Research Article

An Integrative Behavioral Model of Information Security Policy Compliance

Table 3

Factor loading and cross loading.

VariablesAppeal to higher loyalties (AL)Attitude (AT)Benefit of compliance (BE)Condemnation of condemners (CC)Cost of compliance (CO)Denial of injury (DI)Defense of necessity (DN)Denial of responsibility (DR)

AL10.967−0.591−0.4310.8230.5280.7560.8180.725
AL20.976−0.596−0.4290.8120.5080.7470.8260.729
AL30.958−0.571−0.3940.8040.5470.7240.8420.712
AT1−0.6410.9200.640−0.593−0.493−0.645−0.604−0.656
AT2−0.4990.9330.737−0.467−0.415−0.523−0.457−0.576
AT3−0.5740.9570.714−0.491−0.499−0.580−0.540−0.620
AT4−0.5600.9490.747−0.527−0.456−0.553−0.523−0.614
BE1−0.4840.7340.902−0.457−0.422−0.581−0.450−0.552
BE2−0.4330.7230.956−0.396−0.410−0.538−0.427−0.569
BE3−0.3450.6800.951−0.305−0.393−0.460−0.354−0.486
BE4−0.3430.6710.920−0.311−0.401−0.435−0.367−0.463
CC10.773−0.488−0.3470.9490.4760.7390.7400.699
CC20.841−0.551−0.4040.9710.5360.7490.8180.705
CC30.812−0.556−0.3910.9670.5360.7160.7850.721
CO10.596−0.515−0.4410.5560.8710.4980.6010.572
CO20.421−0.408−0.3620.4130.8930.3330.4440.424
CO30.373−0.351−0.3200.4120.8670.2920.3920.383
DI10.701−0.553−0.4950.7000.3710.9560.7070.704
DI20.757−0.599−0.5320.7570.4480.9780.7240.721
DI30.775−0.631−0.5510.7630.4670.9770.7370.742
DN10.763−0.515−0.3620.7240.5060.6690.9240.624
DN20.835−0.536−0.4160.7840.5440.7230.9680.683
DN30.848−0.564−0.4480.8100.5550.7340.9650.701
DR10.711−0.678−0.5800.6720.5130.7140.6850.941
DR20.665−0.523−0.4510.6550.5020.6120.6110.909
DR30.710−0.628−0.5190.7280.4920.7480.6690.944