Research Article

An Integrative Behavioral Model of Information Security Policy Compliance

Table 4

Factor loading and cross loading.

Variables Defense of ubiquity (DU)Intentions of compliance (IN)Metaphor of the ledger (ML)Normative belief (NB)Cost of noncompliance (NC)Response efficacy (RE)Self-efficacy (SE)

DU11.000−0.5510.722−0.468−0.291−0.482−0.351
IN1−0.5410.982−0.6770.8110.4880.7940.579
IN2−0.5430.980−0.6680.7880.4960.7890.582
IN3−0.5360.977−0.6690.8290.5110.7980.583
ML10.704−0.6660.974−0.602−0.323−0.578−0.355
ML20.708−0.6790.984−0.616−0.361−0.597−0.380
ML30.708−0.6660.977−0.587−0.345−0.589−0.337
NB1−0.4090.685−0.4990.8930.4730.6420.524
NB2−0.4550.824−0.6160.9600.5060.7380.582
NB3−0.4580.817−0.6130.9720.5240.7460.604
NC1−0.2370.431−0.2910.4330.9260.4050.312
NC2−0.3230.527−0.3680.5360.9720.4780.361
NC3−0.2980.514−0.3580.5290.9800.4640.365
NC4−0.2550.475−0.3230.5340.9640.4530.353
RE1−0.4670.763−0.5710.7130.4650.9560.638
RE2−0.4430.748−0.5350.6930.4120.9630.628
RE3−0.4770.818−0.6190.7630.4740.9600.624
SE1−0.3400.558−0.3300.5780.3820.6130.961
SE2−0.3330.581−0.3520.6010.3190.6500.973
SE3−0.3440.579−0.3760.5770.3530.6370.963