Analyzing Threat Perceptions in the Context of Fitness Data: Refining the Threat Calculus In Technology Threat Avoidance Theory
|dc.contributor.advisor||McLeod, Alexander J.|
|dc.contributor.author||Boysen, Sara D. ( )|
|dc.identifier.citation||Boysen, S. D. (2018). Analyzing threat perceptions in the context of fitness data: Refining the threat calculus in technology threat avoidance theory (Unpublished thesis). Texas State University, San Marcos, Texas.|
The number of people using fitness devices and mobile health applications creates unprecedented amounts of health-related fitness data. The data collected via these devices are not considered protected health information, therefore they are not provided the same legal protections. In the absence of legal provisions, users are responsible for ensuring their data are safe from potential data breaches and malicious activities.
This study uses a revised Technology Threat Avoidance Theory (TTAT) model to analyze users’ motivations to implement safeguarding measures aimed at protecting their health-related fitness data. A revision was made to the threat calculus contained in the original TTAT model, and a privacy concerns construct was added as an antecedent to avoidance motivation.
Students at a large university responded to a survey instrument evaluating how they form their threat perceptions and other factors influencing avoidance motivations. Results supported the revised threat calculus in the TTAT model. All of the original TTAT model constructs were upheld, except for safeguard cost. The privacy concerns construct was not significant in predicting avoidance motivations.
|dc.format.medium||1 file (.pdf)|
|dc.subject||Technology Threat Avoidance Theory|
|dc.subject||Health-related fitness data|
|dc.subject||Mobile health applications|
|dc.subject||Threats from malicious IT|
|dc.subject.lcsh||Information technology--Security measures||en_US|
|dc.subject.lcsh||Wearable technology--Risk assessment||en_US|
|dc.title||Analyzing Threat Perceptions in the Context of Fitness Data: Refining the Threat Calculus In Technology Threat Avoidance Theory|
|dc.contributor.committeeMember||Gibbs, David L.|
|dc.contributor.committeeMember||Hewitt, Barbara A.|
|thesis.degree.department||Health Information Management|
|thesis.degree.discipline||Health Information Management|
|thesis.degree.grantor||Texas State University|
|thesis.degree.name||Master of Health Information Management|