Collegiate Student-Athletes’ Privacy Management Strategies and Their Impact on Twitter Usage Behaviors
Keywords:
collegiate student-athletes, Communication Privacy Management Theory (CPM), privacy management strategies, NCAA, questionnaire survey, hierarchical regression analysis, social media, Twitter usage behaviorsAbstract
This study examines collegiate student-athletes’ privacy management strategies and the impact on their Twitter usage behaviors from Communication Privacy Management Theory (CPM). A questionnaire was used to recruit student-athletes from a national sample of NCAA Division 1 universities in the United States. Three hierarchical regression analyses conclude that collegiate student-athletes’ privacy management strategies would affect their Twitter usage behaviors, such as frequency of checking Twitter, minutes spent on the platform and tweet content . This research extends CPM to the collegiate sports context. Implications are discussed.
References
http://polisci.wisc.edu/~PMANNA/pa819/Lecture_and_Section/Lec8_Multicollinearity.pdf, Department of Political Sciences, University of Wisconsin at Madison.
Browning, B., & Sanderson, J. (2012). The positives and negatives of Twitter: Exploring how student-athletes use Twitter and respond to critical tweets. International Journal of Sport Communication, 5, 503-521.
Child, J., & Agyeman-Budu, E. A. (2010). Blogging privacy management rule development: The impact of self-monitoring skills, concern for appropriateness, and blogging frequency. Computer in Human Behavior, 26, 957-963.
Cohen, A., & Duchan, G. (2012). The usage characteristics of twitter in the learning process. Interdisciplinary Journal of E-Learning and Learning Objects, 8, Retrieved May 2, 2016 from http://www.ijello.org/Volume2018/IJELLOv2018p2149-2163Cohen0808.pdf.
Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer Mediated Communication, 15, 83-108.
Dwyer, C., Hiltz, S. R., & Passerini, K. (2007, August 09 - 12). Trust and privacy concern within social networking sites: A comparison of Facebook and Myspace. Paper presented at the Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado.
Ellison, N., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook friends: Exploring the relationship between college students’ use of online social networks and social capital. Journal of Computer-Mediated Communication, 12(4), Retrieved October 19, 2014 from http://jcmc.indiana.edu/vol2012/issue2014/ellison.html
FieldHouse, & Media. (n.d.). Fieldhouse media presentation. Retrieved May 24, 2015 from http://www.fieldhousemedia.net/wp-content/uploads/2014/09/FH_Media_2014.pdf
Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25, 153-160.
Garde-Perik, E. V. D., Markopoulos, P., Ruyter, B. D., Eggen, B., & Ijsselsteijn, W. (2008). Investigating privacy attitudes and behavior in relation to personalization. Social Science Computer Review, 26(1), 20-43.
Gillen, J., & Merchant, G. (2013). Contact calls: Twitter as a dialectic social and linguistic practice. Language Sciences, 35, 47-58.
Hambrick, M., Simmons, J., Greenhalgh, G., & Greenwell, T. (2010). Understanding professional athletes' use of Twitter: A content analysis of athlete tweets. International Journal of Sport Communication, 3, 454-471.
Jin, S. A. (2013). Peeling back the multiple layers of Twitter's private disclosure onion: The roles of virtual identity discrepancy and personality traits in communication privacy management on Twitter. New Media & Society, 15, 813-833.
Johnson, P. R., & Yang, S. (2009, August). Uses and gratifications of Twitter: An examination of user motives and satisfaction of Twitter use. Presented at the Communication Technology Division of the Annual Convention of the Association for Education in Journalism and Mass Communication, Boston, Massachusetts.
Joinson, A. (1999). Social desirability, anonymity and internet-based questionnaires. Behavior Research Methods, Instruments and Computers, 33(3), 433-438.
Kassing, J. W., & Sanderson, J. (2010). Tweeting through the giro: A case study of fan–athlete interaction on twitter. International Journal of Sport Communication, 3, 113–128.
Kennedy-Lightsey, C. D., Martin, M., Thompson, M., Himes, K., & Clingerman, B. Z. (2012). Communication privacy management theory: Exploring coordination and ownership between friends. Communication Quarterly, 60, 665-680.
Mansfield, E. R., & Helms, B.P. (1982). Detecting multicollinearity. American Statisticians, 36(3), 158-160.
McCluskey, J. (2013, September 30). Twitter and student-athletes a bad mix? ESPNBoston.com, Retrieved October 1, 2014 from http://espn.go.com/blog/boston/colleges/post/_/id/3703/twitter-and-student-athletes-a-bad-mix
Miller, R. K., & Washington, K. (2013). Chapter 43: NCAA sports. Sports Marketing, 338-348.
Norlander, M. (2015, May 27). Ex-MSU/ND player rips NCAA, claims fixed drug test in 'drunk' rant. CBSSPORTS.COM, Retrieved April 20, 2016 from http://www.cbssports.com/collegebasketball/eye-on-college-basketball/25197757/former-msu-n-dame-player-garrick-sherman-drunkenly-tweets-anger-at-ncaa.
O'Brien, D., & Torres, A. M. (2012). Social networking and online privacy: Facebook users' perceptions. Irish Journal of Management, 31(2), 63-97.
Paulson, K. (2012, April 16). College athlete tweet ban? Free speech sacks that idea. USA Today, Retrieved November 1, 2014 from http://usatoday30.usatoday.com/news/opinion/forum/story/2012-04-15/twitter-social-media-college-sports-coaches-ban/54301178/1
Pegoraro, A. (2010). Look who’s talking-athletes on twitter: A case study. International Journal of Sport Communication, 3, 501-514.
Petronio, S., & Reierson, J. (2009). Regulating the privacy of confidentialitv grasping the complexities through communication privacy management theory. In T. A. Afifi & W. A. Afifi (Eds.), Uncertainty, information management, and disclosure decisions: Theories and applications (pp. 365-383): New York, NY: Routledge.
Petronio, S. (2000). The boundaries of privacy: Praxis of everyday life. In S. Petronio (Ed.), Balancing the secrets of private disclosures (pp. 37-49).Mahwah, NJ: Erlbaum.
Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany: State University of New York Press.
Petronio, S. (2013). Brief status report on communication privacy management theory. Journal of Family Communication, 13, 6-14.
Plander, K. L. (2013). Checking accounts: Communication privacy management in familial financial caregiving. Journal of Family Communication, 13, 17-31.
Romero, D., Galuba, W., Asur, S., & Huberman, B. (2011). Influence and passivity in social media. Machine Learning and Knowledge Discovery in Databases Lecture Notes in Computer Sciences, 18-33.
Sanderson, J., & Browning, B. (2013). Training versus monitoring: A qualitative examination of athletic department practices regarding student-athletes and Twitter. Qualitative Research Reports in Communication, 14, 105-111.
Sanderson, J., & Truax, C. (2014). "I hate you man!" Exploring maladaptive parasocial interaction expressions to college athletes via twitter. Journal of Issues in Intercollegiate Athletics, 7, 333-351.
Sanderson, J., Browning, B., & Schmittel, A. (2015a). Education on the digital terrain: A case study exploring college athletes' perceptions of social-media training. International Journal of Sport Communication, 8(1), 103-124.
Sanderson, J., Snyder, E., Hull, D., & Gramlich, K. (2015b). Social media policies within ncaa member institutions: Evolving technology and its impact on policy. Journal of Issues in Intercollegiate Athletics, 8, 50-73.
Smith, C. (2014, April 15). The most valuable conferences in college sports 2014. Forbes.com, 24. Retrieved October 15, 2014 from http://www.forbes.com/sites/chrissmith/2014/04/15/the-most-valuable-conferences-in-college-sports-2014/
Spiekermann, S. (2005). Perceived control: scales for privacy in ubiquitous computing. Institute of Information Systems, 1-12.
Thompson, J., Petronio, S., & Braithwaite, D. O. (2012, January-March). An examination of privacy rules for academic advisors and college student-athletes: A communication privacy management perspective. Communication Studies, 63(1), 54-76.
Thompson, J. (2011). Communication privacy management in college athletics: Exploring privacy dilemmas in the athletic/academic advisor student-athlete interpersonal relationship. Journal of Sport Administration & Supervision, 3(1), 44-60.
Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1), 20–36.
Twitter. (2016a). Protecting your personal information. Retrieved April 21, 2016 from https://support.twitter.com/articles/18368
Twitter. (2016b). Private information posted on twitter. Retrieved April 21, 2016 from Https://support.twitter.com/articles/18368
Waters, S., & Ackerman, J. (2011). Exploring privacy management on Facebook: Motivations and perceived consequences of voluntary disclosure. Journal of Computer-Mediated Communication, 17, 101-115.
Watkins, B., & Lewis, R. (2016). I am woman, but not roaring: An examination of similarities and differences in how male and female professional athletes are using Twitter. The Journal of Social Media in Society, 5(3), 5-36.
Wrench, J., Maddox, C. T., Richmond, V. P., & McCroskey, J. C. (2008). Quantitative research methods for communication. New York: Oxford University Press.
Wu, K. W., Huang, S. Y., Yen, D. C., & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28, 889-897.
Downloads
Additional Files
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).