Collegiate Student-Athletes’ Privacy Management Strategies and Their Impact on Twitter Usage Behaviors

Authors

  • Amanda Jo Pulido University of the Incarnate Word, San Antonio, Texas
  • Kenneth C.C. Yang DEPARTMENT OF COMMUNICATION THE UNIVERSITY OF TEXAS AT EL PASO
  • Yowei Kang Kainan University

Keywords:

collegiate student-athletes, Communication Privacy Management Theory (CPM), privacy management strategies, NCAA, questionnaire survey, hierarchical regression analysis, social media, Twitter usage behaviors

Abstract

This study examines collegiate student-athletes’ privacy management strategies and the impact on their Twitter usage behaviors from Communication Privacy Management Theory (CPM). A questionnaire was used to recruit student-athletes from a national sample of NCAA Division 1 universities in the United States. Three hierarchical regression analyses conclude that collegiate student-athletes’ privacy management strategies would affect their Twitter usage behaviors, such as frequency of checking Twitter, minutes spent on the platform and tweet content . This research extends CPM to the collegiate sports context. Implications are discussed.

Author Biographies

Amanda Jo Pulido, University of the Incarnate Word, San Antonio, Texas

Amanda Jo Pulido graduated from the Department of Communication, The University of Texas at El Paso, USA. She is Athletics Life Skills Coordinator, University of the Incarnate Word, San Antonio, TX. She is interested in studying the use of social media behaviors among collegiate athletes.

Kenneth C.C. Yang, DEPARTMENT OF COMMUNICATION THE UNIVERSITY OF TEXAS AT EL PASO

Dr. Kenneth C. C. Yang is a Professor, Department of Communication, The University of Texas at El Paso, USA. His research focuses on new media, advertising, and consumer adoption behaviors.

Yowei Kang, Kainan University

Dr. Yowei Kang is an Assistant Professor, Department of Film and Creative Media, Kainan University, Taiwan. His research focuses on technology and rhetoric, experiential rhetoric, and digital game rhetoric.

 

References

Bernstein, J. (2001). PA819 Quantitative methods for public policy lecture 8: Multicollinearity [Online]. Available:
http://polisci.wisc.edu/~PMANNA/pa819/Lecture_and_Section/Lec8_Multicollinearity.pdf, Department of Political Sciences, University of Wisconsin at Madison.

Browning, B., & Sanderson, J. (2012). The positives and negatives of Twitter: Exploring how student-athletes use Twitter and respond to critical tweets. International Journal of Sport Communication, 5, 503-521.

Child, J., & Agyeman-Budu, E. A. (2010). Blogging privacy management rule development: The impact of self-monitoring skills, concern for appropriateness, and blogging frequency. Computer in Human Behavior, 26, 957-963.

Cohen, A., & Duchan, G. (2012). The usage characteristics of twitter in the learning process. Interdisciplinary Journal of E-Learning and Learning Objects, 8, Retrieved May 2, 2016 from http://www.ijello.org/Volume2018/IJELLOv2018p2149-2163Cohen0808.pdf.

Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer Mediated Communication, 15, 83-108.

Dwyer, C., Hiltz, S. R., & Passerini, K. (2007, August 09 - 12). Trust and privacy concern within social networking sites: A comparison of Facebook and Myspace. Paper presented at the Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado.

Ellison, N., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook friends: Exploring the relationship between college students’ use of online social networks and social capital. Journal of Computer-Mediated Communication, 12(4), Retrieved October 19, 2014 from http://jcmc.indiana.edu/vol2012/issue2014/ellison.html
FieldHouse, & Media. (n.d.). Fieldhouse media presentation. Retrieved May 24, 2015 from http://www.fieldhousemedia.net/wp-content/uploads/2014/09/FH_Media_2014.pdf

Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25, 153-160.

Garde-Perik, E. V. D., Markopoulos, P., Ruyter, B. D., Eggen, B., & Ijsselsteijn, W. (2008). Investigating privacy attitudes and behavior in relation to personalization. Social Science Computer Review, 26(1), 20-43.

Gillen, J., & Merchant, G. (2013). Contact calls: Twitter as a dialectic social and linguistic practice. Language Sciences, 35, 47-58.

Hambrick, M., Simmons, J., Greenhalgh, G., & Greenwell, T. (2010). Understanding professional athletes' use of Twitter: A content analysis of athlete tweets. International Journal of Sport Communication, 3, 454-471.

Jin, S. A. (2013). Peeling back the multiple layers of Twitter's private disclosure onion: The roles of virtual identity discrepancy and personality traits in communication privacy management on Twitter. New Media & Society, 15, 813-833.

Johnson, P. R., & Yang, S. (2009, August). Uses and gratifications of Twitter: An examination of user motives and satisfaction of Twitter use. Presented at the Communication Technology Division of the Annual Convention of the Association for Education in Journalism and Mass Communication, Boston, Massachusetts.

Joinson, A. (1999). Social desirability, anonymity and internet-based questionnaires. Behavior Research Methods, Instruments and Computers, 33(3), 433-438.

Kassing, J. W., & Sanderson, J. (2010). Tweeting through the giro: A case study of fan–athlete interaction on twitter. International Journal of Sport Communication, 3, 113–128.

Kennedy-Lightsey, C. D., Martin, M., Thompson, M., Himes, K., & Clingerman, B. Z. (2012). Communication privacy management theory: Exploring coordination and ownership between friends. Communication Quarterly, 60, 665-680.

Mansfield, E. R., & Helms, B.P. (1982). Detecting multicollinearity. American Statisticians, 36(3), 158-160.

McCluskey, J. (2013, September 30). Twitter and student-athletes a bad mix? ESPNBoston.com, Retrieved October 1, 2014 from http://espn.go.com/blog/boston/colleges/post/_/id/3703/twitter-and-student-athletes-a-bad-mix

Miller, R. K., & Washington, K. (2013). Chapter 43: NCAA sports. Sports Marketing, 338-348.

Norlander, M. (2015, May 27). Ex-MSU/ND player rips NCAA, claims fixed drug test in 'drunk' rant. CBSSPORTS.COM, Retrieved April 20, 2016 from http://www.cbssports.com/collegebasketball/eye-on-college-basketball/25197757/former-msu-n-dame-player-garrick-sherman-drunkenly-tweets-anger-at-ncaa.

O'Brien, D., & Torres, A. M. (2012). Social networking and online privacy: Facebook users' perceptions. Irish Journal of Management, 31(2), 63-97.

Paulson, K. (2012, April 16). College athlete tweet ban? Free speech sacks that idea. USA Today, Retrieved November 1, 2014 from http://usatoday30.usatoday.com/news/opinion/forum/story/2012-04-15/twitter-social-media-college-sports-coaches-ban/54301178/1

Pegoraro, A. (2010). Look who’s talking-athletes on twitter: A case study. International Journal of Sport Communication, 3, 501-514.

Petronio, S., & Reierson, J. (2009). Regulating the privacy of confidentialitv grasping the complexities through communication privacy management theory. In T. A. Afifi & W. A. Afifi (Eds.), Uncertainty, information management, and disclosure decisions: Theories and applications (pp. 365-383): New York, NY: Routledge.

Petronio, S. (2000). The boundaries of privacy: Praxis of everyday life. In S. Petronio (Ed.), Balancing the secrets of private disclosures (pp. 37-49).Mahwah, NJ: Erlbaum.

Petronio, S. (2002). Boundaries of privacy: Dialectics of disclosure. Albany: State University of New York Press.

Petronio, S. (2013). Brief status report on communication privacy management theory. Journal of Family Communication, 13, 6-14.

Plander, K. L. (2013). Checking accounts: Communication privacy management in familial financial caregiving. Journal of Family Communication, 13, 17-31.

Romero, D., Galuba, W., Asur, S., & Huberman, B. (2011). Influence and passivity in social media. Machine Learning and Knowledge Discovery in Databases Lecture Notes in Computer Sciences, 18-33.

Sanderson, J., & Browning, B. (2013). Training versus monitoring: A qualitative examination of athletic department practices regarding student-athletes and Twitter. Qualitative Research Reports in Communication, 14, 105-111.

Sanderson, J., & Truax, C. (2014). "I hate you man!" Exploring maladaptive parasocial interaction expressions to college athletes via twitter. Journal of Issues in Intercollegiate Athletics, 7, 333-351.

Sanderson, J., Browning, B., & Schmittel, A. (2015a). Education on the digital terrain: A case study exploring college athletes' perceptions of social-media training. International Journal of Sport Communication, 8(1), 103-124.

Sanderson, J., Snyder, E., Hull, D., & Gramlich, K. (2015b). Social media policies within ncaa member institutions: Evolving technology and its impact on policy. Journal of Issues in Intercollegiate Athletics, 8, 50-73.

Smith, C. (2014, April 15). The most valuable conferences in college sports 2014. Forbes.com, 24. Retrieved October 15, 2014 from http://www.forbes.com/sites/chrissmith/2014/04/15/the-most-valuable-conferences-in-college-sports-2014/

Spiekermann, S. (2005). Perceived control: scales for privacy in ubiquitous computing. Institute of Information Systems, 1-12.

Thompson, J., Petronio, S., & Braithwaite, D. O. (2012, January-March). An examination of privacy rules for academic advisors and college student-athletes: A communication privacy management perspective. Communication Studies, 63(1), 54-76.

Thompson, J. (2011). Communication privacy management in college athletics: Exploring privacy dilemmas in the athletic/academic advisor student-athlete interpersonal relationship. Journal of Sport Administration & Supervision, 3(1), 44-60.

Tufekci, Z. (2008). Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science, Technology & Society, 28(1), 20–36.

Twitter. (2016a). Protecting your personal information. Retrieved April 21, 2016 from https://support.twitter.com/articles/18368

Twitter. (2016b). Private information posted on twitter. Retrieved April 21, 2016 from Https://support.twitter.com/articles/18368

Waters, S., & Ackerman, J. (2011). Exploring privacy management on Facebook: Motivations and perceived consequences of voluntary disclosure. Journal of Computer-Mediated Communication, 17, 101-115.

Watkins, B., & Lewis, R. (2016). I am woman, but not roaring: An examination of similarities and differences in how male and female professional athletes are using Twitter. The Journal of Social Media in Society, 5(3), 5-36.

Wrench, J., Maddox, C. T., Richmond, V. P., & McCroskey, J. C. (2008). Quantitative research methods for communication. New York: Oxford University Press.

Wu, K. W., Huang, S. Y., Yen, D. C., & Popova, I. (2012). The effect of online privacy policy on consumer privacy concern and trust. Computers in Human Behavior, 28, 889-897.

Downloads

Published

2017-12-19