Popular Articles

  1. Likelihood: Threats/Sources Chart

    Overview The Threats Chart page displays a variety of charts for threats and sub-threats. It displays the same likelihoods as in the Threats Grid .  In Riskion, we refer to threats , causes , hazards , and sources  interchangeably.  While...
  2. Permanently delete or restore deleted models

    Models that are marked as deleted are put in the deleted tab and remain there until:   they are permanently deleted by pressing the Delete option they are restored by pressing the Restore (undelete) option or, until some period of time has elaps...
  3. Expand, Collapse and Auto-Redraw the Objecrives Hierarchy

    will expand all branches of the hierarchy.  will collapse the hierarchy and show only the goal and the first level of elements (objectives). You can also expand/collapse sections of the hierarchy by clicking the same icons at the left of the o...
  4. Impact: Evaluation Progress

    The Impact's Evaluation Progress page can be found in   IMPACT  OF EVENTS > MEASURE >   Evaluation Progress . The Overall Impact's Evaluation Progress bar and its equivalent percentage are displayed.  By default, All Participants' overall ...
  5. Hierarchy

  6. Impact: Gradient Analysis

    Overview The gradient analysis for Impact shows the rate of change of the impact of events due to the change in the impact of one of the objectives. Gradient Sensitivity for the Overall Events Impacts  Gradient sensitivity is composed ...
  7. Likelihood: Consensus View

    The consensus view shows the standard deviations (the square root of the variances) among evaluators who have both an allowed role   and a judgment. The table is sorted from highest disagreement to lowest disagreement among evaluators for each...
  8. Welcome Page

    The Riskion Evaluation process usually starts with the Welcome Page where the Project Manager can give an introduction and instructions to the Evaluators. Depending on the model you are currently evaluating, the welcome page can be for Likelihood o...
  9. Direct Entry Evaluation

    The Direct Input method can be used when evaluating threats/objectives with respect to another threat/objective or when evaluating events with respect to a threat/objective. In the example below, we are asked to evaluate all the sources given Human...
  10. Add, Edit, and Delete Threats

    The Threats hierarchy can be created, viewed, and edited from any of the following pages: IDENTIFY/STRUCTURE > IDENTIFY  > Threats ; or IDENTIFY/STRUCTURE >   Threats > Hierarchy  or LIKELIHOOD OF EVENTS > STRUCTURE > EVENTS SOU...