to represent bias concepts specific to AI development and use, and do not contain general bias concepts which exist in other contexts e.g. applicable for any technology. The Risk extension contains the general set of concepts that this vocabulary extends to represent biases that are specific to the development and use of AI.

    + {{ list_hierarchy(modules['bias']['classes'], head='ai:AIBias') }} +

    Risk Measures

    See examples of Risk Measures in VAIR.

    + + +

    Vocabulary Index

    diff --git a/code/jinja2_resources/template_risk.jinja2 b/code/jinja2_resources/template_risk.jinja2 index f60238b72..a3c060064 100644 --- a/code/jinja2_resources/template_risk.jinja2 +++ b/code/jinja2_resources/template_risk.jinja2 @@ -285,6 +285,12 @@ ex:ProcessB a dpv:Process ;

    Financial

    {{ list_hierarchy(modules['risk_consequences']['classes'], head='risk:FinancialImpact') }}
    + +
    +

    Bias

    +

    Note: These are intended to represent bias concepts in general e.g. applicable for any technology. The AI extension contains an additional set of concepts that extend these concepts to represent biases that are specific to the development and use of AI.

    + {{ list_hierarchy(modules['bias']['classes'], head='risk:Bias') }} +
    diff --git a/code/vocab_csv/Bias.csv b/code/vocab_csv/Bias.csv new file mode 100644 index 000000000..3462bad74 --- /dev/null +++ b/code/vocab_csv/Bias.csv @@ -0,0 +1,981 @@ +Term,Label,Definition,ParentTerm,ParentType,Value,RelatedTerms,Relation,Usage,Source,Created,Modified,Status,Contributors,Resolution,,,,,,,,,,,,,,,,, +Bias,Bias,"Bias is defined as the systematic difference in treatment of certain objects, people, or groups in comparison to others",,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +CognitiveBias,Cognitive Bias,Bias that occurs when humans are processing and interpreting information,risk:Bias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +GroupAttributionBias,Group Attribution Bias,"Bias that occurs when a human assumes that what is true for an individual or object is also true for everyone, or all objects, in that group",risk:CognitiveBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +ImplicitBias,Implicit Bias,Bias that occurs when a human makes an association or assumption based on their mental models and memories,risk:CognitiveBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +ConfirmationBias,Confirmation Bias,"Bias that occurs when hypotheses, regardless of their veracity, are more likely to be confirmed by the intentional or unintentional interpretation of information",risk:CognitiveBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +InGroupBias,In-Group Bias,Bias that occurs when showing partiality to one's own group or own characteristics,risk:CognitiveBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +OutGroupHomogeneityBias,Out-Group Homogeneity Bias,"Bias that occurs when seeing out-group members as more alike than in-group members when comparing attitudes, values, personality traits, and other characteristics",risk:CognitiveBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +SocietalBias,Societal Bias,Bias that occurs when similiar cognitive bias (conscious or unconscious) is being held by many individuals in society,risk:CognitiveBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +RuleBasedSystemDesign,Rule-Based System Design,Bias that occurs due to developer experience and expert advice having a significant influence on rule-based system design,risk:CognitiveBias,risk:RiskConcept,,,,Rule based system design also potentially introduces various forms of human cognitive bias,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +RequirementsBias,Requirements Bias,Bias that occurs in or during requirements creation,risk:CognitiveBias,risk:RiskConcept,,,,Requirements bias also represents occasions for the human cognitive biases to manifest,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +DataBias,Data Bias,Bias that occurs when data properties that if unaddressed lead to systems that perform better or worse for different groups,risk:Bias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +StatisticalBias,Statistical Bias,"Bias that occurs as the type of consistent numerical offset in an estimate relative to the true underlying value, inherent to most estimates",risk:DataBias,risk:RiskConcept,,,,,ISO 20501:2019,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +SelectionBias,Selection Bias,Bias that occurs when a dataset's samples are chosen in a way that is not reflective of their real-world distribution,risk:StatisticalBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +SamplingBias,Sampling Bias,Bias that occurs when data records are not collected randomly from the intended population,risk:SelectionBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +CoverageBias,Coverage Bias,Bias that occurs when a population represented in a dataset does not match the actual or real population that are being used,risk:SelectionBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +NonResponseBias,Non-Response Bias,Bias that occurs when people from certain groups opt-out of surveys at different rates than users from other groups. This is also called as Participation bias,risk:SelectionBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +ConfoundingVariablesBias,Confounding Variables Bias,Bias that occurs as a confounding variable that influences both the dependent variable and independent variable causing a spurious association,risk:StatisticalBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +NonNormalityBias,Non-Normality Bias,"Bias that occurs when the dataset is subject to a different (i.e. non-normal) distribution (e.g., Chi-Square, Beta, Lorentz, Cauchy, Weibull or Pareto) where the results can be biased and misleading",risk:StatisticalBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +DataProcessingBias,Data Processing Bias,"Bias that occurs due to pre-processing (or post-processing) of data, even though the original data would not have led to any bias",risk:DataBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +SimpsonsParadoxBias,Simpson'S Paradox Bias,Bias that occurs when a trend that is indicated in individual groups of data reverses when the groups of data are combined,risk:DataBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +DataAggregationBias,Data Aggregation Bias,Bias that occurs when aggregating data covering different groups of objects has different statistical distributions that introduce bias into the data,risk:DataBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +InformativenessBias,Informativeness Bias,Bias that occurs when the mapping between inputs present in the data and outputs are more difficult to identify for some group,risk:EngineeringDecisionBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, + +Concepts not in scope / not suitable ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +OtherDataBias,Other Data Bias,The data and any labels can also be biased by artefacts or other disturbing influences.,risk:DataBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,,Daniel Doherty,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, + +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, + +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, + +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, diff --git a/code/vocab_csv/ai-bias.csv b/code/vocab_csv/ai-bias.csv new file mode 100644 index 000000000..d3be34872 --- /dev/null +++ b/code/vocab_csv/ai-bias.csv @@ -0,0 +1,18 @@ +Term,Label,Definition,ParentTerm,ParentType,Value,RelatedTerms,Relation,Usage,Source,Created,Modified,Status,Contributors,Resolution +AI specific Biases,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +AIBias,AI Bias,"Bias associated with development, use, or other activities involving an AI technology or system",risk:Bias,risk:RiskConcept,,,,,,2024-09-18,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +AutomationBias,Automation Bias,"Bias tha occurs due to propensity for humans to favour suggestions from automated decision-making systems and to ignore contradictory information made without automation, even if it is correct",risk:CognitiveBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +DataBias,Data Bias,Bias that occurs due to unaddressed data properties that lead to AI systems that perform better or worse for different groups,ai:AIBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +DataLabelsAndLabellingProcessBias,Data Labels And Labelling Process Bias,Bias that occurs due to the labelling process itself introducing societal or cognitive biases,ai:DataBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +NonRepresentativeSamplingBias,Non-Representative Sampling Bias,"Bias that occurs if a dataset is not representative of the intended deployment environment, where the model learns biases based on the ways in which the data is non-representative",ai:DataBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +MissingFeaturesAndLabelsBias,Missing Features And Labels Bias,Bias that occurs when features are missing from individual training samples,ai:DataBias,risk:RiskConcept,,,,If the frequency of missing features is higher for one group than another then this presents another vector for bias,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +DataAggregationBias,Data Aggregation Bias,Bias that occurs from aggregating data covering different groups of objects that might have different statistical distributions which introduce bias into the data used to train AI systems,ai:DataBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +DistributedTrainingBias,Distributed Training Bias,Bias that occurs due to distributed machine having different sources of data that do not have the same distribution of feature space,ai:DataBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +EngineeringDecisionBias,Engineering Decision Bias,"Bias that occurs due to machine learning model architectures - encompassing all model specifications, parameters and manually designed features",ai:AIBias,risk:RiskConcept,,,,Data bias and human cognitive bias can contribute to such bias,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +FeatureEngineeringBias,Feature Engineering Bias,"Bias that occurs from steps such as encoding, data type conversion, dimensionality reduction and feature selection which are subject to choices made by the AI developer and introduce bias in the ML model",ai:EngineeringDecisionBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +AlgorithmSelectionBias,Algorithm Selection Bias,Bias that occurs from the selection of machine learning algorithms built into the AI system which introduce unwanted bias in predictions made by the system because the type of algorithm used introduces a variation in the performance of the ML model,ai:EngineeringDecisionBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +HyperparameterTuningBias,Hyperparameter Tuning Bias,"Bias that occurs from hyperparameters defining how the model is structured and which cannot be directly trained from the data like model parameters, where hyperparameters affect the model functioning and accuracy of the model",ai:EngineeringDecisionBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +InformativenessBias,Informativeness Bias,"Bias that occurs or some groups, the mapping between inputs present in the data and outputs are more difficult to learn and where a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data",ai:EngineeringDecisionBias,risk:RiskConcept,,,,"This can happen when some features are highly informative about one group, while a different set of features is highly informative about another group. If this is the case, then a model that only has one feature set available, can be biased against the group whose relationships are difficult to learn from available data",ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +ModelBias,Model Bias,"Bias that occurs when ML uses functions like a maximum likelihood estimator to determine parameters, and there is data skew or under-representation present in the data, where the maximum likelihood estimation tends to amplify any underlying bias in the distribution",ai:EngineeringDecisionBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +ModelInteractionBias,Model Interaction Bias,Bias that occurs from the structure of a model to create biased predictions,ai:EngineeringDecisionBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, +ModelExpressivenessBias,Model Expressiveness Bias,Bias that occurs from the number and nature of parameters in a model as well as the neural network topology which affect the expressiveness of the model and any feature that affects model expressiveness differently across groups,ai:ModelInteractionBias,risk:RiskConcept,,,,,ISO/IEC 24027:2021,2024-09-13,,accepted,Daniel Doherty,,,,,,,,,,,,,,,,,, diff --git a/code/vocab_csv/ai.xlsx b/code/vocab_csv/ai.xlsx index 4452963a7..332419612 100644 Binary files a/code/vocab_csv/ai.xlsx and b/code/vocab_csv/ai.xlsx differ diff --git a/code/vocab_csv/risk.xlsx b/code/vocab_csv/risk.xlsx index 98b8bba56..7492c641f 100644 Binary files a/code/vocab_csv/risk.xlsx and b/code/vocab_csv/risk.xlsx differ diff --git a/code/vocab_management.py b/code/vocab_management.py index 6241f7841..ee6cd6c21 100644 --- a/code/vocab_management.py +++ b/code/vocab_management.py @@ -295,7 +295,10 @@ }, 'measures': { 'taxonomy': f'{IMPORT_CSV_PATH}/ai-measures.csv' - } + }, + 'bias': { + 'taxonomy': f'{IMPORT_CSV_PATH}/ai-bias.csv' + }, }, 'risk': { 'core': { @@ -314,6 +317,9 @@ 'risk_consequences': { 'taxonomy-risk': f'{IMPORT_CSV_PATH}/RiskConsequences.csv', }, + 'bias': { + 'taxonomy-risk': f'{IMPORT_CSV_PATH}/Bias.csv', + }, 'incident': { 'taxonomy': f'{IMPORT_CSV_PATH}/Incident.csv', }, @@ -805,6 +811,7 @@ 'capabilities': f'{IMPORT_PATH}/ai/modules/capabilities.ttl', 'risks': f'{IMPORT_PATH}/ai/modules/risks.ttl', 'measures': f'{IMPORT_PATH}/ai/modules/measures.ttl', + 'bias': f'{IMPORT_PATH}/ai/modules/bias.ttl', }, 'metadata': { "dct:title": "AI Technology Concepts", @@ -828,6 +835,7 @@ 'risk_controls': f'{IMPORT_PATH}/risk/modules/risk_controls.ttl', 'incident': f'{IMPORT_PATH}/risk/modules/incident.ttl', 'incident_status': f'{IMPORT_PATH}/risk/modules/incident_status.ttl', + 'bias': f'{IMPORT_PATH}/risk/modules/bias.ttl', }, 'metadata': { "dct:title": "Risk Concepts",