Research Article
An Integrative Behavioral Model of Information Security Policy Compliance
Table 4
Factor loading and cross loading.
| Variables | Defense of ubiquity (DU) | Intentions of compliance (IN) | Metaphor of the ledger (ML) | Normative belief (NB) | Cost of noncompliance (NC) | Response efficacy (RE) | Self-efficacy (SE) |
| DU1 | 1.000 | −0.551 | 0.722 | −0.468 | −0.291 | −0.482 | −0.351 | IN1 | −0.541 | 0.982 | −0.677 | 0.811 | 0.488 | 0.794 | 0.579 | IN2 | −0.543 | 0.980 | −0.668 | 0.788 | 0.496 | 0.789 | 0.582 | IN3 | −0.536 | 0.977 | −0.669 | 0.829 | 0.511 | 0.798 | 0.583 | ML1 | 0.704 | −0.666 | 0.974 | −0.602 | −0.323 | −0.578 | −0.355 | ML2 | 0.708 | −0.679 | 0.984 | −0.616 | −0.361 | −0.597 | −0.380 | ML3 | 0.708 | −0.666 | 0.977 | −0.587 | −0.345 | −0.589 | −0.337 | NB1 | −0.409 | 0.685 | −0.499 | 0.893 | 0.473 | 0.642 | 0.524 | NB2 | −0.455 | 0.824 | −0.616 | 0.960 | 0.506 | 0.738 | 0.582 | NB3 | −0.458 | 0.817 | −0.613 | 0.972 | 0.524 | 0.746 | 0.604 | NC1 | −0.237 | 0.431 | −0.291 | 0.433 | 0.926 | 0.405 | 0.312 | NC2 | −0.323 | 0.527 | −0.368 | 0.536 | 0.972 | 0.478 | 0.361 | NC3 | −0.298 | 0.514 | −0.358 | 0.529 | 0.980 | 0.464 | 0.365 | NC4 | −0.255 | 0.475 | −0.323 | 0.534 | 0.964 | 0.453 | 0.353 | RE1 | −0.467 | 0.763 | −0.571 | 0.713 | 0.465 | 0.956 | 0.638 | RE2 | −0.443 | 0.748 | −0.535 | 0.693 | 0.412 | 0.963 | 0.628 | RE3 | −0.477 | 0.818 | −0.619 | 0.763 | 0.474 | 0.960 | 0.624 | SE1 | −0.340 | 0.558 | −0.330 | 0.578 | 0.382 | 0.613 | 0.961 | SE2 | −0.333 | 0.581 | −0.352 | 0.601 | 0.319 | 0.650 | 0.973 | SE3 | −0.344 | 0.579 | −0.376 | 0.577 | 0.353 | 0.637 | 0.963 |
|
|