Theme Description
Frequency
%
Participants’ input
Customer data manipulation
2
14%
Shared technology vulnerabilities
8
57%
Data segregation
3
21%