Security Constructs
Home
Categories
Constructs
Publications
Construct:
Resource misuse
This construct belongs to the following categories:
Information security deviant behavior
This construct is used by:
Chu, 2014:
Development and Validation of Instruments of Information Security Deviant Behavior
Questions given: yes