Popular Articles

  1. TeamTime Evaluation Welcome

    The welcome screen has been prepared by the Project Manager and typically contains instructions and possibly links for you to explore.
  2. Likelihood: Threats/Sources Chart

    Overview The Threats Chart page displays a variety of charts for threats and sub-threats. It displays the same likelihoods as in the Threats Grid .  In Riskion, we refer to threats , causes , hazards , and sources  interchangeably.  While...
  3. Risk of Events From Threats with Controls

    Overview This page displays a similar grid as with the Risk of Events From Threats (without controls), but with added columns for results when Controls are in effect. In Riskion, we refer to threats , causes , hazards , and sources  interc...
  4. Bow-Tie Diagram From Threats with Controls

    Overview This page displays a similar diagram as with the Bow-tie diagram from specific Threats (without controls) -- but on this page, the likelihoods, impacts, and risks are calculated with controls in effect. Controls can also be viewed, sel...
  5. Vulnerabilities Grid

  6. Impact: 2D Analysis

    Overview The Two Dimensional sensitivity for Impact shows how well the events perform given any two objectives.  2D Analysis for the Overall Events Impacts One objective is represented on the X-Axis and another on the Y-Axis. The ...
  7. Controls for Event Consequences (by Control)

    In addition to managing (view, add, assign) the Controls for Events Consequences for one selected event at a time (by Event) , you can also perform the same actions for one selected control at a time (by Control). From the grid above, you can s...
  8. Impact: Four at a Time

    This page displays the same information as with the Impact's Sensitivity ∆ Events Sensitivity: One at a time but with four participants or groups at a time. Impact's Sensitivity Δ Delta Events - Four users/groups at a time Sensit...
  9. Downgrade Model (Version Not Supported)

    Models with a later database version will not be supported on a site with an earlier database version.  This scenario may occur when a model was created or opened on a Comparion site with a later database version, and you try to access the model on...
  10. Direct Entry Evaluation

    The Direct Input method can be used when evaluating threats/objectives with respect to another threat/objective or when evaluating events with respect to a threat/objective. In the example below, we are asked to evaluate all the sources given Human...