Relationally-Embedded Network Ties

advertisement
Patterns of Multidimensionality of Embedded Network Ties:
A Typology of Relational Embeddedness
in Emerging Entrepreneurial Firms
Published in
Strategic Organization!
February 2003 - 1(1)
Julie M. Hite
Brigham Young University
310 MCKB
Provo, UT 84602
Email: julie_hite@byu.edu
Tel: 801-378-5039
FAX: 801-378-7740
**The author would like to thank William S. Hesterly, Jeffrey H. Dyer, Karin Fladmoe-Lindquist,
Janeen Costa, Lee T. Perry, Cliff Mayes, Steven J. Hite, Anu Phene, Kirk Wessel, Lene Foss,
Vance E. Randall and Sharon Black, as well as the editors and anonymous reviewers, for their
helpful comments and suggestions on earlier drafts of this paper.
2
Patterns of Multidimensionality of Embedded Network Ties:
A Typology of Relational Embeddedness
in Emerging Entrepreneurial Firms
ABSTRACT
Assuming heterogeneity among relationally-embedded ties, this study focuses on classification of
relationally-embedded ties. Network ties embedded within social relationships influence economic
actions and represent a strategic form of organizing for emerging entrepreneurial firms. Research
questions include the following: (1) What are the components of the social relationships of
relationally-embedded ties? (2) How can relationally-embedded network ties be classified to
identify different types of embeddedness based on variations in the social relationships? (3) What
strategic implications can be drawn from a multidimensional view of relational embeddedness?
This study uses case study methods to examine external network ties of eight emerging firms in the
computer industry. A classification typology of seven types of relational-embeddedness emerge
based upon combinations of three overarching social components--personal relationship, dyadic
economic interaction, and social capital. The typology suggests multidimensionality of both
embeddedness type and intensity. Propositions address strategic outcomes of heterogeneity within
relational embeddedness.
KEYWORDS: Networks, Embeddedness, Entrepreneurship
Patterns of Multidimensionality of Embedded Network Ties:
A Typology of Relational Embeddedness in Emerging Entrepreneurial Firms
Emerging entrepreneurial firms face the central challenge of strategically organizing to obtain
resources critical for firm survival and economic performance (Barney, 1991; Dierickx & Cool,
1989; Peteraf, 1993; Wernerfelt, 1995). Typically, these emerging firms are internally resource
poor (Jarillo, 1989; Romanelli, 1989; Siegel, Siegel, & MacMillan, 1993), having insufficient
internal resources to sustain firm survival and growth due to liabilities of both newness and
smallness (Baum, 1996). In order to ensure their survival, emerging firms must find ways to
gain access to external resources (Aldrich & Zimmer, 1986). Usually such firms find these
external resources within their social network of external dyadic ties (Gnyawali & Madhavan,
2001; Jarillo, 1989; Larson & Starr, 1993). As a result, dyadic network ties of the emerging
entrepreneurial firm are often embedded within social relationships.
These relationally-
embedded network ties represent a critical issue for the strategic organization of emerging firms,
particularly given their potential to influence resource acquisition, governance, economic
efficiency and, ultimately, firm performance.
Yet as social relationships differ, the relationally-embedded network ties that are built upon these
social relationships may also differ. While research has identified various characteristics of
embedded network ties (e.g. Granovetter, 1982; Uzzi, 1996), a classification framework has not
yet been developed for relational embeddedness. The variation within relational embeddedness
has been limited to its general representation as a dichotomous construct: that is, a network tie is
considered to be either relationally embedded or not. As a result, relationally-embedded ties
currently represent a homogenous set of network relationships. However, a critical strategic
problem for emerging entrepreneurial firms is that this assumption of homogeneity may lead to
ineffective or inefficient homogeneity of resource acquisition strategies and governance
mechanisms. If, however, variety exists within relationally-embedded ties, then a broader range
2
of resource and governance strategies may be necessary. Thus the issue to be considered is how
relationally-embedded ties are similar to or different from each other, given that the potential
differences may have critical strategic implications for the successful emergence of the firm.
In response to recent calls for research on qualities of embeddedness, as well as network
governance and the relational view of the firm (Dyer & Singh, 1999; Madhok, 1997; Rowley,
Behrens, & Krackhardt, 1999; Uzzi, 1996), this study examines the social relationships of
relationally-embedded network ties. This research addresses the need for further clarifying and
classifying the qualities of relational-embeddedness and, therefore, continues the agenda of
unpacking the theoretical construct of embeddedness (McKelvey & Aldrich, 1983; Uzzi, 1996).
As emerging firms rely so heavily upon relationally-embedded network ties (Larson & Starr,
1993), this study examines these ties within emerging entrepreneurial firms in the computer
industry.
Built upon qualitative and case study methods, this research suggests the
multidimensionality of relational embeddedness and explores variation in both type and intensity
of embeddedness.
As a result, a theoretical groundwork is laid for the development of
embeddedness measures, thus enabling the future pursuit of network embeddedness within a
richer context. The paper will first briefly discuss relationally-embedded network ties and then
describe the research methods. The section on findings will describe the social components of
relationally-embedded network ties and present a classification typology of types and intensities
of relational-embeddedness, based on the various combinations of these social components.
Finally, the paper will discuss these findings and suggest directions for future research.
Relationally-Embedded Network Ties
The recognition of network ties as a viable strategic context for organizational transactions, as an
alternative to traditional market and hierarchical ties, has attracted attention to the study of
3
networks and network relationships in strategic organizing (Borch & Arthur, 1995; Dyer &
Singh, 1998; Hennart, 1993; Powell, 1987, 1990). For emerging entrepreneurial firms that are
characteristically internally resource poor (Jarillo, 1989; Romanelli, 1989; Siegel et al., 1993),
external relationally-embedded network ties provide critical strategic avenues for obtaining
necessary external resources and establishing conduits for reciprocal patterns of communication
and exchange (Hite & Hesterly, 2001). These relationally-embedded ties facilitate resource
exchange for the emerging firm as it borrows, leverages, influences, and controls resources that it
does not currently own (Hite & Hesterly, 2001; Jarillo, 1989). Thus relationally-embedded ties
facilitate the strategic organization and positioning of an emerging firm to acquire external
resources needed for successful emergence and performance (Jarillo, 1989).1
The literature of relational embeddedness2 suggests that these ties generally influence two
strategic outcomes:
(a) ties are embedded within a social relationship that influences the
economic actions of the firm (Granovetter, 1985, 1992; Hansen, 1995; Larson & Starr, 1993;
Uzzi, 1996, 1997); and (b) ties are governed more through mechanisms of trust and relational
contracting than through traditional market governance (Dyer & Singh, 1998; Granovetter, 1985;
Macaulay, 1963; Powell, 1990; Uzzi, 1996, 1997). Relational embeddedness highlights the
critical strategic role played by personal relationships in economic exchange (Zaheer &
Venkataraman, 1995). Given that resource exchanges often reside within a social context that
may influence the attributes of transactions (Williamson, 1994), “an exclusive focus on the
transaction--rather than the relationship--as the primary unit of analysis is misplaced” (Powell &
Smith-Doerr, 1994, p. 323). Indeed, evidence is mounting that “human action is affected by the
social relations within which actors are embedded" (Mizruchi, 1994, p. 339) such that
“sociologists now take as axiomatic the proposition that economic action, including
entrepreneurial behavior, is embedded in interpersonal social networks” (Staber & Aldrich, 1995,
p. 442).
4
Thus relationally-embedded network ties contribute to a viable form of strategic
organization and can facilitate or hinder the successful emergence, survival and growth of the
emerging firm (Borch & Arthur, 1995; Hite & Hesterly, 2001; Larson, 1992; Powell, 1990;
Rowley, Behrens, & Krackhardt, 2000; Saxenian, 1990).
Relationally-embedded network ties influence the competitive actions of the emerging firm both
positively and negatively by providing both opportunities and constraints (Granovetter, 1985;
Uzzi, 1996). These ties provide critical opportunities and resources to the emerging firm that
would otherwise be unavailable through more traditional market exchange (Portes &
Sensenbrenner, 1993; Starr & MacMillan, 1990). Yet an emerging firm may maximize social
relationships over economic efficiency or other strategic considerations (Dubini & Aldrich,
1991; Granovetter, 1985; Uzzi, 1996). This shift of focus toward non-economic, relational
criteria limits or constrains the emerging firm’s strategic autonomy and thus its emergence and
future performance (Curran, Jarvis, Blackburn, & Black, 1993; Portes & Sensenbrenner, 1993).
Indeed, emerging firms with relationally-embedded ties, "far from being atomistic entities free to
undertake any competitive action within their own resource constraints, are embedded in a
network of relationships that influences their competitive behavior" (Gnyawali & Madhavan,
2001, p. 431).
For example, exchange across relationally-embedded ties may incur social
obligations and expectations beyond the scope of an arm’s-length relationship (Coleman, 1988;
Portes & Sensenbrenner, 1993).
Thus for an emerging firm, advantages of relationally-
embedded ties may often be countered by constraints or disadvantages of these network relations
(Burt, 1982; Krackhardt, 1995; Portes & Sensenbrenner, 1993; Powell, 1990; Zhao & Aram,
1995). Successful firm emergence depends upon maximizing the value of both the economic
and social exchange within these relationally-embedded network ties (Hansen, 1995; Larson &
Starr, 1993; Macneil, 1978; Zaheer & Venkataraman, 1995).
Maximizing the value of
5
relationally-embedded ties requires increasing the benefits while minimizing costs of this
complex exchange relationship (Madhok, 1997).
The critical issue that arises then is why and how relationally-embedded ties can create
differential advantages and disadvantages. This question suggests that variation in outcomes
may be influenced by variation among the relationally-embedded ties themselves. Given that
relationally-embedded network ties operate with more idiosyncratic exchange relationships than
do arm’s length market relationships (Dyer & Singh, 1998), the unique nature of the social
relationships within relationally-embedded ties may help explain the variation in outcomes.
Consideration of the nature of relational embeddedness suggests that characteristics and patterns
of social relationships between actors influence the context within which economic exchange
occurs (Granovetter, 1985; Uzzi, 1996). Granovetter (1985), therefore, suggests the need to “pay
attention to patterns of personal relations by which economic transactions are carried out” (p.
504). Thus as the social relationships in which these ties are embedded differ, the exchange
within and governance of these relationally-embedded ties may also be expected to differ and
generate differential outcomes.
A critical issue, therefore, in the development of theory
concerning the strategic organization of emerging firms is to classify the characteristics and
patterns of variation in the social relationships within which these critical network ties are
embedded (McKelvey & Aldrich, 1983; Rowley et al., 1999; Weick, 1979).
Perception of the variation in nature and strategic characteristics of network ties was initially
grounded in a dichotomous differentiation between the nature of weak and strong network ties
(Granovetter, 1973, 1982). Strong network ties, characterized as having high levels of social
relationship or personal interaction, demonstrate high frequency, reciprocity, and affect/philos
(Granovetter, 1982; Krackhardt, 1992). As a result, these strong ties carry greater motivation to
6
be of assistance and to be more easily available, as well as greater likelihood to be useful in
terms of protection and reduction of uncertainty for actors in insecure positions—a valuable asset
for an emerging firm (Hite & Hesterly, 2001). In contrast, weak ties, which are not as heavily
based on the social relationship or personal interaction between actors, entail lower frequency,
reciprocity, and affect/philos; yet they may provide strategic advantages in terms of resource
availability beyond the firm’s egocentric network (Granovetter, 1973, 1982; Gregersen & Black,
1992; Hite & Hesterly, 2001). Network ties were characterized at these extremes and labeled,
for example, as “friends, acquaintances, strangers” (Aldrich, Elam, & Reese, 1996; Staber,
1994)—reflecting strong, weak and market ties. Thus strong ties (or “friends”) have generally
been represented as a homogeneous set of ties. However, most strong network ties, like most
groups of friends, are of sufficient variation to be more precisely classified and differentiated by
the specific characteristics, or combination of characteristics, of their social relationships.
The focus on affect and philos, characteristic of strong ties (Granovetter, 1985; Krackhardt,
1992), has validated concern with the strategic role of social relationships. Research describing
strong ties and embedded ties has identified several characteristics of these ties—in terms of both
attributes and outcomes (see Table 1). However, although these studies claim to examine strong
or embedded network ties, with the exception of Uzzi (1996), they do not specify whether the
population of ties were all relationally-embedded: defined as both having a social relationship
that influences economic decision making and being governed through trust and relational
contracting (Dyer & Singh, 1998; Granovetter, 1985; Uzzi, 1996). While the list in Table 1
represents an important mosaic of characteristics of strong and/or embedded ties, it does not
represent a theoretical classification of the variation within relationally-embedded ties.
-----------Insert Table 1 about here
-----------
7
Current literature approaches relational embeddedness with assumptions of homogeneity--that is,
while many characteristics have been identified (see Table 1), relational embeddedness is still
assumed to represent a single, dichotomous construct: e.g. ties are either relationally embedded
or not). The question is whether all the characteristics in Table 1 are present in all relationallyembedded network ties or whether these are characteristics that could be present in some
relationally-embedded ties. Without further classification, the homogeneity assumption leads to
the conclusion that relationally-embedded ties are all alike--each composed of the characteristics
in Table 1. Yet, for example, addressing Granovetter’s (1985) strong tie characteristics of
frequency and affect, Alba (1982) suggests that high interaction frequency and high affect do not
necessarily reside within the same relationally embedded tie, in contrast to Homan’s (1950)
statement “that persons who interact frequently with one another tend to like one another” (p.
111).
For example, “some relations involving intense affect may be visible only in very
infrequent interaction, as between a parent and his or her adult children” (Alba, 1982, p. 46).
Thus the suggestion that all relationally-embedded ties have all the characteristics found in
previous embeddedness research may not accurately portray the complexity and range of
variation that may actually exist within these ties.
In contrast to prior assumptions of homogeneity, current understanding of the nature of
relationally-embedded network ties suggests greater variation and heterogeneity than previous
research has addressed. First, given the idiosyncratic nature of social relationships (Dyer &
Singh, 1998), the network ties embedded within those social relationships are likely also to be
idiosyncratic and heterogeneous. Second, given that relationally-embedded ties provide a variety
of both advantages and disadvantages to an emerging firm (e.g. Granovetter, 1985; Portes &
Sensenbrenner, 1993; Reese & Aldrich, 1995; Uzzi, 1997; Van de Ven, 1993), critical variation
in social relationships may exist between these ties and may influence outcomes.
Theory
8
development on relational embeddedness needs to address why some relationally-embedded ties
provide advantages while other ties generate disadvantages. Third, given that network ties are
governed through mechanisms of trust (Bradach & Eccles, 1991; Powell, 1990) and that trust
research is identifying variation in types of trust (e.g. Good, 1988; Jones & George, 1998; Zaheer
& Venkataraman, 1995), the question arises as to which types or combinations of trust provide
effective governance for relationally-embedded ties. One might ask to what extent the variation
in governance mechanisms of trust is related to variation and heterogeneity within relationallyembedded ties. Thus assuming greater heterogeneity and variation within relationally-embedded
ties may help to capture the idiosyncrasies of social relationships, explain differential outcomes
in terms of advantages and disadvantages, and provide critical insights into appropriate
governance mechanisms.
While relationally-embedded ties are not all alike, they are also not all unique (McKelvey &
Aldrich, 1983). Therefore, to classify relational embeddedness as a theoretical construct is a
critical step in theoretical development (Chafetz, 1978).
Without such classification a
satisfactory understanding of network relations and their roles in strategic organizing may not be
attained (McKelvey & Aldrich, 1983; Ulrich & McKelvey, 1990). Lack of attention to the
potential variation within the construct of relational embeddedness, as either a dependent or
independent variable, may inhibit explanations of its causes, influences and strategic outcomes.
Advancing the classification of relational embeddedness will aid the identification and
description of variations that can create deeper understanding, build foundations for theory
development, and provide a base for creating instruments and validating constructs for different
types of embeddedness (McKelvey & Aldrich, 1983).
9
As the strategic context of firm emergence is critical and new firms rely so heavily upon external
networks for resource acquisition, this research examines the variation of relational
embeddedness within this specific context. The overarching problem is that if emerging firms
rely on relationally-embedded ties for critical resource acquisition and assume that these ties are
all strategically similar, and yet the ties are heterogeneous along critical social dimensions, the
emerging firm may encounter difficulties in both governance and resource acquisition that may
inhibit its successful emergence and performance.
Strategies for resource acquisition,
relationship maintenance, and firm governance need to align with the variation within these ties.
For example, if relationally-embedded ties differ, to what extent can they still be governed by the
same mechanisms of trust? Ungrounded assumptions of homogeneity leave the firm strategically
at risk for increased constraints and disadvantages, as well as less able to participate in the
advantages and benefits of exchange with relationally-embedded ties.
Assuming heterogeneity among relationally-embedded ties, this study focuses on classifying
how relationally-embedded ties may be similar to or different from each other. In light of recent
calls for research on qualities of embeddedness, the role of social relationships in economic
exchange, network governance and the relational view of the firm (e.g. Dyer & Singh, 1999;
Madhok, 1997; Rowley et al., 1999; Uzzi, 1996), this study examines relationally-embedded
network ties of emerging entrepreneurial firms with three research questions:
1. What are the components of the social relationships of relationally-embedded ties?
2. How can relationally-embedded network ties be classified to identify different types
of embeddedness based on variations in the social relationships?
3. What strategic implications can be drawn from multidimensional view of relational
embeddedness?
10
These research questions reflect the call to further clarify the qualities of relationalembeddedness and continue the agenda of further unpacking the concept of embeddedness (Uzzi,
1996). The following describes the methods used to examine variation among relationallyembedded ties.
Methods
This study addresses the variation of relational embeddedness using a post-positivist paradigm, a
grounded theory approach, and case study methods (e.g. Eisenhardt, 1989; Glaser & Strauss,
1967; Guba & Lincoln, 1994; Miles & Huberman, 1994; Strauss & Corbin, 1994; Yin, 1994a).
Following King, Keohane and Verba’s (1994) suggestion that it is “pointless to seek to explain
what we have not described with a reasonable degree of precision” (p. 44), the underlying aim of
this study has been to ground theoretical explanations upon thick descriptions of relational
embeddedness (Schein, 1987). In an effort to identify the convergence of common themes and
patterns across the cases (Huberman & Miles, 1994; Yin, 1994a), the data and the developing
theory have been iteratively revisited in a research design that is “spiraling rather than linear in
its progression” (Berg, 1995, p. 16).
Case Study Design
Case study methods provide a relevant approach for the study of the networks of emerging firms
(e.g. Curran et al., 1993; Eisenhardt, 1989; Steier & Greenwood, 1998). Case selection of
emerging firms was based on theoretical sampling (Erlandson, Harris, Skipper, & Allen, 1993;
Yin, 1994a) and specifically controlled for location and industry by selecting all eight cases from
the computer industry within the same county of a US western state. The choice of a high-tech
entrepreneurial context for this case study builds upon recent research on entrepreneurial
networks in high-technology industries (e.g. Hansen, 1995; Saxenian, 1990; Shan, Walker, &
Kogut, 1994; Shuman & Buono, 1992; Zhao & Aram, 1995).
11
In addition, emerging
entrepreneurial firms provide a rich context for the study, given their heavy reliance on network
ties that stem from and are embedded within social relationships (Larson & Starr, 1993). The
pecific location was selected as prime for the emergence of new entrepreneurial firms with high
potential for networking activity due to current employment upheaval in the computer industry
within this county (Saxenian, 1990). Recent downsizing and firm closures in the county had
increased unemployment in the local computer industry, increasing the likelihood of new firms
emerging as attempts to reestablish equilibrium in the local industry (Kirzner, 1973, 1997).
Another criterion for theoretical sampling was the number of the firm’s entrepreneurial founders,
given that the number of entrepreneurial partners differs across firms and influences firm
strategy (Chandler & Hanks, 1998). The identification of an emerging entrepreneurial firm was
based upon the working definition of an entrepreneur as the founder, owner, and manager of a
private firm between 18 and 24 months old. Thus the theoretical sampling design controlled for
industry, location and number of founders.
Publicly-available lists of new business licenses provided the pool of 18-24-month-old firms at
the time of data collection.3 Of these firms, the list identified 80 out of 982 (8%) as being within
the computer industry.
The researcher screened these 80 firms by telephone to gather
preliminary data regarding the industry, the number of founders, and the fit with eligibility and
exclusion criteria. The researcher classified firms based on the number of founders (range: 1-3)
and the firm’s eligibility within the definition of an emerging entrepreneurial firm. These
eligibility criteria included founder creation, majority ownership by founder, founder
management, age of firm as 18-24 months since business licensure, and classification of the firm
as a new business rather than a renamed previous business. Exclusion criteria eliminated firms
no longer in business or those with non-profit licensing, headquarters out of the county, or
12
disconnected phones. Based on the screening, the researcher created three lists of eligible firms
classified according to the number of founders (1, 2 or 3). Finally, the researcher recontacted the
firms on each list in alphabetical order to further inform them about the research, to obtain their
verbal agreement to participate in the study, and to arrange for the first interview appointment.
Initially, the first two firms on each list that were both willing to participate and accessible
during the data collection timeframe were selected for the study. This process provided 6 cases;
2 additional cases were later included in the process of reaching theoretical saturation. These 8
cases encompassed 17 individual entrepreneurial partners, with 2 firms having solo
entrepreneurs, 3 firms having two partners, and 3 firms having three partners. See Table 2 for
comparative information on the cases.
------------------------------------------Insert Table 2 about here
-------------------------------------------
Data Collection
The first phase of data collection entailed an open-ended interview with each of the 17
entrepreneurs across the 8 case study firms. During the interview, the researcher sought to
understand the firm’s history and to identify all of the direct dyadic network tie relationships that
the entrepreneur determined to be relevant to the firm’s success. The informants described their
network history as well as their experiences and exchanges with these network ties. Each
interview continued until the informant had completed the description of his or her network;
most lasted about two hours. Based on this initial interview and on concepts of graph theory, the
researcher created a network map for each firm’s network system to facilitate visualizing and
communicating about the firm’s network. The network map enabled the researcher to visualize
the potential influence of network-level structural embeddedness on relational embeddedness at
the dyadic level.
13
The second phase of data collection entailed a follow-up interview to further explore each
network, clarify ambiguous relationships, and conduct a member check (Miles & Huberman,
1994). The member check, a followup interview, allowed the informants the opportunity to
confirm the accuracy of the researcher’s rendition of the network map, along with a second
chance to clarify the network relationships. Brief descriptive quantitative data were collected
regarding characteristics of the network ties. In addition, both interviews and network data
yielded further descriptive quantitative data in the form of counts, percentages and categorical
distributions.
Data Analysis
The data analysis and generation of themes and patterns were iterative with the data collection
(Gough & Scott, 2000), and theoretical models were continually modified to incorporate new
data and new themes (Miles & Huberman, 1994). Data analysis included within-case, withingroup, across-case, and across-group pattern matching (Denzin & Lincoln, 1994; Miles &
Huberman, 1994). The use of Word, NVivo and MacFlow software programs facilitated the
computer analysis of textual, tabular, and network data (Fisher, 1997; "NVivo," 2000; Richards
& Richards, 1994).
Identification of relationally-embedded ties. During data collection, each of the 8 emerging
entrepreneurial firms represented a case. With data analysis, the level of analysis shifted to
examine each dyadic network tie as its own case, initially exploring over 300 ties. Ties were
identified as embedded or non-embedded, based on meeting at least one of the two outcome
criteria. The first embeddedness criterion, evidence of the influence of the social relationship
upon economic actions of the firm (Granovetter, 1992; Uzzi, 1996), was demonstrated as the
social relationship having influenced expectations, communication, decision making, and
14
provision of services before terms of exchange were clarified, particularly in regards to buying,
hiring, development, financial and other resource decisions.
The second criterion of
embeddedness, evidence of relational contracting as opposed to traditional market contracting
(Dyer & Singh, 1998; Williamson, 1985), was demonstrated by the absence of written contracts:
by reliance on verbal agreements, handshake agreements, and assumed agreements. If the
relationship did not demonstrate either of these embeddedness outcomes, the tie was identified as
non-embedded.
The entrepreneurs initially identified over 300 dyadic network ties; however, only 160 of those
ties generated sufficient information to support screening for characteristics of relational
embeddedness. The screening of these 160 ties, based on the two embeddedness criteria,
identified 66 relationally-embedded ties (41%) drawn from across all eight firm cases (see Table
3). Data analysis then focused on these relationally-embedded ties and their social relationships.
Identifying non-embedded ties provided a source of contrast enabling the researcher to iteratively
test the findings against non-embedded network ties. To this point in the analysis, however, the
dichotomy between embedded and non-embedded ties merely echoed previous research. The
question still remained as to how these relationally-embedded ties were similar to or different
from each other: that is, whether relational embeddedness represents a homogeneous construct
or whether important variations exist between these ties that should be considered when
relational embeddedness is used as research variable.
---------------------Insert Table 3 about here
----------------------
Textual analysis and coding. During data analysis, NVivo software was used to facilitate the
researcher’s coding of key classification themes and patterns found within the informants’
descriptions of their relationally-embedded ties (Gough & Scott, 2000; MacQueen, McLellan,
15
Kay, & Milstein, 1998). Coding is “a process of interpretation that…breaks the text down into
meaningful chunks or segments” (MacQueen et al., 1998, p. 33). The researcher’s coding
identified and labeled the informants’ descriptions of the social relationships based upon the
ideas, concepts, vocabulary and linguistic cues that emerged from the descriptions themselves
(Coffey & Atkinson, 1996; MacQueen et al., 1998). For example, the description “We get
together and talk for like an hour just to catch up on how his life is” (4-4:1959) was coded into
several categories:
Getting Together, Catching Up, Non-Work Communication, Knows
Personally, and Familiar with Tie’s Life. This inductive and emic coding method facilitated the
exploratory research design based upon grounded theory (Lincoln & Guba, 1985; Strauss &
Corbin, 1994). From this approach, categories or themes from previous research may provide a
“pre-understanding” (Gummesson, 1991) but are not directly imposed upon the initial analysis of
the data to avoid researcher bias. MacQueen et al (1998) suggest that bias may stem from
reliance on previous research, as substantial reference to professional jargon (i.e. etic codes)
encourages the inclusion of coders’ preconceptions in the data analysis, and also that use of etic
coding may generate difficulty in distinguishing the voice of the respondent from that of the
analyst.
Etic coding may make implicit assumptions that are not supported in the text.
Therefore, coding was focused on using the informants’ “own terms and semantics to guide the
construction of codes” (MacQueen et al., 1998, p. 33).
Hierarchical coding structure. NVivo facilitated the researcher’s emic coding of text into
emergent categories and themes based on its text management, marking, searching and
organization functions. Initially, over 200 separate descriptive categories emerged from the emic
coding process. The text and the category labels were continually re-examined for labeling,
content, clarity and potential overlap.
The categories were continually and iteratively
reorganized through combining and splitting, as necessary to create a set of non-redundant
16
characteristics. If a new description did not fit into an existing category, a new category was
created. After all of the texts had been coded twice, each category was examined for the overall
number of references, the number of references to different tie cases, and, most importantly, the
number of firms in which the description occurred. To be included as its own coding category, a
description needed to occur in at least 2 of the 8 firm cases and in at least 3 different tie cases.
These inclusion criteria controlled for potential linguistic patterns which would cause a
description to have a high number of references all provided by the same entrepreneur or all
about the same tie. Given that the research was exploring for variation, the initial analysis
included many very specific descriptions that did not necessarily meet these cross-case criteria.
These descriptions were eventually either dropped or, if appropriate, aggregated into one of the
emerging 35 descriptive elements (see Table 4).
---------------------Insert Table 4 about here
---------------------The 35 descriptive elements were aggregated to broader descriptive attributes, with the criterion
that the attribute be represented by at least 6 of the 8 firms: that is, the attribute needed to
capture the descriptions that were common across a majority of the firms. Throughout the
analysis, dynamic recoding and relabeling provided flexibility to the coding structure so it could
be adapted to either include or exclude descriptive references. This recoding is not seen as a step
backwards, but rather “is always indicative of forward movement in the analysis” (MacQueen et
al., 1998, p. 36). Thus meaningful categories emerged through an iterative, dynamic analysis
and through organization of the informants’ own textual descriptions.
During textual analysis, themes began to emerge that characterized various aspects of the
entrepreneurs’ relationally-embedded ties. To reduce data and to further explore the patterns and
themes (Gough & Scott, 2000; Miles & Huberman, 1994), the characteristics of the relationally-
17
embedded ties were iteratively organized into an hierarchical tree structure. This tree structure
was composed of specific characteristics, aggregated elements, broad attributes, and overarching
components of the social relationships (see Table 4 and Figure 1). This structure retains details
while also providing for a few more homogeneous categories that more easily support
generalizability (McKelvey & Aldrich, 1983).
For example, the first reduction using the
hierarchical tree structure organized the initial characteristics of the relationally-embedded ties
into 35 categories consisting of aggregated elements of the social relationships.
These 35
elements were then grouped under 14 superordinate broad attributes. Finally, the 14 attributes
were grouped under three overarching component categories: personal relationship, dyadic
economic interaction and social capital (see Table 4). The researcher further validated this
hierarchical coding structure and the assignment of text references to these codes through review
with and feedback from five independent, external research reviewers.
---------------------Insert Figure 1 about here
---------------------This hierarchical organization of the descriptions of relationally-embedded ties highlights the
potential range of social relationship characteristics of the ties in this case study. However, this
hierarchical tree does not, in itself, create a typology—rather it is useful in organizing a census of
characteristics. While each of these characteristics was found within at least one relationallyembedded tie, not all relationally-embedded ties had all of these characteristics.
Classification typology.
Grounded in the hierarchical organization and grounded theory
methods, a classification typology emerged that identified seven potential types of relational
embeddedness based on combinations of the three overarching social components. Grounded
theory methods (Strauss & Corbin, 1990) themselves are based on systematic analysis.
18
[These methods involve] the systematic comparison of small units of data (incidents) and
the gradual construction of a system of categories that describe the phenomena…. The
categories may have several subcategories…which are gradually elaborated and refined
as specific incidents are examined, systematically coded, and compared….The analysis
should eventually result in the identification of a small number of core categories which
serve to tightly integrate all the theoretical concepts into a coherent whole firmly rooted
(grounded) in the original evidence. (Langley, 1999, pp. 699-700)
While the coding was systematic, the typology emerged as a result of the researcher’s immersion
in the data and modeling of the data. While “no analysis strategy will produce theory without an
uncodifiable creative leap” (Langley, 1999, p. 691), the final classification typology of relational
embeddedness does serve to tightly integrate the descriptions of relational embeddedness into a
useful model. Typology models are an important form of “classification methods [that] identify
populations and arrange them in a classification framework” (McKelvey & Aldrich, 1983, p.
116). Each of the 160 relationally-embedded ties was re-evaluated against this classification
typology to ensure that each of the ties had a place within the classification system and to
“enable verification of the properties of the emerging category system” (Langley, 1999, p. 700).
The typology was checked against the previous literature on embeddedness to provide additional
validity. Each of the descriptions in Table 1 has a place within a component of the typology, at
the level of a characteristic, an element, or an attribute. The validity of the typology is increased
as knowledge of specific problems and contexts aligns with more abstract theoretical knowledge
found across other contexts (Gough & Scott, 2000; Robinson, 1993). While “not all researchers
will want to conduct…taxonomic studies before getting to the substance of the problem that
interests them” (McKelvey & Aldrich, 1983, p. 116), this classification work identifies the
potential variation and facilitates more accurate reflection on the complexity of relational
19
embeddedness. The next sections will first present the findings regarding the components of
relationally-embedded network ties and then present the typology of relational embeddedness.
Components of Embedded Network Ties
This section describes the findings in terms of the three components of the social relationships of
relationally-embedded ties, as identified in Table 4: personal relationship, dyadic economic
interaction, and social capital.
Each of the three components represents a label for the
categorization of several more specific subordinate attributes.
Personal Relationship
A personal relationship with the dyadic network tie was a pervasive thread that ran, predictably,
through the descriptions of relationally-embedded ties. Concrete personal relations constitute a
critical element of social relationships within embedded network ties (Coleman, 1988;
Granovetter, 1985; Krackhardt, 1992; Uzzi, 1996). While a personal relationship alone is often
considered to be the equivalent of a social relationship, the personal relationship discussed herein
represents just one of three components.
The informants’ descriptions of the personal
relationships with their embedded network ties demonstrated three main attributes—Personal
Knowledge, Affect, and Sociality (see Table 5).
---------------------Insert Table 5 about here
---------------------Personal knowledge. Personal knowledge was defined as the extent to which the dyadic partners
were aware of each other’s persona, needs, and interests: “They know my personality. They can
cut to the quick on me, and read me and I can read them” (6-4, 6-5: 3828).4 Personal knowledge
was based on knowing the tie personally, identifying with the dyadic partner, and having a sense
of similarity.
For example, informants indicated that they identified with their embedded
20
network ties--that is, they “had the same mentality” (5-16, 5-17:2004), “had common interests”
(8-5:1396), or were “in kind of the same boat” (7-4:1271).
Affect. Affect was represented in the extent to which feelings and emotions were considered an
integral part of the dyadic relationship (Krackhardt, 1992).
These feelings and emotions
included respect, loyalty to the tie, and caring that “definitely goes a lot deeper that just
business” (3-1:4501). Informants described their ties as being “like the son she never had” (31:3796) or indicated their “willingness to stick by them through thick and thin” (3:4530). This
affect was “genuine” (3-22:7391), as opposed to merely being “a lip service deal” (3:7382).
Sociality. Sociality, or the degree to which the dyadic economic interaction takes on a social and
personal nature, was demonstrated in knowing about the dyadic partner’s personal life and
family, as well as engaging in social activities together: “We get together and talk for like an
hour just to catch up on how his life is” (4-4:1959).
Genuine and sincere sociality was
considered to provide an important foundation for the personal relationship component.
Informants also discussed sociality as a potentially controversial attribute, noting that mixing
sociality and business can be detrimental. Considering sociality to be a leverage point, they
expressed the need to be especially careful in using sociality ethically with their embedded ties.
The three attributes of personal relationship--i.e. personal knowledge, affect and sociality--are
also reflected in previous research on personal ties (Burt, 1997), providing additional construct
validity to the face validity of these attributes. The presence or development of this personal
relationship can motivate entrepreneurs to carry the relationship into the context of business
exchange. Emerging entrepreneurial firms, in particular, use preexisting social relationships to
obtain necessary resources and to begin dyadic economic interaction (Larson, 1992; Larson &
21
Starr, 1993). For this study, the attributes of the dyadic economic interaction represented another
social component of relationally-embedded network ties.
Dyadic Economic Interaction
The economic interaction of the dyadic partners within a business relationship was the second
social component represented in the relationally-embedded ties. Dyadic economic interaction
was based upon the history of the exchange relations between two partners (Emerson, 1976;
Macaulay, 1963; Ring & Van de Ven, 1989). This social component focused on the processes of
exchange rather than on the specific content of the economic transactions or the contractual bases
for exchange. “The result of the various kinds of exchanges . . . [is] the formation of social
relationships having some persistence over time” (Coleman, 1990, p. 300). The entrepreneurs
described the interactions and exchanges with relationally-embedded network ties both in the
context of the history of their current emerging firm and in the context of the history of
interactions at previous firms. Four attributes of dyadic economic interaction emerged: extent,
effort, ease, and quality (see Table 6).
---------------------Insert Table 6 about here
---------------------Interaction extent. Interaction extent, the range, scope and comprehensiveness of the patterns of
exchange between dyadic partners, was composed in this study of the elements of frequency,
amount, intensity, reciprocal interdependence, multiplexity and duration. Relationally-embedded
network ties demonstrated higher levels of interaction in terms of these elements. For example,
Chad at DataTools described the multiplexity and reciprocal interdependence of an embedded
tie:
I’m selling my products through them. But I’m also doing work for them. So it
kind of goes both ways . . . . They are [also] a competitor . . . . In this whole
22
relationship, they are actually every single one of these that I can think of
[supplier, customer, vendor, broker, previous employer]. (3-2:1585, 5404)
Interaction effort. Interaction effort was defined in this study as the level of energy and
resource expenditure of one dyadic partner on behalf of the other dyadic partner, specifically that
which is beyond what is due, usual or expected: e.g., “I really went out of my way to help her”
(3-1:6206). This extra effort often resulted from the dyadic partner’s dedication to the history of
the economic relationship.
This dedication and extra effort represented asymmetrical
investments that maintained the dyadic economic interaction and functioned as the glue to bind
and motivate the continuing interaction.
The data suggest that the relationally-embedded
partners almost intentionally created this condition of perpetual asymmetry through interaction
effort. Problem solving, characterized by asymmetry of effort, often became interactive and
cyclical rather than simply a being one-time search for a solution.
For example, several
entrepreneurs reported providing extra effort on behalf of a tie and then later receiving extra
effort from that tie. The elements of interaction effort included work for the partner, education,
responsiveness, helpfulness, and problem solving.
Interaction ease. Interaction ease was defined as the facilitation and comfort of interaction
between dyadic partners and acted as a lubricant in the relationship. Five elements of ease that
emerged from the data were proximity, technological compatibility, goal congruence,
convenience and communication quality. These elements of ease increased the level of comfort
within the interaction by reducing stress, tension and difficulty, and by enhancing both extent
and effort of interaction. The ease of the dyadic economic interaction, built upon dyadic history
and familiarity, assured the continuation of a smooth interaction.
described this ease:
Kevin, at CustomSoft,
23
Once you develop a good relationship with a client, then it’s going to take a
tremendous amount of bad experiences for them to turn away from you. Once they
become familiar and comfortable, then that’s a part of their business they no longer
have to worry about. It’s like a channel. Once they get down in that, then actually
getting up and out and going to find somebody else is a huge amount of work and a
lot of risk. And so once you get that established, then you’re home free with them.
(5:3404)
Interaction quality.
Interaction quality was defined as the degree of excellence, merit or
superiority of the dyadic economic interaction. The entrepreneur continually evaluates and
compares the interaction with other network ties in terms of extent, effort, and ease. The
elements of interaction quality in this study were having knowledge of business needs, being a
known entity, understanding one another, working well together, experiencing satisfaction,
having loyalty to the interaction and anticipating future interaction and synergy. High interaction
quality was subjectively described as having “that magic” (4-21:4381). In several cases, external
ties displayed such high degrees of interaction quality that the network partner was eventually
hired or integrated into the firm.
Dyadic economic interaction clearly matters, given that
commitment and coordinated adaptation flourished under high interaction quality (Jones,
Hesterly, & Borgatti, 1997). High interaction quality generally influenced the desire to continue
the relationship. But even with poor interaction quality, a dyadic economic interaction might
still be constrained to continue under conditions of high interaction extent (e.g. concentrated
exchange, reciprocal interdependence), high interaction effort (asymmetry of effort creating
obligations), or high interaction ease (e.g. value of the ease outweighing the costs of poor
quality).
24
Social Capital
A third component of the social relationships of relationally-embedded ties in this study was
social capital, as manifested in the four attributes of obligations, resource accessibility,
brokering, and structural embeddedness (see Table 7).
These four attributes represented both
the dyadic and network levels of social capital.
Dyadic level: Obligations and resource accessibility. Tthe first two attributes of social capital
at the dyadic level were obligations and resource accessibility (Coleman, 1988). At this dyadic
level, social capital resides within the relationship between the dyadic partners (Coleman, 1990)
and “inheres in the structure of relations between actors . . . [and] constitutes a particular kind of
resource available to an actor . . . [making] possible the achievement of certain ends that in its
absence would not be possible” (Coleman, 1988, p. 98). The first dyadic attribute, obligations,
was defined as the extent of social indebtedness which binds or constrains the course of
interaction between dyadic partners. This attribute was manifested in three elements: asymmetry
(including gift giving), expectations and norms--“I killed myself after hours trying to get as
much as I could done [for him]. And that bought me a lot of points” (5-8:1168). The second
dyadic attribute, resource accessibility, was defined as the extent to which dyadic partners could
acquire available resources or credit from each other (Bourdieu, 1986; Emerson, 1976; Nahapiet
& Ghoshal, 1998)--“They could call [us] at any time if they had any problems” (3-8:883).
---------------------Insert Table 7 about here
---------------------Network level: Brokering and structural embeddedness. In addition, two attributes of social
capital touched on the broader network level of analysis: brokering and structural embeddedness
(Burt, 1998; Burt, 2000, 2002; Granovetter, 1985, 1992; Uzzi, 1996, 1997).
While often
25
considered as contrasting perspectives of social capital (e.g. compare Burt (1992) and Coleman
(1990)), both mechanisms contributed to the social capital of these relationally-embedded ties
(Burt, 2000, 2002). Brokering was defined as the extent to which Partner A acts to connect
Partner B to additional parties, creating a common tie: for example, “We stay with Steve [when
he moves to a new bank] because nobody knows us at the [new] bank. But then Steve can help
us at the next bank . . . . He bridges relationships and things with the other people we don’t even
know” (6-7:1107, 1637). Structural embeddedness was defined as the extent to which dyadic
partners have common ties that provide information flow and create greater redundancy within
the network (Feld, 1997; Granovetter, 1985):
We all worked together at Frameworks and now everyone is spread out all over….
So we have a personal relationship with these folks that allows us to kind of seed
around in other places…. [Also] Frameworks has developed a whole channel of
vendors that work for them….I know the people in that channel. So they become
my channel…. Now I just go directly to them. (3-2:6403, 1573, 1582, 6388)
While this study focused mainly on the dyadic relationship, the attributes of social capital at the
network levels—brokering and structural embeddedness—reinforced the social capital attributes
at the dyadic level--obligations and resource access.
In summary, the relationally-embedded network ties of the emerging firms demonstrated three
main components with their social relationships:
personal relationship, dyadic economic
interaction and social capital. Each of these components was an umbrella concept encompassing
more specific attributes (see Table 4).
However, each relationally-embedded tie did not
necessarily display all three social components equally.
Further analysis of each tie case
suggested that different combinations of social combinations may create different types of
relational embeddedness.
26
Types of Embeddedness
The different combinations of the three social components suggested a potential classification
typology of seven types or patterns of embeddedness that may explain this evident variety (see
Figure 2).
To further refine and validate the typology as descriptive of this data, each
relationally-embedded tie was reanalyzed and classified in terms of this theoretical typology.
Each relationally-embedded tie was coded by the degree (high, medium or low) that each social
component was demonstrated within the informant’s description. In this process, only ties with
social characteristics that were very clearly evident were classified as having that characteristic.
If the characteristic was not consistent or was not clearly present within the informant’s
descriptions of the tie, the tie was not categorized as having a high degree of that characteristic.
Ties were then classified into the typology based upon the patterns of their high-degree social
components. For example, one tie might have high degrees of both personal relationship and
dyadic economic interaction, while another tie might have high degrees of social capital without
high degrees of personal relationship or dyadic economic interaction.
These two social
relationships might both have developed relational embeddedness in terms of the influence of the
social relationship on the firm’s economic actions or the evidence of relational contracting; yet
these network ties may actually have different strengths and vulnerabilities in terms of benefits,
costs and governance controls under relational contracting. For each of the seven types of
embedded network ties indicated in Figure 2, Table 8 indicates social components of the ties, the
percentage of ties found, and a brief example from the data.
------------------------------------------Insert Figure 2 about here
------------------------------------------------------------------------------------Insert Table 8 about here
------------------------------------------In the typology, when a tie demonstrated a high degree of only one of the three social
components, the tie was classified as unidimensionally embedded. When two of the three social
27
components were clearly demonstrated, the tie was classified as bidimensionally embedded.
Only when high levels of all three social components were demonstrated by the embedded
relationship was the tie considered to be fully embedded. Each classification category within the
typology is represented by at least one tie, and the typology encompasses all of the 66
relationally-embedded ties in the data. Embedded network ties were represented well by both
fully-embedded ties (42%) and bidimensionally-embedded ties (46%), while much lower
representation was found for unidimensionally-embedded ties(12%).
This typology provides an initial framework for describing and classifying the variety of
relationally-embedded ties and allows one to address the question of what kind of social
relationship, and thus embeddedness, exists within a specific relationally-embedded network tie.
While this model cannot be generalized to other contexts, it has validity for accurately
classifying these data.
The following sections will further discuss each of these types of
embeddedness in more detail.
Unidimensional Embeddedness
A few of the embedded network ties (12%) in the data demonstrated high degrees of only one
social component and were thus classified as unidimensionally embedded. Within this typology,
unidimensionally-embedded ties correspond with each social component and have been labeled
as personal, competent and hollow embeddedness.
Personal embeddedness. Personal embeddedness was built solely upon the personal knowledge,
affect, or sociality based on personal relationship.
These relationships are likely to have
developed high levels of personal goodwill trust (Barney & Hansen, 1994; Ring & Van de Ven,
1989); however, embedded ties with only a personal relationship may not necessarily have the
28
bases for high levels of personal competency or social trust (Burt & Knez, 1996; Larson, 1992;
Ring & Van de Ven, 1989). Personal embeddedness may be represented by the common
situation of bringing a friend into the business without direct knowledge of his or her
competency. In such a case, maintaining the personal relationship becomes more salient than the
economic exchange, and the entrepreneur may make economic decisions that are both inefficient
and ineffective. If the tie proves to be incompetent, the entrepreneur may nevertheless be
constrained to keep the tie in the business network and, therefore, may experience disadvantages
(Coleman, 1988; Dubini & Aldrich, 1991; Granovetter, 1985; Portes & Sensenbrenner, 1993).
The disadvantages, or dark side, of embeddedness can include issues of decision constraint,
inefficiency, exchange asymmetry or political hostage-taking such that the entrepreneur loses
critical strategic autonomy.
Competency embeddedness. Competency embeddedness was built upon a history of dyadic
interaction. Under competency embeddedness, a high degree of interaction extent and quality
exist, the tie provides business value, and the interaction is comfortable and familiar with
routines having stabilized.
As a result, the entrepreneur is loyal to the dyadic economic
interaction over time. Previous experience with the tie has proven the competency of the dyadic
partner.
Yet there are dangers in assuming that ties with competency embeddedness can
effectively sustain relational contracting.
For example, without high levels of personal
relationship the goodwill and moral controls of personal trust may not be available.
Competency embeddedness also lacks social capital and the resulting social trust. In addition,
competency embeddedness is based upon the history and quality of the interaction as perceived
by the dyadic partners. If this perception changes, the basis for this type of relational
embeddedness will be lost.
29
Hollow embeddedness. Hollow ties were built upon social capital alone. They lack high levels
of both personal relationship and previous dyadic interaction. The dyadic relationship is based
upon a common third party recommendation. Since this type of network tie has yet to offer
perceived business value and is not built upon a personal relationship, the embedded tie is
considered to be hollow. Yet even these hollow ties are embedded. This type of dyadic partner
can influence the economic actions of the entrepreneur due to third-party obligations or social
capital, possibly causing the entrepreneur to remain in the relationship even when he or she
prefers not to and when remaining is not the most economically efficient decision.
Although the social relationship of unidimensionally-embedded ties is built upon only one social
component, these relationships have the potential to influence the economic actions of the firm
and thus reflect embeddedness (Uzzi, 1996). The potential challenge with unidimensional
embeddedness is that it may not support the development of sufficient trust to sustain effective
relational contracting.
Thus the entrepreneur must identify and acknowledge these
unidimensionally-embedded ties to avoid assuming more relational embeddedness than may
actually exist. The low number of ties in this category of unidimensional embeddedness may
suggest that relationally-embedded network ties tend to develop additional social components.
Such a trend would support a more evolutionary perspective on embeddedness. Thus while
unidimensionally-embedded ties do demonstrate embedded outcomes, they may be neither as
stable nor as effective as more developed relationally-embedded ties.
Bidimensional Embeddedness
Bidimensionally embedded network ties (46%) exhibited high degrees of two social components.
As illustrated in Figure 2, there were three types of bidimensional embeddedness: functional,
isolated and latent.
30
Functional embeddedness. Functional embeddedness, present in 11% of the embedded network
ties across five cases, was built upon dyadic economic interaction and social capital. While these
ties demonstrated high degrees of loyalty to the interaction and to their common ties, the
relationship was not based upon high levels of personal relationship. Yet they functioned very
well as embedded business ties. Functionally-embedded ties assumed higher levels of trust and
demonstrated fewer governance problems than did the unidimensionally embedded ties.
Isolated embeddedness. Isolated embeddedness had high degrees of both personal goodwill and
personal competency trust. While present in only 5% of the ties, isolated embeddedness was
discussed in all 8 cases based on the informants’ past experiences. Isolated embeddedness
represents high levels of loyalty both to the tie and to the interaction. Isolated ties are, however,
not well connected to the rest of the dyadic partner’s network. Thus the dyad exists in a state of
relative isolation from other network ties. The low frequency of isolated embeddedness of ties is
actually not surprising considering isolated dyads with strong ties tend to gravitate toward
greater connectedness with the larger network, given Granovetter’s (1973) concept of the
forbidden triad: that is, strong dyads will eventually create links to the other strong dyads in the
network, thus creating triads.
Latent embeddedness.
Latent embeddedness, the most common form of bidimensionally
embedded ties (30%), was found across 7 cases. Latent embeddedness means that although the
network tie may be perceived to be in the business network, the relationship is actually
characterized by very low levels of dyadic economic interaction. Latent embedded ties had the
highest number of family members when compared to other types of embedded network ties.
This finding reflects a common perception that entrepreneurs use family and friends in the
31
business network. Yet while the entrepreneur may be willing to work with the network tie, either
as a friend or as a favor, the competency and interaction quality of the tie were yet unproven or
were not providing the high dyadic interaction quality of other ties.
Full Embeddedness
In contrast to unidimensionally- or bidimensionally-embedded ties, fully embedded ties
demonstrated high degrees of all three social components (42%).
Thus the more social
components that exist within the dyadic relationship, the more the network tie is embedded
within the social relationship. Many of these fully-embedded ties had been pre-existing network
ties.
Trust Outcomes: Beyond the Typology
Although the typology focuses on the components of the social relationships, patterns of trust
outcomes also emerged. Trust outcomes were not surprising, since an inclusion criterion was
relational contracting. However, the relationally-embedded ties demonstrated three different
types of trust: good-will trust, personal competency trust, and social trust. These categories of
trust are echoed in the trust literature: personal goodwill trust is a direct, personal knowledge of
and trust of each other’s good will (Hesterly, Jones, & Madhok, 1998; Larson, 1992); personal
competency trust is a direct, personal knowledge of and trust of each other’s competency
(Hesterly et al., 1998; Larson, 1992; Zaheer & Venkataraman, 1995); and
social trust is
grounded upon a common third party or larger sociological identity (Portes & Sensenbrenner,
1993; Zucker, 1986).
This variation in trust outcomes further supports the heterogeneity of
relationally-embedded ties in that different types of ties generated different types of trust. In the
reanalysis of the ties, three patterns emerged suggesting that (1) personal relationships may
32
influence personal good-will trust, (2) dyadic economic interaction may influence personal
competency trust, and (3) social capital may influence social trust.
Discussion
Relationally-embedded network ties represent a crucial and common component of the external
network of an emerging firm (Hite & Hesterly, 2001; Johannisson & Monsted, 1998). This study
illuminates the complexity of these social relationships and suggests that these ties include more
variety than previous research has detailed. The data suggest that the source of this variety is
found in the social components of the network relationships (see Table 4), and each of the seven
types of relational embeddedness is revealed through critical compositional differences as
represented in the typology (see Figure 2). The typology lays the groundwork for this expanded
view of the qualities of relational embeddedness and provides a classification system for its
multidimensionality, recognizing variation in both type and intensity.
While previous literature has identified several characteristics of embeddedness (see Table 1),
these characteristics are easily encompassed within the typology model at the level of either an
element or an attribute (see Table 4). Specifically, the three social components of the typology
encompass Granovetter’s (1985) three attributes of strong ties:
(1) personal relationship
incorporates affect; (2) dyadic economic interaction, specifically interaction extent, incorporates
frequency; and (3) social capital at the individual level incorporates reciprocity. However, the
typology of relational embeddedness provides more depth and includes additional characteristics
not indicated by Granovetter (1985), Uzzi (1996), or other research. For example, dyadic
economic interaction broadens beyond extent to the ease, effort and quality of the interaction.
Thus this typology of relational embeddedness supports previous research on strong ties, while
adding greater depth and breadth to the social dimensions of relational embeddedness. This
33
typology argues for relational embeddedness as a broader construct than strong ties, given that a
tie could be relationally-embedded but not necessarily strong. Contrary to the assumptions of
previous research, this data suggest that relationally-embedded network ties may not be assumed
to be similar, given the variety of social characteristics in which the tie may be embedded. An
assumption
of
heterogeneity
suggests
that
relational
embeddedness
represents
a
multidimensional construct.
Theoretical Implications
The main theoretical implication of this research is that in emerging firms relational
embeddedness is a multidimensional construct in which the variation may now be more clearly
specified. While the classification of the variation within the theoretical construct of relational
embeddedness is a critical step in theoretical development (Chafetz, 1978),
the typology
presented can and should be subjected to further empirical testing (Doty & Glick, 1994;
McKelvey & Aldrich, 1983). A classification typology of relational embeddedness, absent in
existing models, facilitates the identification and description of variation within this strategically
critical construct (McKelvey & Aldrich, 1983).
Variation within relational embeddedness is a function of both the type and intensity of
embeddedness. That seven types of relational embeddedness emerge in the typology suggests
that relational embeddedness is not a dichotomous variable, but that different combinations of
social components contribute to its multidimensionality.
The typology also addresses the
potential intensity or magnitude of embeddedness, given the possibility of a different number of
social components within each tie. While some ties demonstrate high levels of only one social
component, other ties may demonstrate high degrees of two or even all three social components.
Fully-embedded ties, demonstrating all three components, represent the greatest intensity of
embeddedness. The greater the embeddedness intensity, the greater the reliance may be upon a
34
balance of social components and a broader range of trust. Given access to more types of trust in
the network relationship, embeddedness intensity is likely related to more effective relational
governance.
This research supports the need to consider more variation when using relational embeddedness
as a theoretical construct. The typology lays the foundation for greater specificity in building
theoretical models regarding the strategic outcomes and implications of relational embeddedness.
One critical challenge in clarifying the construct of relational embeddedness, as seen in the
previous work on embeddedness, is the need to clearly distinguish between its descriptive
characteristics and its outcomes.
This typology represents a descriptive classification of
characteristics of relational-embeddedness and provides the basis for clearer identification of
relational embeddedness as an independent variable.
Considering different types of
embeddedness facilitates the examination of relational embeddedness as a complex categorical
variable, while examining varying embeddedness intensity reveals that relational embeddedness
can also be explored as a continuous variable. The typology, therefore, enables the development
of instrumentation for greater specificity in describing relational embeddedness. As a result,
future research may find better explanations for variation in the strategic outcomes of relational
embeddedness.
Another theoretical implication is that the typology lays a foundation for understanding potential
advantages and disadvantages of relational embeddedness (e.g. Dubini & Aldrich, 1991;
Granovetter, 1973; Hite & Hesterly, 2001; Portes & Sensenbrenner, 1993). The seven types of
relational embeddedness may have varying advantages and disadvantages, depending on their
specific composition of social components and on the variation in both type and intensity of
relational embeddedness. For example, ties with greater intensity of relational embeddedness
35
(e.g. fully embedded) may provide more of the benefits generally attributed to embeddedness,
such as resource acquisition, while ties with less intensity of relational embeddedness (e.g.
unidimensionally- or bidimensionally-embedded) may experience more of the disadvantages,
such as increased exposure to potential governance hazards. Thus this typology provides a
rationale for understanding how different relationally-embedded network ties may provide
differential advantages and costs as well as opportunities and constraints for the emerging firm.
A third theoretical implication is that full embeddedness is different from Uzzi’s (1997) concept
of overembeddedness in which the high extent of social relationship is harmful to the economic
exchange. Full embeddedness in this typology is identified when the social relationship is a
balance of all three social components, likely resulting in a broader spectrum of trust and other
control mechanisms. Overembeddedness generally refers to a high proportion of embedded ties
at a more aggregated egocentric network level of analysis.
Overembeddedness may not
necessarily derive from simply having too many ties embedded within social relationships as
much as it may result from the over-reliance of these ties on any one social component alone. As
such, overembeddedness may result from an imbalance among the three social components such
that the network tie remains unchecked by the potential governance controls found within a
greater balance of social components.
Strategic Implications
The variation among relationally-embedded network ties may have critical strategic implications
for emerging firms, specifically in terms of issues of governance and resource acquisition. As
emerging firms are able to better recognize specific types and intensity of embeddedness, they
may be more able to maximize the value in these strategic external network relationships
(Madhok, 1997).
36
The typology suggests several potential influences of multidimensional
relational embeddedness on strategic organization and outcomes for emerging firms.
Governance, trust and relational embeddedness.
The typology of seven different types of
relational embeddedness enables further clarification of the connection between the social
relationship and the resulting trust within the embedded network tie. The strategic implication is
that different combinations of trust may result from the different types of embedded ties. Given
that trust supports critical governance mechanisms for embeddedness (Granovetter, 1985; Jones
et al., 1997; Powell & Smith-Doerr, 1994; Uzzi, 1996), these different combinations of trust may
influence the effective governance of relationally-embedded ties (Dyer & Singh, 1998; Zaheer &
Venkataraman, 1995). Fully-embedded network ties, for example, may more effectively sustain
relational contracting based on more types of trust and a greater redundancy of governance
controls (Jones et al., 1997; Rowley et al., 1999). On the other hand, a mismatch between
governance controls and type of embeddedness may make the emerging firm more vulnerable.
Thus future research should examine the extent to which governance mode may be most
effectively chosen through considering the characteristics of the dyadic relationship as well as
the characteristics of the transaction (Williamson, 1985). Specifying different types of relational
embeddedness challenges the notion that a single governance mode of relational contracting,
based upon generic or unspecified types of trust, can provide equally effective governance for all
types of relationally-embedded ties. Rather, the multidimensionality of relational embeddedness
may affect significantly the stability and effectiveness of the governance of these ties,
particularly in emerging firms that may too easily rely on relational contracting alone (Larson,
1992).
Strategically, fully-embedded ties built upon all three social components would be
expected to demonstrate more types of trust and, therefore, be more effectively governed through
37
relational governance than a uni-dimensionally embedded tie based on only one social
component.
Resource acquisition and relational embeddedness.
Another strategic implication of the
multidimensionality of relational embeddedness is that emerging firms rely on relationallyembedded ties for critical resource acquisition.
While relationally-embedded network ties
generally provide greater resource access to emerging entrepreneurial firms (Hite & Hesterly,
2001; Jarillo, 1989), this resource access may be tempered by the effectiveness of the
governance mechanisms (Powell & Smith-Doerr, 1994). The more effective the governance
mechanisms, the more likely that resource exchange will continue to occur through a particular
relationship over time (Poppo & Zenger, 2000). Given that fully-embedded ties demonstrated
three types of trust, providing more overlapping governance safeguards than other types of
relational embeddedness, these ties may have better access to the resources of their network
partners.
Practical Implications
The patterns of the multidimensionality of relational embeddedness suggest that emerging firms
need to carefully and effectively manage their external network relationships in five specific
ways. First, emerging firms need to carefully examine their network ties to identify different
types and intensities of relationally-embedded ties rather than making ungrounded assumptions
that these ties are all strategically similar. Second, emerging firms may be able to adapt the
relational embeddedness of network ties through the development or reduction of social
components over time. Third, emerging firms may need to strategically invest in their network
ties, considering that inefficiencies may stem from spending efforts appropriate to fullyembedded tie on non-relationally-embedded ties (Aldrich, 1989).
Fourth, based on the
38
realization that not all relationally-embedded ties are alike, the emerging firm may be better able
to build in—at an earlier point—necessary additional mechanisms to ensure effective governance
for these ties. Lastly, as emerging firms realize that these relationally-embedded ties may require
different strategies for relationship maintenance, resource acquisition, and governance, they may
be better able to access strategically-critical resources through these ties in a way that will
enhance advantages and alleviate potential disadvantages. These network management strategies
may enable emerging entrepreneurial firms to better recognize, analyze and manage the
relational embeddedness of their network ties.
Future Research
While the grounded theory approach and the case study design limit the generalization of these
findings to these specific cases and, based upon analytical generalization, to the development of
theoretical models (Gummesson, 1991; King et al., 1994; Yin, 1994b), this study provides a
classification framework that should be tested across other contexts. The current typology
represents unjustified variation in which “truth has not yet been established, but one for which
truth is not precluded. Justification comes after a belief has been generated and tested" (Weick,
1979, p. 123).
Thus future research should produce replications across broader geographical,
industrial, and organizational populations to further confirm and refine the classification model
(McKelvey & Aldrich, 1983). As the mosaic of context studies grows regarding relational
embeddedness, and as the theoretical knowledge of its specific constructs aligns with knowledge
found across other contexts, the generalizability of the findings increases (Gough & Scott, 2000;
McKelvey & Aldrich, 1983; Robinson, 1993).
In addition to testing this typology, future
research should pursue four additional streams for future inquiry on relational embeddedness.
The first stream for future research is to use the typology to develop instruments to better support
the identification and measurement of different types and intensity of relational embeddedness
39
across other contexts. These development efforts will contribute to the construct validity of
different types and intensities of embeddedness and, as a result, the multidimensionality within
relational embeddedness can be more accurately taken into account when this construct is used
as either a dependent or independent variable in future research.
Second, future research should incorporate the dyadic partner’s perspective on the relationallyembedded tie to add depth to the typology and possibly explain even more variation within
relationally-embedded ties. Assuming that the typology classification holds for the partner’s
perspective, the combination of the two perspectives could theoretically create up to 42 possible
combinations or types of relationally-embedded ties. For example, Partner A may classify a
dyadic relationship with Partner B as a latent tie, while Partner B classifies the relationship as
functionally embedded. While the number of actually-occurring combinations is likely much
less, the question is to what extent Partner B’s perspective of the social relationship affects the
type and intensity of relational embeddedness experienced by Partner A.
The inclusion of the
partner’s perspective may further characterize the relationship as well as further increase the
potential variation within relational embeddedness.
Third, future research should examine the strategic implications of variation in relational
embeddedness. Specifically, research should explore the relationship between both the types and
intensity of relational embeddedness and various outcomes of trust, governance, resource
acquisition, and successful firm emergence. A further need is to identify effective governance
mechanisms for different types of relational embeddedness and to determine what, if any,
additional forms of governance are necessary beyond trust to provide for effective governance
for each type.
40
Fourth, future research should examine how relational embeddedness develops over time. Given
variation in type and intensity, to what extent and in what ways do different types of relationallyembedded ties adapt or change? The number of ties in each category suggests an underlying
evolutionary process in that very few ties were embedded based upon only one social component
(unidimensionally embedded). Rather, this type of tie tended to be less stable and to move
toward the development of a second social component, raising the question of what processes
and paths are involved in the evolution of relational embeddedness. In addition, a few of the ties
lost social components and actually reduced their relational embeddedness. This finding raises
the question that if relationally-embedded ties evolve, either towards more or less embeddedness,
then how do governance and resource-acquisition strategies need to be adapted? The typology
provides the groundwork for further exploring the evolution of relational embeddedness.
Conclusion
Relational embeddedness has extensive ramifications for the strategic organization of emerging
entrepreneurial firms. This study examined the multidimensional components of relationallyembedded network ties of emerging entrepreneurial firms in the computer industry, using a
qualitative case study method.
A typology is derived for classifying seven different types of
relational embeddedness along three degrees of intensity, suggesting that critical variation in the
type and intensity of embeddedness may be an important source of heterogeneity among
relationally-embedded network ties in this context. This study lays the foundation for construct
validity of different types of relational embeddedness. These findings address the call for a
clearer understanding of both the qualities of relational embeddedness (Coleman, 1988; Uzzi,
1996) and the multidimensional nature of these ties (Larson & Starr, 1993). This research has
further unpacked the concept of relational embeddedness to discover “components of social
organization” (Coleman, 1988, p. 101) that may contribute to the effective strategic organization
of emerging firms.
Table 1
Characteristics of Strong and/or Relationally-Embedded Ties
Affect/Philos/Passions
(Granovetter, 1985; Krackhardt, 1992; Uzzi, 1999)
Frequency/Frequent contact
(de Burca, Brannick, Fynes, & Glynn, 2001; Granovetter, 1985)
Reciprocity
(Granovetter, 1985; Portes & Sensenbrenner, 1993; Powell, 1990; Uzzi,
1999)
Trust/Enforceable Trust
(Portes & Sensenbrenner, 1993; Powell, 1990; Uzzi, 1996)
Complementarity
(Powell, 1990)
Accommodation/Adaptation
(Powell, 1990)
Indebtedness/Imbalance
(Powell, 1990)
Collaboration
(Powell, 1990)
Transaction investments
(Powell, 1990)
Strong history
(Powell, 1990)
Fungible skills
(Powell, 1990)
Expectations
(Portes & Sensenbrenner, 1993)
Social capital
(Portes & Sensenbrenner, 1993)
Bounded solidarity
(Portes & Sensenbrenner, 1993)
Lower opportunistic behavior
(Provan, 1993)
Density
(Staber, 1994)
Maximize relationship over org
(Powell & Smith-Doerr, 1994)
Fine-grained information transfer
(Uzzi, 1996)
Problem Solving
(Uzzi, 1996)
Duration
(de Burca et al., 2001; Uzzi, 1999)
Multiplexity
(de Burca et al., 2001; Uzzi, 1999)
Diffusion
(MacLean, 2001)
Facilitation
(MacLean, 2001)
Personal involvement
(de Burca et al., 2001)
Low formality (few contracts)
(de Burca et al., 2001)
Connectedness
(de Burca et al., 2001)
42
Table 2
Comparative Case Data
# Partners
Partner
Relationships
Product
Gross Sales
1998 ($000)
Growth Goals
(estimated)
Corporate
Structure
Board
Capital
Structure
Ties:
# Embedded
# Discussed #
Total
Full v. Part
Time Firm
Office- v.
Home-based
Prev.
Experience
Data
Net
3
2 Spouses
1 Referred
Service:
Data Storage
& Retrieval
(Internet)
$225
Last
Word
3
Prev. Work
Associates
Software:
Software
Development
(application)
$123
Data
Tools
3
Prev Work
Associates
Service:
Custom
Programming
(application)
$4,000
Animators
2
Brothers
Custom
Soft
2
Spouses
Comm
Net
2
Brothers
Web
Design
1
--
Ram
Part
1
--
Service:
Custom
Programming
(data)
$200
Service:
Custom
Programming
(application)
$50
Software:
Software
Development
(Internet app)
$10
Service:
Custom
Programming
(Internet)
$9
Hardware:
Hardware
Retail Sales
Moderate
Low
High
Moderate
Decline
Moderate
Low
High
S-Corp
C-Corp
C-Corp
S-Corp
S-Corp
C-Corp
Sole Prop.
LLC
Partners
Partners
Partners
Partners
Partners
--
Partners
Self;
Credit cards
Self
Partners
/SrMgt
Self;
Considering
VC
Self
Self;
Home equity
Prev. Bus.;
Pursuing VC
Self
Self;
Supplier
Credit
3
9
36+
Full
6
9
37+
Full
15
39
95+
Full
7
30
39+
Full
8
21
42+
Part
7
14
30+
Full
7
14
25+
Part
13
24
35+
Full
Home
Office
Office
Office
Home
Office
Home
Home
High;
2nd ENT firm
in industry
Medium;
1st ENT firm;
Worked in
industry prev.
Medium;
1st ENT firm;
Worked in
industry prev.
Low;
1st firm in
industry
Medium;
1st ENT firm;
Worked in
industry prev.
High;
2nd firm in
industry
Low;
1st firm in
industry
Low;
1st firm in
industry
$450
43
Table 3
Number of Embedded and Non-Embedded Network Ties by Case
1-DataNet
3
33%
6
66%
Total
Number
of Ties
9
2-LastWord
6
66%
3
33%
9
3-DataTools
15
38%
24
62%
39
4-Animators
7
23%
23
77%
30
5-CustomSoft
8
38%
13
62%
21
6-CommNet
7
50%
7
50%
14
7-WebDesign
6
43%
8
57%
14
8-RamPart
14
58%
10
42%
24
TOTAL
66
41%
94
59%
160
Case
Embedded
Number
Ratio
Non-Embedded
Number
Ratio
44
Table 4
Components, Attributes and Elements of Social Relationships
Among Embedded Network Ties
SOCIAL COMPONENT
Personal Relationship
Dyadic Interaction
Social Capital
(network level)
Social Capital
(dyadic level)
ATTRIBUTES
Personal Knowledge
ELEMENTS
Identifies with
Knows personally
Affect
Respect
Loyalty to Tie
Caring
Sociality
Knowledge of tie’s life and family
Social activities
Extent
Frequency
Amount
Intensity
Reciprocal
Interdependence
Multiplexity
Duration
Effort
Working for Partner
Education
Responsiveness
Helpful
Problem Solving
Ease
Proximity
Technological Compatibility
Convenience
Goal Congruence
Communication Quality
Quality
Familiarity
Knowledge of Business Needs
Working Well Together
Satisfaction
Loyalty to Interaction
Brokering
Introductions to Third Party
Structural
Connectedness of Dyad’s Mutual
Embeddedness
Ties
Obligations
Asymmetry
Expectations
Norms
Resource Accessibility Ability to Access Resources
45
TABLE 5
Definitions and Examples of Personal Relationship Attributes
of Embedded Network Ties
PERSONAL KNOWLEDGE :
The extent to which the dyadic partners are aware of each other’s personal needs and interests:
e.g., “They know my personality. They can cut to the quick on me and read me and I can read them” (6-4,
6-5: 3828).
Identifies
The degree to which dyadic partners have a sense of similarity; e.g., homophily,
with
similar backgrounds and experiences
Knows
The degree to which dyadic partners are aware of and familiar with each other
personally
AFFECT:
The extent to which emotion and feeling are integral parts of both business and non-business interactions:
e.g., “definitely goes a lot deeper that just business” (3-1:4501).
Respect
The degree to which dyadic partners esteem and appreciate one another
Loyalty to
Tie
The degree to which the dyadic partners are loyal to interaction with each other as
individuals, often following the person from firm to firm
Caring
The degree to which the dyadic partners are genuinely interested in the well-being of
the other, like each other, and seek each other’s society and friendship
SOCIALITY:
The degree to which the dyadic economic interaction takes on a social and personal nature: e.g., “We get
together and talk for like an hour just to catch up on how his life is” (4-4:1959).
Knows tie’s
The degree to which dyadic partners are aware of, know, and discuss each other’s
life and
personal lives and families
family
Social
The extent to which dyadic partners engage together in events and activities outside
activities
of business functions
46
TABLE 6
Definitions and Examples of Dyadic Economic Interaction Attributes
of Embedded Network Ties
INTERACTION EXTENT: The range, scope and comprehensiveness of interaction between dyadic
partners.
Frequency
Amount
Intensity
Reciprocal
Interdependence
Multiplexity
Duration
How often the dyad interacts
The degree of interaction between dyadic partners, as indicated by size, by anticipated
payment, or by comparison to other ties; at the extreme, concentrated exchange is the extent
to which dyadic partners rely solely upon the other to fill the function, through either choice
or lack of options
The amount of interaction between dyadic partners over a specific time period, particularly
under sense of deadline or pressure
The degree to which interaction between dyadic partners entails outputs becoming inputs
for the other or posing contingency upon the other, thereby requiring an adjustment to other
actions (Thompson, 1967)
The degree to which interaction between dyadic partners occurs in more than one sphere,
fulfilling more than one function; may entail business & non-business interaction
The extent to which dyadic partners have had previous interaction with each other or the
length of the dyadic interaction
INTERACTION EFFORT: The level of expenditure of energy and resources of one dyadic partner on
behalf of the other dyadic partner, beyond that which is due, usual, or expected.
Work for the
Partner
Education
Responsiveness
Helpful
Problem Solving
The degree to which dyadic partners expend energy for the accomplishment of the partner’s
goals, as if they were hired by the partner
The degree to which dyadic partners teach, train, or educate the other partner
The degree to which dyadic partners react quickly to address concerns of the other
The degree to which the actions of dyadic partners further the goals of the other
The extent to which dyadic partners engage in trying to solve the problems of the other or
that they do so jointly
INTERACTION EASE: The level of facilitation and comfort of interaction between dyadic partners
due to the reduction of effort, stress, tension, and difficulty
Proximity
Technological
compatibility
Convenience
Goal congruence
Communication
Quality
The degree of physical distance or space between the dyadic partners
The extent to which dyadic partners use and/or work with the same technology, including
both hardware, software, and other electronic media
The extent to which the interaction between dyadic partners is advantageous or may entail
the more efficient use of some resources
The degree to which dyadic partners agree upon mutual goals or vision for interaction
The extent to which the amount, type, and frequency of communication facilitates positive
interaction
INTERACTION QUALITY: The degree of excellence, merit, or superiority of the dyadic interaction.
Familiarity
Knowledge of
business needs
Working well
Satisfaction
Loyalty to
Interaction
The extent to which dyadic partners are acquainted with each other’s routines, interaction
style, and broader scope of business (beyond just the current transaction)
The extent that they are aware and act on the business needs of the other
The extent to which dyadic partners interact effectively to achieve their goals together
The degree to which dyadic partners are satisfied and content with the interaction patterns
and routines
The degree to which dyadic partners will stay in the interaction versus pursuing other
options
47
TABLE 7
Definitions and Examples of Social Capital Attributes
of Embedded Network Ties
BROKERING : The extent to which dyadic partners introduce one another to new third parties.
STRUCTURAL EMBEDDEDNESS: The extent to which a dyad’s mutual contacts are connected to
one another” (Granovetter, 1992, p. 35).
OBLIGATION
The extent of social indebtedness which binds or constrains the course of interaction between dyadic
partners.
Asymmetry
The extent to which the reciprocity between dyadic partners is unbalanced,
either consistently or at a given point in time
Expectations
The degree to which dyadic partners anticipate, think, or believe that certain
outcomes will occur
Norms
The degree to which the relationship between dyadic partners is governed by an
ideal standard stemming from group memberships of either partner
RESOURCE ACCESSIBILITY: The extent to which dyadic partners can access the available resources
from each other (Bourdieu, 1986; Putnam, 1993).
48
Table 8
Taxonomy of Embedded Network Ties (N=66)
Types of
Embeddedness
%
N
2%
1
2%
1
8%
3
11%
7
5%
3
30%
20
42%
28
Description
Example
UNIDIMENSIONAL EMBEDDEDNESS
Personal
Competency
Hollow
High Personal Relationship
Trust: Personal Goodwill
High Dyadic Economic Interaction
Trust: Personal Competency
High Social Capital
Trust: Social
Peter: Hired a good friend who needed a job but had no experience.
Kevin: Depends on and is loyal to independent graphic artist due to high quality
and service over time. He had worked with him in his previous employment.
Casey: Uses the insurance agent his father recommended and uses. Service was
terrible, and the agent was hard to get along with. Casey couldn’t “quit” using him.
BI-DIMENSIONAL EMBEDDEDNESS
Functional
Isolated
Latent
High Dyadic Economic Interaction
High Social Capital
Low Personal Relationship
Trust: Social &Pers Competency
High Personal Relationship
High Dyadic Economic Interaction
Low social capital
Trust: Pers Goodwill & Competency
High Personal Relationship
High Social Capital
Low Dyadic Economic Interaction
Trust: Personal Goodwill & Social
Kathryn: Uses great graphic artist, used in her previous venture, who always comes
through with quality and goes the extra mile. She refers many people to this artist
but doesn’t consider him a “friend” (low personal relationship).
Mike: Contracts with high school friend, who recently moved to Mike’s town, to
become an independent sales rep for Mike. The friend has good sales skills, but
Mike intentionally does not bring him into his own vendor network (low social
capital).
Ann: Knows she can obtain office space from a neighbor, her “second father,”
whenever she decides needs it (low dyadic economic interaction).
FULL EMBEDDEDNESS
Full
High Personal Relationship
High Dyadic Econ Interaction
High Social Capital
Trust: Personal Goodwill
Personal Competency
Social
Matt: Serves a client from previous job who followed him to his new venture. She
is much older than Matt, functioning as both a mother figure and a mentor. As a
very “big player” in his industry, she has brought him many new clients and
contacts. She knows his wife and children and is concerned about his career, his
firm’s success, and his health. She will not go to anyone else for her data
management needs because she thinks Matt’s work is the best. Matt gives her “tons
of extras” and keeps her on the cutting edge. On his birthday, she sends cards; on
her birthday, he sends flowers.
Figure 1
Hierarchical Tree Structure
Element
Element
Attribute
Component
Element
Element
Attribute
Figure 2
Typology of Relational Embeddedness
Social Capital
Trust: Social (3rd party)
Controls: Reputation
HOLLOW
Embeddedness
Personal
Relationship
Trust: Personal /Good-will
Controls: Maintenance of
Personal Relationship
LATENT
Embeddedness
FULL
PERSONAL
Embeddedness
FUNCTIONAL
Embeddedness
Embeddedness
ISOLATED
Embeddedness
COMPETENCY
Embeddedness
Dyadic Economic Interaction
Trust: Personal /Competency
Controls: Value of Relationship History
REFERENCES
Alba, J. D. (1982). Taking stock of network analysis: A decade's results. Research in the Sociology of
Organizations, 1, 39-74.
Aldrich, H. (1989). Networking among women entrepreneurs. In O. Hagan & C. Rivchun & D. Sexton
(Eds.), Women-Owned Businesses (pp. 103-131). New York: Praeger.
Aldrich, H. E., Elam, A. B., & Reese, P. R. (1996). Strong ties, weak ties and strangers: Do women owners
differ from men in their use of networking to obtain assistance? In S. Birley & I. C. MacMillan (Eds.),
Entrepreneurship in a Global Contest (pp. 1-25). London: Routledge Ltd.
Aldrich, H. E., & Zimmer, C. (1986). Entrepreneurship through social networks. In D. L. Sexton & R. W.
Smilor (Eds.), The Art and Science of Entrepreneurship (pp. 2-23). Cambridge, MA: Ballinger.
Barney, J. (1991). Firm resources and sustained competitive advantage. Journal of Management, 17(1), 99120.
Barney, J. B., & Hansen, M. H. (1994). Trustworthiness as a source of competitive advantage. Strategic
Management Journal, 15, 175-190.
Baum, J. A. C. (1996). Organizational ecology. In S. Clegg & C. Hardy & W. Nord (Eds.), Handbook of
Organization Studies (pp. 77-114). London: Sage.
Baum, J. A. C., & Oliver, C. (1992). Institutional embeddedness and the dynamics of organizational
populations. American Sociological Review, 57, 540-559.
Berg, B. L. (1995). Qualitative research methods for the social sciences. Boston: Allyn and Bacon.
Bhide, A. (2000). The origin and evolution of new business. Oxford: Oxford University Press.
Borch, O. J., & Arthur, M. B. (1995). Strategic networks among small firms: Implications for strategy
research methodology. Journal of Management Studies, 32(4), 419-441.
Bourdieu, P. (1986). The forms of capital. In J. G. Richardson (Ed.), Handbook of theory and research of
the sociology of education (pp. 241-258). New York: Greenwood.
Bradach, J. L., & Eccles, R. G. (1991). Price, authority and trust: From ideal types to plural forms. In G.
Thompson & J. Frances & R. Levacic & J. Mitchell (Eds.), Markets, hierarchies and networks: The coordination of
social life (pp. 277-292). London: Sage Publications.
Bruderl, J., Preisendorfer, P., & Ziegler, R. (1992). Survival chances of newly founded business
organizations. American Sociological Review, 57, 227-242.
Burt, R. S. (1982). A note on cooptation and definitions of constraint. In P. V. Marsden & N. Lin (Eds.),
Social structure and network analysis (pp. 219-233). Beverly Hills: Sage Publications.
Burt, R. S. (1992). Structural Holes: The Social Structure of Competition. Cambridge: Harvard University
Press.
Burt, R. S. (1997). A note on social capital and network context. Social Networks, 19, 355-373.
Burt, R. S. (1998). The network structure of social capital. (Unpublished working paper).
Burt, R. S. (2000). The network structure of social capital. In R. I. Sutton & B. M. Staw (Eds.), Research in
Organizational Behavior (Vol. 22). Greenwich, CT: JAI Press.
Burt, R. S. (2002). The social capital of structural holes. In M. F. Guillén & R. Collins & P. England &
M. Meyer (Eds.), New Directions in Economic Sociology (pp. Chapter 7, p. 201-251). ???: Russell Sage
Foundation.
Burt, R. S., & Knez, M. (1996). Trust and third-party gossip. In R. M. Kramer & T. R. Tyler (Eds.), Trust
in organizations: Frontiers of theory and research (pp. 68-89). Thousand Oaks, CA: Sage.
Chafetz, J. S. (1978). A primer on the construction and testing of theories in sociology. Itasca, IL: F. E.
Peacock Publishers, Inc.
Chandler, G. N., & Hanks, S. N. (1998). An investigation of new venture teams in emerging businesses.
Gent, Belgium.
Coffey, A., & Atkinson, P. (1996). Making sense of qualitative data: Complementary research strategies.
Thousand Oaks, CA: Sage Publications.
Coleman, J. S. (1988). Social capital in the creation of human capital. American Journal of Sociology,
94(Supplemental), S95-120.
Coleman, J. S. (1990). Foundations of social theory. Cambridge, MA: Harvard University Press.
Curran, J., Jarvis, R., Blackburn, R. A., & Black, S. (1993). Networks and small firms: Constructs,
methodological strategies and some findings. International Small Business Journal, 11(2), 13-25.
de Burca, S., Brannick, T., Fynes, B., & Glynn, L. (2001). Intimate relations--fact or fiction: An analysis
of business to business relationships in Irish companies. Irish Journal of Management, 22(1), 55-71.
Denzin, N. K., & Lincoln, Y. S. (1994). Handbook of Qualitative Research. Thousand Oaks, CA: Sage
Publications.
Dierickx, I., & Cool, K. (1989). Asset stock accumulation and sustainability of competitive advantage.
Management Science, 35, 1504-1511.
Doty, D. H., & Glick, W. H. (1994). Typologies as a unique form of theory building: Toward improved
understanding and modeling. Academy of Management Review, 19(2), 230-251.
Dubini, P., & Aldrich, H. (1991). Personal and extended networks are central to the entrepreneurial
process. Journal of Business Venturing, 6(5), 305-313.
Dyer, J. H., & Singh, H. (1998). The relational view: Cooperative strategy and sources of
interorganizational competitive advantage. Academy of Management Review, 23(4), 660-679.
Dyer, J. H., & Singh, H. (1999). On the relational view: Response to relational view commentary.
Academy of Management Review, 24(2), 184-187.
Eisenhardt, K. M. (1989). Building theories from case study research. Academy of Management Review,
14(4), 532-550.
Emerson, R. M. (1976). Social exchange theory. Annual Review of Sociology, 2, 335-362.
Erlandson, D. A., Harris, E. L., Skipper, B. L., & Allen, S. D. (1993). Doing naturalistic inquiry: A guide
to methods (U. Recommended by Janeen Costa, Trans.). Newbury Park: Sage Publications.
Feld, S. L. (1997). Structural embeddedness and stability of interpersonal relations. Social Networks, 19(1),
91-95.
Fisher, M. (1997). Qualitative computing: Using software for qualitative data analysis. Aldershot,
England: Ashgate.
Glaser, B., & Strauss, A. (1967). The discovery of grounded theory: Strategies of qualitative research.
London: Wiedenfeld and Nicholson.
Gnyawali, D. R., & Madhavan, R. (2001). Cooperative networks and competitive dynamics: A structural
embeddedness perspective. The Academy of Management Review, 26(3), 431-445.
Good, D. (1988). Individuals, interpersonal relations and trust. In E. Gambetta (Ed.), Trust making and
breaking cooperative relations (pp. 31-48). Cambridge, MA: Basil Blackwell.
Gough, S., & Scott, W. (2000). Exploring the purposes of qualitative data coding in educational enquiry:
Insights from recent research. Educational Studies, 26(3), 339-354.
Granovetter, M. (1985). Economic action and social structure: The problem of embeddedness. American
Journal of Sociology, 91(3), 481-510.
Granovetter, M. (1992). Problems of explanation in economic sociology. In N. Nohria & R. Eccles (Eds.),
Networks and Organizations (pp. 25-56). Boston: Harvard Business School Press.
Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78(6), 1360-1380.
Granovetter, M. S. (1982). The strength of weak ties: A network theory revisited. In P. V. Marsden & N.
Lin (Eds.), Social structure and network analysis (pp. 105-130). Beverly Hills, CA: Sage.
Gregersen, H. B., & Black, J. S. (1992). Antecedents to commitment to a parent company and a foreign
operation. Academy of Management Journal, 35(1), 65-90.
Guba, E. G., & Lincoln, Y. S. (1994). Competing paradigms in qualitative research. In N. K. Denzin & Y.
S. Lincoln (Eds.), Handbook of qualitative research (pp. 105-117). Thousand Oaks, CA: Sage Publications.
Gummesson, E. (1991). Qualitative methods in management research. Newbury Park, CA: Sage
Publications.
Hansen, E. L. (1995). Entrepreneurial networks and new organization growth. Entrepreneurship Theory and
Practice, 19(4), 7-20.
Hennart, J. F. (1993). Explaining the swollen middle: Why most transactions are a mix of market and
hierarchy. Organization Science, 4(4), 529-547.
Hesterly, W. S., Jones, C., & Madhok, A. (1998). Trust: A typology and its applications in economic
exchange.
Hite, J. M., & Hesterly, W. S. (2001). The evolution of firm networks: From emergence to early growth of
the firm. Strategic Management Journal, 22.
Homans, G. (1950). The human group. New York: Harcourt Brace.
Huberman, A. M., & Miles, M. B. (1994). Data management and analysis methods. In N. K. Denzin & Y.
S. Lincoln (Eds.), Handbook of qualitative research (pp. 428-444). Thousand Oaks, CA: Sage Publications.
Jarillo, J. C. (1989). Entrepreneurship and growth: The strategic use of external resources. Journal of
Business Venturing, 4(2), 133-147.
Johannisson, B., & Monsted, M. (1998). Contextualizing entrepreneurial networking: A case of
Scandinavia. International Studies of Management and Organization, 27(3), 109-136.
Jones, C., Hesterly, W. S., & Borgatti, S. P. (1997). A general theory of network governance: Exchange
conditions and social mechanisms. Academy of Management Review, 22(4), 911-945.
Jones, G. R., & George, J. M. (1998). The experience and evolution of trust: Implications for cooperation
and teamwork. Academy of Management Review, 23(3), 531-546.
King, G., Keohane, R. O., & Verba, S. (1994). Designing social inquiry: Scientific inference in qualitative
research. Princeton, NJ: Princeton University Press.
Kirzner, I. M. (1973). Competition and entrepreneurship. Chicago: University of Chicago Press.
Kirzner, I. M. (1997). Entrepreneurial discovery and the competitive market process: An Austrian
approach. Journal of Economic Literature, 35, 60-85.
Krackhardt, D. (1992). The strength of strong ties: The importance of Philos in organizations. In N. Nohria
& R. G. Eccles (Eds.), Networks and organizations: Structure, form and action (pp. 216-239). Boston: Harvard
Business School Press.
Krackhardt, D. (1995). Entrepreneurial opportunities in an entrepreneurial firm: A structural approach.
Entrepreneurship: Theory and Practice, 19(3), 52-69.
Langley, A. (1999). Strategies for theorizing from process data. Academy of Management Review, 24(4),
691-710.
Larson, A. L. (1992). Network dyads in entrepreneurial settings: A study of the governance of exchange
relationships. Administrative Science Quarterly, 37, 76-103.
Larson, A. L., & Starr, J. A. (1993). A network model of organization formation. Entrepreneurship: Theory
and Practice, 17(2), 5-15.
Lincoln, Y., & Guba, E. (1985). Naturalistic inquiry. Beverly Hills, CA: SAGE Publications.
Macaulay, S. (1963). Non-contractual relations in business: A preliminary study. American Sociological
Review, 28(1), 55-69.
MacLean, T. L. (2001). Thick as thieves: A social embeddedness model of rule breaking in organizations.
Business and Society, 40(2), 167-196.
Macneil, I. (1978). Contracts: Adjustment of long-term economic relations under classical, neo-classical
and relational contract law. Northwestern University Law Review, 72, 854-906.
MacQueen, K. M., McLellan, E., Kay, K., & Milstein, B. (1998). Codebook development for team-based
qualitative analysis. Cultural Anthropology Methods, 10(2), 31-36.
Madhok, A. (1997). Cost, value and foreign market entry mode: The transaction and the firm. Strategic
Management Journal, 18(1), 39-61.
Marsden, Peter V. (1981). Introducing influence processes into a system of collective decisions. American
Journal of Sociology, 86, 1203-1235.
McKelvey, B., & Aldrich, H. (1983). Populations, natural selection and applied organizational science.
Administrative Science Quarterly, 28(2), 101-128.
Miles, M. B., & Huberman, A. M. (1994). Qualitative data analysis: An expanded sourcebook (2 ed.).
Newbury Park, CA: Sage.
Mizruchi, M. S. (1994). Social network analysis: Recent achievements and current controversies. Acta
Sociologica, 37(4), 37-52.
Nahapiet, J., & Ghoshal, S. (1998). Social capital, intellectual capital, and the organizational advantage.
Academy of Management Review, 23(2), 242-266.
NVivo. (Version N5)(2000). Vic, Australia: QSR International Pty. Ltd.
Peteraf, M. A. (1993). The cornerstones of competitive advantage: A resource-based view. Strategic
Management Journal, 14, 179-192.
Poppo, L., & Zenger, T. (2000, March 4, 2000). Substitutes or complements? Exploring the relationship
between formal contracts and relational governance. Paper presented at the BYU Winter Strategy Conference,
Brigham Young University, Provo, UT.
Portes, A., & Sensenbrenner, J. (1993). Embeddedness and immigration: Notes on the social determinants
of economic action. American Journal of Sociology, 98(6), 1320-1350.
Powell, W. W. (1987). Hybrid organizational arrangements: New forms or transitional development.
California Management Review, 30(1), 67-98.
Powell, W. W. (1990). Neither market nor hierarchy: Network forms of organization. Research in
Organizational Behavior, 12, 295-336.
Powell, W. W., & Smith-Doerr, L. (1994). Networks and economic life. In N. J. Smelser & R. Swedberg
(Eds.), The handbook of economic sociology (pp. 368-402). Princeton, NJ: Princeton University Press.
Provan, K. G. (1993). Embeddedness, interdependence, opportunism in organizational supplier-buyer
networks. Journal of Management, 19(4), 841-857.
Reese, P. R., & Aldrich, H. E. (1995). Entrepreneurial networks and business performance. In S. Birley &
I. C. MacMillan (Eds.), International entrepreneurship (pp. 124-144). London: Routledge.
Richards, T. J., & Richards, L. (1994). Using computers in qualitative research. In N. K. Denzin & Y. S.
Lincoln (Eds.), Handbook of qualitative research (pp. 445-462). Thousand Oaks, CA: Sage Publications.
Ring, P., & Van de Ven, A. (1989). Formal and informal dimensions of transactions. In A. Van de Ven &
H. Angle & R. S. Poole (Eds.), Research on the management of the innovation (pp. 171-192). Cambridge, MA:
Ballinger Press.
Robinson, V. M. J. (1993). Problem based methodology: Research for the improvement of practice.
Oxford: Pergamon.
Romanelli, E. (1989). Environments and strategies of organization start-up: Effects on early survival.
Administrative Science Quarterly, 34, 369-387.
Rowley, T., Behrens, D., & Krackhardt, D. (1999). Redundant governance structures: An analysis of
structural and relational embeddedness in the steel and semiconductor industries. Paper presented at the Strategic
Management Journal, Northwestern University, Evanston, IL.
Rowley, T., Behrens, D., & Krackhardt, D. (2000). Redundant governance structures: An analysis of
structural and relational embeddedness in the steel and semiconductor industries. Strategic Management Journal,
21(3), 369-386.
Saxenian, A. (1990). Regional networks and the resurgence of silicon valley. California Management
Review, 33(1), 89-111.
Schein, E. H. (1987). The clinical perspective in fieldwork (Vol. 5). London: Sage Publications.
Shan, W., Walker, G., & Kogut, B. (1994). Interfirm cooperation and startup innovation in the
biotechnology industry. Strategic Management Journal, 15, 387-394.
Shimizu, K., & Dacin, T. (1998). Social capital dynamics: A multi-level, embeddedness perspective. Paper
presented at the Academy of Management Annual Meeting.
Shuman, J. C., & Buono, A. (1992). Network organizations and venture creation: A case study of Model
American Computer Corporation. Frontiers of Entrepreneurship Research, 303-317.
Siegel, R., Siegel, E., & MacMillan, I. C. (1993). Characteristics distinguishing high-growth ventures.
Journal of Business Venturing, 8(2), 169-180.
Staber, U. (1994). Friends, acquaintances, strangers: Gender differences in the structure of entrepreneurial
networks. Journal of Small Business and Entrepreneurship, 11(1), 73-82.
Staber, U., & Aldrich, H. E. (1995). Cross-national similarities in the personal networks of small business
owners: A comparison of two regions in North America. Canadian Journal of Sociology, 20(4), 441-467.
Starr, J. A., & MacMillan, I. C. (1990). Resource cooptation via social contracting: Resource acquisition
strategies for new ventures. Strategic Management Journal, 11, 79-92.
Steier, L., & Greenwood, R. (1998, May 21-23, 1998). The evolution of "angel" networks. Paper presented
at the Babson Entrepreneurial Conference, Gent, Belgium, May 20-23, 1998.
Strauss, A. L., & Corbin, J. (1990). Basics of qualitative research: Grounded theory procedures and
techniques (1st ed.). Newbury Park, CA: Sage Publishing.
Strauss, A. L., & Corbin, J. (1994). Grounded theory methodology. In N. K. Denzin & Y. S. Lincoln (Eds.),
Handbook of qualitative research (pp. 273-285). Thousand Oaks, CA: Sage Publications.
Ulrich, D., & McKelvey, B. (1990). General organizational classification: An empirical test using the
United States and Japanese electronics industries. Organization Science, 1(1), 99-118.
Uzzi, B. (1996). The sources and consequences of embeddedness for the economic performance of
organizations: The network effect. American Sociological Review, 61, 674-698.
Uzzi, B. (1997). Social structure and competition in interfirm networks: The paradox of embeddedness.
Administrative Science Quarterly, 42, 35-67.
Uzzi, B. (1999). Embeddedness in the making of financial capital: How social relations and networks
benefit firms seeking financing. American Sociological Review, 64(4), 481-505.
Van de Ven, A. H. (1993). The development of an infrastructure for entrepreneurship. Journal of Business
Venturing, 8(3), 211-230.
Weick, K. E. (1979). The social psychology of organizing (2nd ed.). New York: McGraw-Hill, Inc.
Wernerfelt, B. (1995). The resource-based view of the firm: Ten years after. Strategic Management
Journal, 16(3), 171-174.
Williamson, O. (Ed.). (1994). The economics and sociology of organization: Promoting a dialogue. New
York: Plenum Press.
Williamson, O. E. (1985). The economic institutions of capitalism. New York: The Free Press.
Yin, R. K. (1994a). Case study research: Design and methods. Thousand Oaks, CA: Sage Publications.
Yin, R. K. (1994b). Evaluation: A singular craft. In C. S. Reichardt & S. F. Rallis (Eds.), The qualitativequantitative debate: New perspectives (pp. 71-84). San Francisco, CA: Jossey-Bass.
Zaheer, A., McEvily, B., & Perrone, V. (1998). Does trust matter? Exploring the effects of
interorganizational and interpersonal trust on performance. Organization Science, 9(2), 141-159.
Zaheer, A., & Venkataraman, S. (1995). Relational governance as an interorganizational strategy: An
empirical test of the rate of trust in economic exchange. Strategic Management Journal, 16, 373-392.
Zhao, L., & Aram, J. D. (1995). Networking and growth of young technology-intensive ventures in China.
Journal of Business Venturing, 10(5), 349-370.
Zucker, L. G. (1986). Production of trust: Institutional sources of economic structure, 1840-1920. In B. M.
Staw & L. L. Cummings (Eds.), Research in organizational behavior (Vol. 8, pp. 53-111). Greenwich, CT: JAI
Press.
Zukin, S., & DiMaggio, P. (1990). Structures of capital: The social organization of the economy. New
York: Cambridge University Press.
AUTHOR BIO
Julie Melville Hite is an Assistant Professor in Educational Leadership at Brigham Young
University (julie_hite@byu.edu). Her current research focuses on the structure and
evolution of internal and external strategic networks as well as their role on resource
acquisition, innovation and leadership in educational organizations. A current study
examines the role of network structure and content on the resource acquisition of private
secondary school headmasters in Uganda. She has previously published in Strategic
Management Journal (SMJ), Journal of International Business Studies (JIBS) and Best
Paper Proceedings for the Academy of Management. She received her Ph.D. in Strategic
Management from the University of Utah.
ENDNOTES:
For emerging firms, the social network of the entrepreneur is virtually synonymous with the firm’s network, as
network ties initially exist on the interpersonal level (Bhide, 2000; Hite & Hesterly, 2001; Zaheer, McEvily, &
Perrone, 1998).
1
2
In addition to relational embeddedness, the broader concept of embeddedness encompasses at least five additional
theoretical perspectives on the potential sources of influence and constraint on the firm. First, structural
embeddedness refers to the “extent of overlap of social relations between two individuals” (Feld, 1997, p. 91) and
the architecture of this ongoing social structure (Marsden, 1981; Zukin & DiMaggio, 1990). Second, cognitive
embeddedness refers to the routinization and structure of mental models and processes that direct economic logic
(e.g. Shimizu & Dacin, 1998; Zukin & DiMaggio, 1990). Third, cultural embeddedness suggests that shared beliefs
and values shape economic aims and actions (Zukin & DiMaggio, 1990). Fourth, political embeddedness focuses
attention toward how “economic institutions and decisions are shaped by a struggle for power that involves
economic actors and nonmarket institutions” (Zukin & DiMaggio, 1990, p. 20). Finally, institutional embeddedness
posits that the firm is embedded within a larger institutional environment that provides legitimating effects for both
growth and survival (Baum & Oliver, 1992).
3
Although license dates often lag behind the start of operations, economic research (Bruderl, Preisendorfer, &
Ziegler, 1992; Uzzi, 1996) uses license registration dates to determine organizational age; thus the working
definition of organizational age equals the number of months the firm has been in business based on the firm’s
business license date.
4
References to direct quotations from interview text indicate the case number and network tie number followed by
the test line. For example, (5-8:623) refers to a quotation from Case #5 regarding the 8 th network tie and can be
found on text line 623.
Download