Title page
Contents
Summary 4
01. Introduction 5
02. Perceptions of utility 9
03. Risk perception in cybers 16
04. Conclusion and recommendations 28
Annex 1. Interviews 33
Annex 2. Core interview question set 34
About the author 35
Acknowledgments 35
Table 1. Known authorization mechanisms by country 23
Boxes
Box 1. 'Defend forward' and persistent engagement 19