What are the Most Widely Used and Effective Attack Coverage Systems in Men's Volleyball?

Raúl Hileno, Antonio García-De-Alcaraz, Bernat Buscà, Cristòfol Salas, Oleguer Camerino

Producció científica: Article en revista indexadaArticleAvaluat per experts

10 Cites (Scopus)

Resum

In volleyball, attack coverage is one of the play actions most neglected in coaching and research. The purpose of this study was to find out which attack coverage systems are used by high-level men's teams in different game situations and the characteristics of the most effective systems. We analysed 15 matches from the 2010 Men's Pan-American Volleyball Cup, with a total of 1,415 coverage actions. Chi-square tests for independence, adjusted residuals analysis and calculations of standardised mean difference were performed. The results show that high-level men's volleyball uses many coverage systems other than the traditional 3-2-0 and 2-3-0. At this level of play, the most frequent systems were 1-3-1 and 1-2-2, which occurred significantly often at the culmination of a third-tempo attack at the wing. The most effective systems consisted of three coverage lines, with fewer than five players covering the spiker and at least one player in the first coverage line, in both the attack and counterattack phases. Given the large number of coverage systems identified in different game situations, we recommend flexible, loosely structured training in these systems, based on a set of guiding principles that all players on a team must internalise for the specific position they are playing. Regarding the systems' efficacy, the main watchword is that on each coverage line there should always be at least one player, but the first line should not be exposed.

Idioma originalAnglès
Pàgines (de-a)111-121
Nombre de pàgines11
RevistaJournal of Human Kinetics
Volum62
Número1
DOIs
Estat de la publicacióPublicada - 2018

Fingerprint

Navegar pels temes de recerca de 'What are the Most Widely Used and Effective Attack Coverage Systems in Men's Volleyball?'. Junts formen un fingerprint únic.

Com citar-ho