Construct: Actual misuse
Also quoted in literature as:
- abuse by insiders
- information security contravention
- software security contravention
This construct belongs to the following categories:
This construct is used by:
Papers using this construct cite the following papers for the source of this construct: