Research Article
Information Security Management of Sharing Economy Based on Blockchain Technology
Table 2
Confirmatory analysis results.
| Dimension | Question type | Model parameter estimates | Reliability and validity | Non-standardized | S.E | C.R | Standardized | SMC | CR | AVE |
| Network controller | Q1 | 1.025 | 0.125 | 8.152 | 0.856 | 0.452 | 0.796 | 0.562 | Q2 | 1.083 | 0.122 | 8.253 | 0.255 | 0.523 | Surroundings | Q3 | 0.856 | 0.128 | 9.235 | 0.552 | 0.853 | 0.965 | 0.532 | Q4 | 1.235 | 0.862 | 23.25 | 0.568 | 0.529 | Technology | Q5 | 1.123 | 0.238 | 8.623 | 0.961 | 0.533 | 0.862 | 0.522 | Q6 | 0.632 | 0.258 | 4.253 | 0.523 | 0.423 | Information security | Q7 | 0.992 | 0.128 | 4.523 | 0.742 | 0.532 | 0.965 | 0.823 | Q8 | 0.890 | 0.035 | 9.128 | 0.853 | 0.426 | Standard | ā | >0 | >1.85 | <0.05 | >0.5 | >0.7 |
|
|