Popular Articles

  1. Impact: Four at a Time

    This page displays the same information as with the Impact's Sensitivity ∆ Events Sensitivity: One at a time but with four participants or groups at a time. Impact's Sensitivity Δ Delta Events - Four users/groups at a time Sensit...
  2. Add, Edit, and Delete Threats

    The Threats hierarchy can be created, viewed, and edited from any of the following pages: IDENTIFY/STRUCTURE > IDENTIFY  > Threats ; or IDENTIFY/STRUCTURE >   Threats > Hierarchy  or LIKELIHOOD OF EVENTS > STRUCTURE > EVENTS SOU...
  3. Threats

  4. Expand, Collapse and Auto-Redraw the Threats Hierarchy

     will expand all branches of the hierarchy.  will collapse the hierarchy and show only the goal and the first level of elements (threats). You can also expand/collapse sections of the hierarchy by clicking the same icons at the left of the thr...
  5. Likelihood: One at a time

    Sensitivity ∆ (delta) Events  page for Likelihood shows the changes in overall event likelihoods when the event likelihood due to one or more covering threats/sources is changed. If you change an event's likelihood given a single threat/source, you...
  6. Common Synthesize Advanced Options: CIS, User Priorities, WRT top-node

    When the Advanced mode is ON, you will see the advanced options of the page you are currently working on.  1. Combined Input Option (CIS) If the Combined Input Option (CIS) is on (see below) then results for individuals are computed by combining...
  7. Inconsistency Report

    Depending on the model you are working on, the inconsistencies are shown for each cluster for which likelihoods or impacts were derived with pairwise comparisons.   This is found on:  Likelihood of Events > Synthesize > Others > INCONSISTENCI...
  8. Welcome Page

    The Riskion Evaluation process usually starts with the Welcome Page where the Project Manager can give an introduction and instructions to the Evaluators. Depending on the model you are currently evaluating, the welcome page can be for Likelihood o...
  9. Direct Entry Evaluation

    The Direct Input method can be used when evaluating threats/objectives with respect to another threat/objective or when evaluating events with respect to a threat/objective. In the example below, we are asked to evaluate all the sources given Human...
  10. Likelihood: Information Documents

    You can define Likelihood's Information Documents in the LIKELIHOOD OF EVENTS   > STRUCTURE  > Information Documents page. This screen allows you to create and/or edit information documents for: The Threats (top node) Threats Sub-thr...