Security Constructs
Home
Categories
Constructs
Publications
Construct:
Software piracy
This construct belongs to the following categories:
Uncategorised
This construct is used by:
Chu, 2014:
Development and Validation of Instruments of Information Security Deviant Behavior
Questions given: yes
Papers using this construct cite the following papers for the source of this construct:
Kwan et al., 2010:
Applying the Randomized Response Technique to Elicit Truthful Responses to Sensitive Questions in IS Research: The Case of Software Piracy Behavior