Collaborative Network Topology Adaptation: Creating new Synergies

advertisement
Collaborative Network Topology Adaptation: Creating new Synergies
Working Paper
January 8, 2009
Dr. Alex Bordetsky
Professor
Naval Post Graduate School
Richard Bergin
Visiting Associate Professor
Naval Post Graduate School
Yaara Bergin
Research Associate
Naval Post Graduate School
1
Background
How collaborative networks morph and create synergies during a response effort is
shaped by a multitude of factors. Some of these factors are shaped by the trajectory of a
collaborative network topology and the [creation or presence] of Strong links (Jack 2005), while
others are influenced by Weak Ties (Baribasi 2002). However shaped or influenced, morphism
of collaborative network topologies often takes place during emergent events where a team
attempting to collaborate in real-time. While each response effort is unique, they all are all
emergent, posses various levels of uncertainty, and each experiences changes in its collaborative
network topology that creates varying degrees of synergy.
Note the changes in the collaborative network topology that occur during the following
scenario. Originating from Canada and destined for a port in the State of New Jersey, a routine
shipment of radioactive material (Cobalt-60) goes missing in New York State. New York State
Police assume incident command and issue a be-on-the-lookout for (BOLO) alert through normal
channels. This alert provided real-time, secure information dissemination to numerous local and
state organizations. The missing truck was subsequently found abandoned and empty in rural
New York. As incident commander, the New York State Police then convened and managed an
online collaborative session to coordinate the region-wide search for the missing shipment. This
session connected various local, state, and federal organizations using the video-teleconferencing
capability. Shortly after the discovery of the missing truck, a radiological detection sensor was
triggered at a Lincoln Tunnel toll plaza in New Jersey. An officer directed an unmarked
commercial van to a secondary screening point, while a sensor alert was automatically forwarded
to Lawrence Livermore National Labs for validation by subject matter experts.
2
Secondary screening by Police confirmed the presence of Cobalt-60 and a shipping
container like the one depicted during the online collaborative session conducted by the New
York State Police. The response team was then alerted to the discovery of the container and a
second online collaboration session was called, this time by Port Authority Police as the incident
commander. As team members joined the online collaboration session to be briefed on this new
incident, they witnessed the driver of the vehicle being taken into custody and emergency
services units deploying, to include a K-9 explosive detection team, a commercial vehicle
inspection team with an advanced mobile radiological isotope identifier, and the police
helicopter. Real-time video feeds from Lincoln Tunnel cameras and the Police helicopter
hovering above provided those online with the ability to view streaming video of the incident
while it was underway.
Secondary inspection results, to include confirmation of the isotope, explosive trace
detection findings from an ion scan identifier, and direct visual observation of the K-9 alerting on
the van, provided real-time situational awareness simultaneously to multiple jurisdictions,
agencies, and levels of government. What began as a simple high-jacking in New York and a
routine commercial vehicle HazMat stop in New Jersey, quickly evolved into an interdiction of a
potential terrorist incident involving a possible radiological dispersal device (RDD). Additional
agencies were added to the online collaborative session and its focus quickly shifted to
containment of the incident, isolation of the scene, and the immediate sharing of intelligence
gained from the stop. The incident commander briefed and provided pictures of the driver in
custody, the vehicle, and its contents. He then began coordination of a perimeter security and
traffic diversion plan, and requested additional resources to include HazMat response and bomb
squad teams. (Adapted - Anthony 2006)
3
Understanding and measuring how changes in collaborative network topologies create
synergies during a response to a critical event is extremely important, but under-researched.
There are no existing frameworks or models that fully describe or measure variation in the
number and effect of Weak and Strong Ties generated by collaborative network morphism.
Literature Review
The review of literature defines synergy, discusses synergy as a systems thinking concept,
provides a context for study; Maritime Operations Interdiction (MIO) a large-scale
networking initiative, and describes prior work on the creation of Strong links and synergy.
Synergy
Webster’s dictionary defines synergy as simply “a mutually advantageous conjunction or
compatibility of distinct business participants or elements as resources or elements” (MerriamWebster 2008). Corning provides a typology for synergy that includes: Synergies of Scale (“A
large number of participants may produce combined effects that could not be achieved by any
individual, or even a smaller group”), Synergies of Division of Labor (“Better defined as the
combination of labor”), Synergies of Functional Complementarities (“Closely related to a
division/combination of labor is the concept of a functional complementarily. For instance, some
[team members] form symbiotic relationships with. They do not divide up a single task but
provide complementary functions”), Synergies of Information Sharing and Collective
Intelligence, and Synergies of Tool and Technology ‘symbioses’ (“In essence, tools and
[technology] represent a major form of synergy – a cooperative effect (or effects) that are not
otherwise attainable”) (Corning 2007).
For this study, I considered all five types of synergies mentioned in Corning’s typology;
Synergies of Scale, Synergies of Division of Labor, and Synergies of Functional
4
Complementarities and adopted Klaus Krippendorff’s definition of synergy that is contained in
his unpublished report, “A Dictionary of Cybernetics.” “It is derived from the holist conviction
that the whole is more than the sum of its parts and, because the energy in a whole cannot exceed
the sum of the energies invested in each of its parts (see first law of thermodynamics), that there
must therefore be some quantity with respect to which the whole differs from the mere
aggregate. This quantity is called synergy. In practice, synergy is mostly a negative quantity
owing to the fact that all complex organisms consume energy merely for maintaining its own
structure. More loosely, synergy refers to the benefits of collaborative as opposed to individual
efforts.” (Krippendorff 1986)
Synergy as a Systems Thinking Approach
For the purposes of this study, which focuses on Synergies of: Scale, Division of Labor,
Functional Complementarities, Synergies of Information Sharing and Collective Intelligence,
and Synergies of Tool and Technology (Corning 2007), I will define the “benefits of
collaborative” (Krippendorff 1986) as the synergy created through the progressive creation of
Weak Ties and use of new Strong links within a changing collaborative network topology.
This definition of “benefits of collaborative” is supported by Capra’s description of
Systems Thinking, Gravnovetter’s work on Strong and Weak Ties (Gravnovetter 1973), and
Baribasi’s discussion on the role of Weak Ties (Baribasi 2002). “According to the systems view,
the essential properties of an organism, or living system, are the properties of the whole, which
none of the parts have. They arise from the interactions and relationships among the parts.
These properties are destroyed when the systems is dissected, either physically or theoretically,
into isolated elements. Although we can discern individual parts in any system, these parts are
5
not isolated, and the nature of the whole is always different for the mere sum of its parts” (Capra
1996).
Baribasi suggests that “Weak Ties play a critical role in our ability to communicate with
the outside world.” Additionally, “The Weak Ties, or acquaintances, are our bridge to the
outside world, since by frequenting different places they obtain their information from different
sources than out immediate friends” (Baribasi 2002).
Capra, Gravnovetter, and Baribasi provide us with a theoretical foundation for exploring
how synergy as a systems thinking approach may be applied to understanding the collaborative
benefits obtained by adaptive collaborative network topologies. In seeking to better understand
and measure the collaborative benefits, a large-scale networking initiative test bed was selected
to conduct a large-scale experiment.
Maritime Operations Interdiction (MIO): Large-scale networking initiative
Maritime Operations Interdiction is defined as Visiting, Boarding, Searching, and Seizing
(VBSS) operations. “These operations are conducted as a part of the maritime law enforcement
policy of each country inside their respective territorial waters or as a part of the homeland
security requirements as they are mandated today by the global war against terrorism. They are
often conducted by allied maritime forces in international waters seeking to prevent the transfer
of radiological or bio-chemical materials, as well as possible terrorists among the crew
members.” (Stavroulakis 2006)
MIO is a large-scale networking initiative focused on studying high-value target tracking
and emergency response coordination between geographically distributed teams and subject
mater experts seeking to enhance situational awareness (SA) and coordinate decision making.
6
The MIO experiments used the Tactical Network Topology (TNT), which is a large-scale
experiment test bed developed at NPS by Dr. Alex Bordetsky that is used to design and test
“wireless tactical network topologies that provides real-time access to unmanned aerial vehicles
(UAVs), unmanned ground vehicles (UGVs), unmanned surface vehicles (USV) and mobile
Special Operations Command (SOCOM)/Marine Corps units and for exploring collaboration for
high-value target tracking operations” (Bordetsky and Friman 2006). The test bed is also used
for “remote integration of UAVs/USVs in MIO or other scenarios, such as non-combatant
evacuation experiments, where flying UAVs or operating UGVs is not feasible” (Bordetsky and
Friman 2006).
Sitting on top of the TNT network is a set of collaborative technologies that include:
Groove (an application suite that contains a discussion board and chat capabilities), a file transfer
application, a Task Manger (“used to provide participants with a mechanism to monitor the
progress of events”), a Situation Awareness (SA) agent (“that provides geographic positions of
the assets and status of the network links for the mobile nodes”), an EWall system (“developed at
MIT and adapted to MIO operational picture by NPS, used to monitor information alerts.”
(Bordetsky and Friman 2006)), and a Voice Over IP (VOIP) application. This suite of tools
enabled participants to remotely monitor assets and the progress of events.
7
Prior work on Weak links, Strong links, and synergy in information, organizational, and
network science research
This portion of the literature review focuses on providing support for a framework that
measures the variation and effect of Weak and Strong Ties on synergies resulting from the
morphism of collaborative network topologies during a critical event.
Sarah Jack’s (2005) research demonstrated that “Strong Ties provide the mechanism to
invoke 'Weak' Ties, represented by nodes operating in a wider social context”. Chituc &
Azevedo (2005) suggest that a dynamic transformation in the environment increases the
collaboration among different and geographically distributed entities that effectively combine the
most suitable set of skills and resources temporarily in order to achieve a common goal,
generating the so-called collaborative networks. Saiz, Rodríguez & Bas (2005) suggest that
cooperative interaction maximizes the combined capacities to reach the strategic objectives
through integrated solutions to provide efficiency and effectiveness in the operations meant to
take care of customers’ needs. Granovetter (1983) suggests that “Weak Ties provide people with
access to information and resources beyond those available in their own social circle; but Strong
Ties have greater motivation to be of assistance and are typically more easily available.” “Pool
(1980) argues that whether one uses Weak or Strong Ties for various purposes depends not only
on the number of Ties one has at various levels of tie strength but also on the utility of Ties of
different strength. Thus people for whom Weak Ties are much more useful than Strong Ties may
still be constrained to use the latter if Weak Ties make up an extremely small portion of their
contacts; conversely, one for whom Strong Ties are more useful may be socially isolated and
8
forced to fall back on Weak ones. Thus the analytic task is to identify factors affecting these
variations.” (Granovetter 1983).
Table 1 - (Weak and Strong Ties: Variation and Effect) on the next page summaries the
current literature on the variation and effects for each of five types of synergy: Scale, Division of
Labor, Functional Complementarities, Synergies of Information Sharing and Collective
Intelligence, and Tools and Technology
9
Synergies of Scale
Synergies of Division of Labor
- Specialized activiTies that can be
mastered by a machine or human
that collectively create higher
levels of output as a whole that
would the production of all
specialized activiTies by one
entity.
Synergies of Functional
ComplementariTies
- “people form symbiotic
relationships, they do not
divide up a single task but
provide complementary
functions” (Corning 2007)
Synergies of Information
Sharing and Collective
Intelligence
“A diverse collection of
independently-deciding
individuals is likely to make
certain types of decisions
and predictions better than
individuals or even experts
(Surowiecki, James (2004).
Synergies of Tool and
Technology
Low – High
Low – High
Low – High
Low – High
Low – High
[Formation] of higher
numbers of Weak Ties
facilitate gaining access
to wider range and
number of resources.
“Weak Ties play a
crucial role in our ability
to communicate with the
outside world. (Baribasi
2002)
[Forming]of higher numbers of
“Weak Ties facilitate combining
the most suitable set of skills and
resources temporarily in order to
achieve a common goal” (Chituc &
Azevedo, 2005).
Formation of higher
numbers of Weak Ties
increases the diversity of
thought and opinion
resulting in synergies of
Information Sharing and
Collective Intelligence
(Surowiecki, James (2004).
Formation of higher
numbers of Weak Ties may
be enabled by open
collaborative network
topologies technology
infrastructure
Low – High
Low – High
Low – High
Low – High
Low – High
More frequent use of
“Strong Ties facilitate
cooperative interaction that
maximizes the [synergy] of
combined capacities to
reach the strategic
objective” Saiz, Rodríguez
& Bas (2005)
More frequent use of
Strong Ties may result in
group think and reduce
synergies of Information
Sharing and Collective
Intelligence
(Surowiecki, James (2004).
More frequent use of Strong
Ties may be re-enforced by
a closed collaborative
network topology
technology infrastructure
- “A large number of
participants may produce
combined effects that
could not be achieved by
any individual, or even a
smaller group” (Corning
2007)
Weak
Ties
Strong
Ties
More frequent use of
“Strong Ties provide a
mechanism to invoke
'Weak' Ties” (Jack 2005)
thus increasing the
potential for Synergies
of Scale.
TBD
“Perhaps the most important
source of weak ties is the division
of labor, since increasing
specialization and interdependence
result in a wide variety of
specialized role relationships in
which one knows only a small
segment of the other's personality.”
Granovetter, M (1983),
TBD
Table 1 – Weak and Strong Ties: Variation and Effect
10
“tools and [technology]
represent a major form of
synergy – a cooperative
effect (or effects) that are
not otherwise attainable”)
(Corning 2007).”
Proposed application of synergy to Large Scale Collaborative Network Topologies:
Maritime Operations Interdiction (MIO)
Considering prior studies on changing collaborative network topologies, Strong and
Weak Ties, Corning’s synergy typology, and MIO, a framework is developed to explore the
variation and effect of synergy that is created through the formation of Weak Ties and the
creation of Strong Ties during a response effort. The TNT MIO test bed collaborative
environment provides an emergent environment where collaborative network topologies
experience morphism and exhibit various level of synergy associated with scale, division of
labor, and functional complementarities.
In this study, I will develop and test a new model that describes and measures the
variation in synergy that occurs when a collaborative network topology experiences morphism
due to emerging patterns in team collaboration when responding to an event. Specifically, I will
be seeking to measure synergies created from the formation of Weak Ties and the use of new
Strong Ties that occur during an MIO.
When measuring synergies, Busi & Bititci (2006) suggest considering; How multiple
individual measures can be aggregated to give an overall picture of the collaborative enterprise
performance; How can a [team] that belongs in more than one collaborative enterprise have one
single measurement system.
This study will focus on the formation of Weak Ties and the use of Strong Ties that
occurs during an “emergency response where coordination between geographically distributed
teams and subject mater experts [spanning various first responder disciplines] seeking to enhance
Situational Awareness (SA) phase as the primary objective” (Bordetsky and Friman 2006). For
the purposes of this study, the formation of Weak links and the use of Strong links will be
considered an end-state once a collaborative network has completed the process of morphism
11
that results from seeking to enhance situational awareness. This approach is limited in that it will
not capture MIO as a whole, or the variation in synergy that occurs while a collaborative network
topology is changing from one form to another. The end-state analysis, however, will provide a
holistic view of the synergies created while seeking to enhance situational awareness.
Design
The design of a study on a large-scale networking initiative such as TNT MIO include a
description of the design components, desired relationships between those components, a review
of prior research on possible prototypes or relevant parameter-criteria space models, a proposed
parameter-criteria space framework for a desirable system model, a proposed multi-criteria
model for an adaptive collaborative network topology, and a Pareto set for the expected holistic
model.
Components:
The selected networking environment may be described as an adaptive collaborative
tactical network topology created to facilitate information sharing, knowledge sharing, and
decision making between nodes via a set of links. The building blocks consist of nodes that are
comprised of various individuals, teams, and organizations. The links are defined as
communication channels that take the form of either Weak or Strong Ties, are connected for a
particular duration of time, utilize a particular technology platform, and may be counted in terms
of the number present in an adaptive network topology over a particular period of time. For this
paper, the Tactical Network Topology (TNT) Maritime Interdiction Operations (MIO) 08 – 04
field experiment “Networking and Interagency Collaboration on Maritime-Sources Nuclear
Radiation Threat” (TNT MIO 08-04 2008) configuration will be used to provide a less abstract
and detailed description of the actual components (nodes and links) considered in this study.
12
Figure 1 - “Radiological Interdiction and Command Center Communications” (TNT – MIO 0803 2008) below provides a visual representation of the expected nodes and links at the beginning
of the field exercise.
Radiological Interdiction and
Command Center Communications
Agency
Vessel
Waterside
Client
Wireless
Camera
Dat
Wir
el
a Fe
ess
Target
Vessel
Detector
Vessel
or
ns t
Se tpu
Ou
NPS
TCP-IP
Demo
Network
ta
Da
e
Fe
Agency
Ops
Center
Wireless
JSAS
TCP-IP
Network
Wir
el
s
les
ire
W
RadSensor
Boarding
Party
less
Wire
ed
Mobile
Client
ess
d
ss
le
ire
W
Wir
eles
s
Camera
Analytics
Lab
Figure 1 “Radiological Interdiction and Command Center Communications”
Relationships:
For this study, the formation and dissolution of Weak Ties and the use or dissolution of Strong
Ties are considered to be the desirable dynamic relationships between nodes that allow for the
modeling of synergy that occurs with an adaptive collaborative network topology. “The
"strength" of an interpersonal tie [within an adaptive collaborative technology network is defined
13
as] a linear combination of the amount of time, the emotional intensity, the intimacy (or mutual
confiding), and the reciprocal services which characterize each tie” Granovetter (1973).
Montgomery suggests defining Strong Ties a social relationship between two agents that is
repeated over time (e.g. members of the same family or very close friends) and Weak Ties as a
transitory social encounter between two persons. (Montgomery, J.D., 1994). Calvo, Verdier, and
Zenou state that “by definition Weak Ties are transitory and only last for one period” (CalvoArmengol, Verdier, and Zenou 2007) (Montgomery, J.D. 1994). For the purposed of this study,
Weak Ties will be defined as those that did not exist prior to a particular scenario that is part of a
field study—specifically, where pre-existing reciprocal services between two nodes did not exist
prior to the TNT MIO field studies. Strong Ties will be defined as those that existed prior to the
field experiment—in particular, the TNT MIO field experiments have been repeated over time,
and have demonstrated reciprocal services which characterize each Strong Tie.
Prior Research on Collaborative Network Adaptation
Prior research on how adaptive collaborative networks morph and create synergies may
be grouped into three categories: Adaptive Structuration Theory (AST), Collaborative Capacity,
and Virtual Team Performance.
Adaptive Structuration Theory
The literature on Adaptive Structuration Theory (AST) provides “a viable approach for
studying the role of advanced information technologies in organization change. AST examines
the change process from two vantage points: (1) the types of structures that are provided by
advanced technologies [such as collaborative network topologies], and (2) the structures that
actually emerge in human action as people interact with these technologies” (Desanctis and
Poole 1994). Majchrzak further explores the relationship between social structure, technology in
14
use, and adaptation. “The structuring of technologies in use refers to the processes through which
users manipulate and reshape their technologies to accomplish work and the ways in which such
actors draw on the particular social contexts within which they work” (Majchrzak, Rice,
Malhotra, King, Ba, S.2000). The process of reshaping technology within the context of
adaptive collaborative network topologies may be understood as the creation and use of Weak
Ties and the use and dissolution of Strong Ties. “This dynamic adaptation processes may take
the form of a series of cycles of misalignments, followed by alignments, followed by more but
smaller misalignments” (Leonard-Barton’s (1988) or a set of “discontinuities that occurs during
brief windows of opportunity which open the constraint set” (Tyre and Orlikowski 1994). Taken
within the context of adaptive collaborative network topologies, both models (cycles of
misalignment and windows of opportunity) describe how nodes might adapt to changes in the
environment that impact the efficacy of existing Ties.
Virtual Team Performance and Collaborative Capacity
The literature on Virtual Teams provides a comprehensive set of constructs that predict
team performance in a virtual environment. Many of theses constructs were developed to
measure an individual’s or in this study, a nodes’ collaborative capacity. Collaborative capacity
for this study is defined as those individual characterizes that enable the creation and synergistic
use of Weak Ties and the synergistic use of existing Strong Ties. Those characteristics include
individual trust-based Social Capital, Expertise Location, Goal Similarity (congruence),
Anticipation of Value, and Access to Parties.
15
Trust-based Social Capital
Coleman (1998) proposes three forms of social capital: obligations and expectations,
information channels, and social norms. Trust-based Social capital is formed through the
combined effect of interpersonal trust and social norms. When considering individual nodes in
an adaptive collaborative network topology, higher levels of interpersonal trust increase the use
and effectiveness of Strong Ties in creating various types of synergies.
Expertise Location
Farja and Sproull (2000) demonstrated in their research that “expertise coordination
shows a Strong relationship with team performance that remains significant over and above team
input characteristics, presence of expertise, and administrative coordination” (Faraj and Sproull
(2000). Their research suggests that individual node awareness of expertise location through
Weak and Strong Links provides synergy that exceeds the sum of the parts or “team input
characteristics.”
Goal Congruence
Goal congruence, or goal similarity, is the agreement of actions with team, group, or
organizational goals. Jehn’s (1995) research showed that goal similarity is positively associated
with individuals' satisfaction and intent to stay in the group. In terms of adaptive collaborative
networks, intent to stay together translates to an increased use of existing ties. As the level of
goal congruence increases, the use of Strong Ties increases. As the number of Weak Ties
increases, the level of goal congruence decreases, possibly resulting in a loss of synergy, and
ultimately, a realignment resulting in a reduction in the creation of newly formed Weak Ties and
a movement back toward higher use of Strong Ties.
Anticipation of value
16
Anticipation of value “refers to a team member’s expectations about value creation as a
result of combining and exchanging recourses with each other” (Nahapiet and Ghoshal 1998).
“The causal relationship between group success-failure and subsequent attitudinal variables
(satisfaction and organizational commitment) is positively mediated by efficacy and outcome
expectancy variables” (Riggs, M., & Knight, P. (1994). Higher levels of anticipation of value
suggest suggests that individual team member or nodes in an adaptive collaborative network
topology expect to create various synergies through the creation of newly formed Weak Ties and
the use of Strong Ties that facilitate sharing resources.
Access to Parties
Access to parties refers to the opportunities to make knowledge combination and
exchange among team members (Nahapiet and Ghoshal 1998). “Beccara-Fernandez and
Sabherwal’s research showed that the combination and externalization process [creation and use
of newly formed Weak Ties], but not socialization and internalization process [use of Strong
Ties] affect perceived knowledge satisfaction “(Beccara-Fernandez and Sabherwal (2001).
Absorptive Capacity
“Absorptive capacity refers to the ability to recognize the value of new knowledge and
information, and to assimilate and use it” (Cohen and Levinthal (1990). Szulanski’ study
showed the major barriers to internal knowledge transfer to be knowledge-related factors such as
the recipient’s lack of absorptive capacity (0.54), causal ambiguity (0.34), and an arduous
relationship between the source and the recipient (0.33) (Szulanski, G. (1996). Szulanski’s
finding on factors constraining absorptive capacity suggest that individual nodes within an
adaptive collaborative network topology are constrained in terms of level of synergy that may be
17
obtained through concurrent Weak and Strong Ties. Miller’s magic rule of seven ±1 also
suggests that node capacity is constrained by various human cognitive factors.
Team performance is measured in terms the levels of synergies of Scale, Division of
Labor, Complementarities, Information Sharing and Collective Intelligence, and of Tool and
Technology achieved during a particular scenario, as affected by the adaptation (creations of
newly formed Weak links and the use of existing Strong links) of a collaborative network
topology. For this study, SA Capacity and Collaborative Capacity, Trust-based Social Capital,
Swift Trust, and Goal Congruency will be measured to evaluate how they moderate the creation,
dissolution, and use of Weak and Strong Ties, and how this generates various forms of synergy
in an adaptive collaborative network topology.
Proposed parameter-criteria space framework for a desirable system model
Considering the existing literature on AST, Collaborative Capacity, and Virtual Teams,
and the literature on interpersonal Ties (Weak and Strong links), a parameter-criteria space
framework was developed to propose a set of synergistic relationships between node capacity
and Weak and Strong Ties. Node capacity is measured in terms of human cognitive channel
capacity, or SA Capacity and Collaborative Capacity, which for this study is defined as the
individual node levels of Trust-based Social Capital, Swift Trust, and Goal Congruency. Table
2, “Node Capacity, Weak and Strong Ties,” illustrates a set of proposed relationships related to
node capacity and link type.
18
Node Capacity
Links
Weak
Links
Strong
Links
Situational
Awareness
capacity
Collaborative
Capacity
Collaborative
Capacity
Collaborative
Capacity
Collaborative
Capacity
- Swift Trust
-Interpersonal
Trust
As the level of
Interpersonal
Trust increases,
the number of
Weak Ties
decreases.
- Goal
Congruence
As the number
of Weak Links
increases, the
level of goal
congruence
decreases.
– Adaptive model
As the level of
Interpersonal
Trust increases,
the use of
Strong Links
increases.
As the level of
goal congruence
increases, the
use of Strong
Ties increases.
Cycles of
misalignments may reenforce the use of
Strong Links..
The number of
concurrent
Weak links is
may be
extended
through the use
of collaborative
technologies.
As the level of
Swift Trust
increases, the
number of Weak
Links increases.
The number of
concurrent
Strong Links is
bounded by SA
capacity (7 ±1).
The level of
Swift Trust has
no effect on the
use of Strong
Ties.
The newly created
Weak Links may be
constrained by the
adaptive model.
Window of Opportunity
may increase the
number of newly
created Weak Links.
Table 2 -”Node Capacity and Weak and Strong Ties”
Proposed Multi-Criteria Model for Adaptive Collaborative Network Topology
Performance Criteria Definitions
Performance in an adaptive collaborative network topology multi-criteria model is
measured in terms of a high number of Ties (Weak and Strong) that enable high levels of:
Synergies of Scale, Synergies of Division of Labor, Synergies of Functional Complementarities,
Synergies of Information Sharing and Collective Intelligence, and Synergies of Tool and
Technology. Table 1, “Weak and Strong Ties: Variation and Effect,” provides a description of
each type of synergy. Table 2,”Node Capacity and Weak and Strong Ties,” contains a set of
proposed relationships between factors influencing the creation and dissolution of Weak Ties and
the use of Strong Ties.
19
Design Variables:
Design variables are those that are under the immediate control of the systems architect.
For this study, design variables will be considered those that define nodes and links. Node
design variables include: SA Capacity, Interpersonal Trust, SWIFT Trust, and Goal
Congruency);. Link design variables include: Number Created, Number Used, Type (Weak and
Strong), and Technology Platform. Some of the design variables interact creating a suboptimization effect, and are referred to as opposing design variables. The following is a
description of node design variables, the link design variables and opposing design variables that
will be considered in a discussion of how Pareto analysis fits into the design of this experiment.
Nodes:
Nodes in a collaborative network topology may range from a sensor, a data source, an
individual, a team, or an organization. For this study, the unit of analysis is the individual.human
node. The design variables used in this study are SA Capacity, Collaborative Capacity and Goal
Congruence The following Multi-Criteria design variables were selected to measure node
capacity:
Situational Awareness Capacity:
Miller (1956) showed a number of remarkable coincidences between the channel capacity
of a number of human cognitive and perceptual tasks. In each case, the effective channel
capacity is equivalent to between five and nine equally-weighted error-less choices.
20
Collaborative Capacity
Collaborative capacity is moderated by the level of Interpersonal Trust and/ or Swift
Trust between two nodes and the level of Goal Congruence among the linked nodes.
Interpersonal Trust
Interpersonal trust in an adaptive collaborative network relates to the use of Strong Links,
and is defined as individual trust-based social capital. This is supported by the relational view of
social capital that is embedded in trustworthiness, reliability, and an institutionalized collective
endeavor (Solow 2000). It has been suggested that this is precisely what gives social networks
their value in monitoring others’ actions (Arrow 2000).
Swift Trust
Swift trust in an adaptive collaborative network relates to the creation of Weak Links
and is defined as a temporary systems “where people are brought together to complete a given
task, have common factors which may include: Many different skills, Limited history of working
together and unlikely to work together ever again, Complex and non-standard tasks which are
only partly understood, Interdependent tasks that require a high degree of collaboration, Tight
timescales and high cost of failure” (Changing Minds 2008). Swift Trust in temporary systems is
not an interpersonal form of trust, but rather a cognitive and action form of trust (Meyerson,
Weick, and Krmer 1996). The cognitive and action form includes: Aligned activity that
reinforces a certain level of goal congruence forcing members to develop a system of trust;
Interdependence; Constrained environment; Time compression; Just-enough resources;
Professional role focus; Task/process focus; and a Trust broker who hires, fires, and leads the
charge. (Changing Minds 2008).
21
Goal Congruence
Goal Congruence “may be evaluated in terms of varied organizational goals, research
goals, or individual goals depending on unit of analysis used for each node. Goal Congruence
among Weak Ties may be weak and therefore increase agency costs reducing the benefit derived
from accessing better quality and more diversified information and resources. “During stability,
security, transition and reconstruction operations it is highly likely that, [various responding
teams with Weak Ties] will have some congruent goals, such as saving lives or property. It is
also likely that they will have some incongruent goals, such as protecting national interests
versus aligning with stakeholder groups. These incongruent may require resolution if conflict [or
loss of synergy] is to be avoided” (Zolin 2006).
Links:
Links in an adaptive collaborative network topology range from those established at all
layers of the OSI model to the social networking links. From this study, links are defined as
connections between individual human nodes and are measured in terms of their frequency of
use, their duration in hours and the technology platform used to provide an interface between
individual nodes. From this study, platforms include: Port Authority of NY and NJ Joint
Situational Awareness (JSAS) Tools, Naval Post Graduate School Situational Agent (NPS SA),
Groove (Microsoft collaboration platform), Telephony, Email, Domestic Nuclear Detection
Office, Joint Analysis Center (JAC), and the Space and Naval Warfare Command (SNWC) Blue
Force Tracker.
22
Opposing design objectives
Considering the proposed parameter-criteria space framework for a desirable system
model, two sets of opposing design objectives were identified: Number of Links vs. SA Channel
Capacity and the number of Weak Links vs. Level of Goal Congruency. Based on Miller’s
work, “The Magical Number Seven, Plus or Minus Two” (Miller 1956), channel capacity, or the
number of links that can be simultaneously maintained by one node in an adaptive collaborative
network topology, is limited to seven, plus or minus one. Increasing the number of channels or
links to a particular node beyond seven may result in no increase or a derogation of SA. As the
number of Weak Ties increase the level of goal congruency tends to decrease. A reduction in
goal congruency reduces Synergies of Scale, Synergies of Division of Labor, Synergies of
Functional Complementarities, and Synergies of Information Sharing and Collective
Intelligence.
Opposing design objects are sometimes accompanied with complementary design
objectives or the inclusion of synergies within the design itself. For this study, the number of
Weak Links vs. the level of Swift Trust and the use of Strong Links vs. the level of Interpersonal
Trust are both complementary design objectives, where both design objectives may be modeled
as maximizing criteria in a Pareto solution. As the level of Swift Trust increases, the number of
Weak links also increases. As the level of Interpersonal Trust increases, the use of Strong Links
increases.
Functional Constraints
A functional constraint is a variable that is assigned by the user of the system or
environmental factors. When considering the use of an adaptive collaborative network topology
during an emergent crisis or disaster, the types and number of functional constraints would vary
23
significantly. For this field study, a scenario is used, thus allowing for the control of the selected
scenario and the duration that scenario is allowed to play out over time.
Time
Using time as a functional constraint provides an opportunity to better understand the
relationship between the duration of a particular scenario, the amount of information sharing that
occurs via the number of newly created Weak Link and the use of Strong Link during that
scenario, and how synergies of information sharing and collective intelligence affect decision
making. Ahituv, Igbaria, and Sella, (1998) studied the “Effects of Time Pressure and
Completeness of Information on Performance.” Their study provided empirical support for the
following proposition: Decision makers under time pressure, as compared with decision maker
not under time pressure, use fewer but more important attributes, less complex decision rules,
weigh negative aspects more heavily, take fewer risks, and are less satisfied with their decisions
(Ahituv, Igbaria, and Sella 1998).
Scenario
The creation of newly formed Weak Links and the use of Strong Links in an adaptive
network topology will be moderated by the scenario played against the network topology. This
creates some limitations in terms of the generalizability of any scenario to a real world event.
However, a campaign of experiments during the discovery stage would provide for an
opportunity to evaluate the creation of newly formed Ties and the use of Strong Tiesacross a
series of experiments, prior to publishing a set of substantive theories on how collaborative
networks morph and create synergies during a response effort.
For this study, the following scenario will be used: “Experiment intelligence indicates
that a sophisticated terrorist group intends to smuggle key components of an improvised nuclear
24
device (IND) and/or radiological dispersion device (RDD) into the US where the group will
assemble it and detonate it for maximum effects. MIO begins with information feeds to JSAS
from partners in Europe that may have detected suspects and materials as they were leaving
transportation centers in Europe. The response actions unfolded indicate the threat of nuclear
material and/or IND/RDD being transported by a large and/or small vessel into the Port of NY &
NJ. The goal is to explore new sensor, networking, and situational awareness solutions for
tagging, monitoring, and interdicting large and small vessels threatening the Port” (TNT MIO
08-04 2008).
The table below provides a summary of the performance criteria definitions, design
variables, opposing and complementary design objectives, and the functional constraints.
Performance Criteria Definitions
Synergy of Scale
Synergy of Division of Labor Synergies
Synergy of Functional Complementarities
Synergy of Information Sharing and Collective Intelligence
Synergy of Tools and Technology
Design Variable
Nodes
Trust-based Social Capital
Swift Trust
Goal Congruency
Situational Awareness
Links
Type (Weak / Strong)
Number newly Created
Frequency of Use
Technology Platform
Opposing design objectives
# Weak Links vs. Level SA
# Weak Links vs. Level GC
Complementary Design Objective
# Weak Links vs. Level of Swift Trust
Use of Strong Links vs. Level of Trust-based Social Capital
Functional Constraints
Time
25
Range
Low - High
Low - High
Low - High
Low - High
Low - High
Low - High
Low - High
Low - High
Number of Channels
Weak / Strong
Low - High
Low - High
Type
Pareto
Pareto
Pareto
Pareto
Varied
Scenario
Varied
Table 3 “Criteria definitions, Design variables, Opposing and complementary design
objectives, and the Functional constraints”.
26
Pareto set for the expected adaptive collaborative network topology model
The ultimate result of multi-criteria analysis is referred to as a Pareto Set; this is the model
for the best possible optimization and maximization over N-dimensions of criteria and may be
graphically expressed as similar to x = y- -1 curve for every pair of criteria. Along this curve is the
set of best solutions, this method does not specify a single optimization of maximization unless
weights are applied (adapted – Clements 2006). For this study, four Pareto Sets will be
evaluated: Two opposing design options and two complementary design objectives.
1. (Opposing - Optimization) Number of Weak Links vs. the level of SA
2. (Opposing -Optimization) Number of Weak links vs. the level of Goal Congruence
27
3. (Complementary - Maximization) Number of Weak links vs. the level of Swift Trust
4. (complementary) The use of Strong Links vs. the level of Interpersonal Trust
28
Experiment:
Type of Experiment
This experiment may be considered part of an experimentation campaign that contains
components of both Discover of Hypothesis and Refined Hypothesis. Alberts refers to an
experimentation campaign as “a series of related activities that explore and mature knowledge
about a concept of interest. As illustrated in Figure 3-1, experimentation campaigns use the
different types of experiments in a logical way to move from an idea or concept to some
demonstrated military capability. Hence, experimentation campaigns are organized ways of
testing innovations that allow refinement and support increased understanding over time”
(Alberts 2002).
(Alberts 2002) - Modified
For this experiment,the “Preliminary Hypothesis” are those related to a proposed set of
relationships between the creation, use, and dissolution of Weak Ties and Strong Ties and the
29
creation of various types of synergy as depicted in Table 1, “Weak and Strong Ties: Variation
and Effect”.
The Refined Hypothesis is focused on evaluating the strength of the relationships
between situational awareness capacity and collaborative capacity and the creation, use, and
dissolution of Weak and Strong Ties. Alberts states that “Hypothesis testing experiments are the
classic type used by scholars to advance knowledge by seeking to falsify specific hypotheses
(specifically if…then statements) or discover their limiting conditions. They are also used to test
whole theories (systems of consistent, related hypotheses that attempt to explain some domain of
knowledge) or observable hypotheses derived from such theories. In a scientific sense,
hypothesis testing experiments build knowledge or refine our understanding of a knowledge
domain. In order to conduct hypothesis testing experiments, the experimenter(s) create a
situation in which one or more factors of interest (dependent variables) can be observed
systematically under conditions that vary the values of factors thought to cause change
(independent variables) in the factors of interest, while other potentially relevant factors (control
variables) are held constant, either empirically or through statistical manipulation.” (Alberts
2002). For this experiment, the scenario (directly) and time (indirectly) are held constant while
Synergy and Weak and Strong Ties (the dependent variables) are observed under conditions that
vary the value of various factors (independent variables).
Objective:
The objective of this experiment is to better understand how and which synergies are obtained
when the morphism of a collaborative network topology takes place during an emergent event
where a team is attempting to collaborate in real-time. Specifically how factors influencing the
creation, use and dissolution of Weak and Strong Ties impacts and/ or predicts the level of
30
various forms of synergy achieved during a particular scenario.
A qualitative analysis of
captured collaborative interactions will be used to better understand how and which synergies are
obtained and how they are influenced by the creation, use and dissolution of Weak and Strong
Ties.. A quantitative analysis of discussion treads, chats sessions, and a survey instrument will be
used to measure factors influencing the creation, use and dissolution of Weak and Strong Ties
Design Criteria:
The design criteria are a set of independent variables influencing the dependent variables
Weak and Strong Ties that in turn create various forms of synergy within an adaptive network
topology. These independent variables are grouped around nodes and links that are considered
to be the two major components of an adaptive collaborative network topology. Nodes are
defined as individuals who participate in a given scenario. Each node exhibits a certain level
(low – high) of Trust-based Social Capital, Swift Trust, and Goal Congruence and will maintain
a certain level of Situational Awareness of number of channels. Links are defined as the
relationships between nodes. These relationships take the form of either Weak or Strong Ties and
exhibit a range of use and communication through various types of technology platforms. For
this experiment (TNT MIO 08-04), four collaborative technology platforms were used. Google
Earth was used to provide situational awareness of the detection and target vessels during the
experiment in the form of an aerial view and dynamic representation of vessel movement.
GROOVE was the planned for primary collaborative platform where all exercise participants
collaborate through the use of discussion threads, chat sessions, and real-time file sharing
capabilities. NPS-CENETIX Video Conferencing One (VC1) was used to provide access to
various video streams, audio conferencing, back-up chat, and file sharing capabilities. NPSCENETIX Observer Notebook was used by NPS – only participants and observers were to post
31
messages related to the experiment itself, independent of activities related directly to the
scenario. In addition to the NPS-CENETIX collaboration technology platforms, the Port
Authority of NY and NJ provided Joint Situational Awareness System (JSAS). JSAS provided
integrated transmission of text, voice, and video, and the geospatial visualization of sensor data
and other collateral information, in a way that facilitated SSA and on-line collaboration.
Design Variable
Nodes
Trust-based Social Capital
Swift Trust
Goal Congruence
Situational Awareness
Links
Type (Weak / Strong)
Number newly Created
Frequency of Use
Technology Platforms
Low - High
Low - High
Low – High
Number of Channels
Weak / Strong
Low - High
Low - High
Type
Functional Constraints:
The functional constrains are time and the selected scenario. For this experiment, time is
bounded by the activities defined in two phases of the experiment that occur in a two day period.
“Scenario overview: Experiment intelligence indicates that a sophisticated terrorist group
intends to smuggle key components of an improvised nuclear device (IND) and/or radiological
dispersion device (RDD) into the US where the group will assemble it and detonate it for
maximum effects. MIO begins with information feeds to JSAS from partners in Europe that may
have detected suspects and materials as they were leaving transportation centers in Europe.
The response actions unfolded indicate the threat of nuclear material and or IND/RDD
being transported by a large and/or small vessel into the Port of NY & NJ. The goal is to explore
new sensor, networking, and situational awareness solutions for tagging, monitoring, and
32
interdicting large and small vessels threatening the Port. The Port of NY-NJ Experiment will be
conducted in two Phases (I & II). Figure 1 shows the location of target vessels in Phase I and II.
Figure 1 - Location of Command Post and Target Ship at Berth 17 (Phase I, Day 1) and two
Small Target Vessels (Phase II, Day 2).
Phase I
A Container Liner is docked (See Fig. 2) and a radioactive source is on board. The USCG and
CBP as the lead agencies for Port Security have mobilized resources. PAPD, FDNY, NYPD,
33
Figure 2 – Shipping Container
NJSP, Newark Fire, Elizabeth Fire, and Jersey City Fire establish unified command to detect
and interdict the threat by conducting boarding and search operations with hand held and
backpack radiological detection systems on the vessel (top deck, below deck, and container
area).
As each boarding team from the dockside independently detects the radioactive source
onboard, they will maintain network connectivity with their Command and Control (C2) Centers
(ship- to- ship and/or ship to shore) and collaborate using the NPS and JSAS situational
awareness tools for rapid decision making at each command and coordination center. Upon
detecting the radioactive sources, the boarding teams will transmit the spectral information via
JSAS to the DNDO Reach-back to receive real-time identification of the items. (DNDO will be
the primary reach-back agency for this experiment)
Additionally, the boarding teams, comprising the boarding party (USCG, CBP, NYPD,
FDNY, NJSP, NJFD) will conduct a further investigation of the vessel’s crewmembers, manifest,
route of travel, and biometrics (latent prints/facials) using network connectivity and collaborating
using the NPS and JSAS tools to seamlessly send real time data and situational awareness to all
the operational Command and Coordination Centers. The communications networks (voice and
data) from below deck will be validated during the demonstration. (Note: this is the only day the
Atlantic Container Liner is available)
Phase II
Two small vessels in the harbor contain a radioactive source on board. The USCG as the lead
agency for Port Security has mobilized resources (NYPD, FDNY, NJSP, NJ FD) to detect and
34
interdict the threat by conducting waterborne patrolling with radiological detection systems
around the Port. As each agency independently detects the radioactive source onboard, they will
maintain network connectivity with their Command and Control (C2) Centers (ship to ship
and/or ship to shore) and collaborate using the NPS and JSAS situational awareness tools for
rapid decision making at each Command and Coordination Center. Upon detecting the
radioactive sources, the search vessels/boarding teams will transmit the spectral information via
JSAS to the DNDO Reach-back to receive real-time identification of the items. (DNDO will be
the primary reach-back agency for this experiment) After the small vessels are identified, they
will be tagged and tracked en route to the Hampton Roads area for the next experiment”
(Bordetsky A. 2008).
Hypothesis Testing:
Factor Influencing the Creation, Use, and Dissolution of Weak and Strong Ties
Considering the design variables identified in Table 2, ”Node Capacity and Weak and
Strong Ties,” a set of hypotheses were developed to test the relationship between Situational
Awareness Capacity and Collaborative Capacity (Social-based Capital, Swift Trust, and Goal
Congruence) and the development, use, and dissolution of Weak and Strong ties. Below is the
set of hypotheses that will be examined in this study.
Weak Ties / Situational Awareness Capacity
H1n – The number of current weak links maintained by an individual node does not change
when a collaborative technology platform is used.
H1 - If collaborative technology platforms are used then the number of concurrent weak links
maintained by one node will increase beyond 7 ±1.
Weak Ties / Collaborative Capacity
H2n – The number of Weak Ties does no change depending on the level of Swift Trust, Socialbased Capital, or Goal Congruence.
35
H2a – If the level of Swift Trust increases, then the number of Weak Links will increase.
H2b – If the level of Social-based Capital increases, then the number of Weak Ties will decrease.
H2b – If the number of Weak Ties increases, then the level of Goal Congruence will decrease.
Strong Ties / Collaborative Capacity
H3n – The use and dissolution of Strong Ties does not change depending on the level of Swift
Trust, Social-based Capital, or Goal Congruence.
H3a - If the level of Social-based Capital increases, then the use of existing Strong Ties
increases.
H3b – If the level of Goal Congruence increases, then the use of existing Strong Ties increases.
Weak and Strong Ties and Synergy
Considering the relationships between Weak and Strong Ties identified in the Literature
(Table 1 -”Node Capacity and Weak and Strong Ties”) a second set of hypotheses were
developed to examine the relationship between Weak and Strong Ties and Synergies of Scale,
Synergies of Division of Labor, Synergies of Functional Complementarities, Synergies of
Information Sharing and Collective Intelligence, and Synergies of Tools and Technology. Below
is the set of hypotheses that will be examined in this study.
Weak Links / Synergy
H4n – The creation of new Weak Ties does not increase Synergies of Scale, Synergies of
Division of Labor, Synergies of Functional Complementarities, Synergies of Information Sharing
and Collective Intelligence, and Synergies of Tools and Technology.
H4a – If the formation of Weak Ties increases, then so does Synergies of Scale.
H4b – If the formation of Weak Ties increases, then so does the Synergies of Division of Labor.
H4c – If the formation of Weak Ties increases, then so does the Synergies of Information
Sharing and Collective Intelligence.
36
H4d – If the formation of Weak Ties increases, then so does the Synergies of Tools and
Technology.
Strong Links / Synergy
H5n – More frequent use of Strong Ties does not increase Synergies of Scale, Synergies of
Division of Labor, Synergies of Functional Complementarities, Synergies of Information Sharing
and Collective Intelligence, and Synergies of Tools and Technology.
H5a – If the use of Strong Ties increases, then so does Synergies of Scale.
H5b – If the use of Strong Ties increases, then so does the Synergies of Division of Labor.
H5c – If the use of Strong Ties increases, then so does the Synergies of Information Sharing and
Collective Intelligence.
H5d - If the use of Strong Ties increases, then so does the Synergies of Tools and Technology.
Sample Population
For this study the sample population will include all participants (non-Observers) of the
TNT MIO 08-4 Experiment Phase I. The use of Purposeful Sampling was to ensure that all nodes
on a given collaborative topology network were considered, a range of pre-exiting Weak and
Strong Ties were represented between and across agencies, and to facilitate the generalizing of
the results back to the population from which the sample were chosen. Please see Appendix A,
“Roles and Responsibilities for a listing of the sample population”.
Data Collection
In seeking to either support or negate H1 – H5, conversations and postings captured in
both GROOVE and the JSAS platforms will be collected. This includes all discussion thread
posts, chat sessions, and recoded voice conversations during the experiment. In seeking to either
support or negate the influence of Situational Awareness Capacity and Collaborative Capacity
(Trust-based Social Capital, Swift Trust, Goal Congruence) on the creation, use, and dissolution
of Weak and Strong Ties (H4 and H5), a survey instrument will be used to measure the
37
individual node’s perceptions of level of each construct. A validated survey instrument will be
used to collect data on Trust-based Capital and Goal Congruence (Majchrzak 2004). Items will
need to be developed to collect data on Situational Awareness Capacity and Swift Trust.
Considering possible discoveries that may occur during this experiment, items measuring the
following constructs will be included in the survey: Expertise Location, Access to Parties, and
Anticipation of Value (Majchrzak 2005). See Appendix B (Adapted) “Collaborative Capacity
Survey Instrument.” All question items on the survey will be measured using a seven-point
Likert scale. The possible responses ranged from “strongly agree” to “strongly disagree.”
Multiple questions were used to measure a single construct to compensate for how subjects
respond to questions with certain word structures. To reduce the incidence of monotonous
responses on the survey, the sequence of questions was randomized and half of the questions
were negated.
Proposed Data Analysis:
Both Qualitative and Quantitative analysis will be used to better understand the
relationships between the creation, use, and dissolution of Weak and Strong Ties and various
types of synergy. Quantitative analysis will be used to examine the influence of Situational
Awareness Capacity and Collaborative Capacity on the creation, use, and dissolution of Weak
and Strong Ties.
Qualitative Analysis
Qualitative analysis of discussion threads, posts, chat, and audio recordings will include
the use of open coding and axial coding to better understand synergies created by Weak and
Strong Ties. Open coding will be used to examine the data. “Data will be broken down into
discrete parts, closely examined, compared for similarities and differences, and questions are
38
asked about the phenomena as reflected in the data” (Strauss and Corbin 1990 p. 62). In this
experiment, I will be looking at how the creation, use, and dissolution of Weak and Strong Ties
create various forms of synergy in an adaptive collaborative network. After reading all content,
coding will be conducted line-by-line, by sentence, and in some instances, by groups of
sentences. Line-by-line coding is identified by Strauss and Corbin as highly generative and
useful during the early stages of a study (Strauss and Corbin 1990). Once phenomena are
identified in the data, concepts will be grounded around them (Strauss and Corbin 1990 p. 65).
Considering these concepts, axial coding will be used to explore possible relationships (H1 H5).
Quantitative Analysis
Survey data will be used to evaluate H1 – H3. Quantitative analysis will include
instrument validation, testing for convergent and discriminate validity, and to provide support for
hypothesis testing.
Instrument validation will focus on checking for internal consistency reliability.
Reliability of the instrument will be judged by estimating how well the items that reflect the
same construct yield similar results. For this study, Cronbach's Alpha (a) will be used to
measure internal consistency. Cronbach’s Alpha ranges between 0.0 and 1.0, and a value of
greater than 0.7 is considered sufficient for social research.
Support for construct validity will be derived from both the literature and qualitative
analysis of the postings, chat sessions, and recorded voice communications. Testing for
Convergent and Discriminate Validity, both considered sub-categories of Construct Validity, will
be supported through quantitative analysis by estimating the degree to which two measures are
39
related to each other using a correlation coefficient. Correlations between theoretically similar
items should be higher than correlations between theoretically dissimilar items.
Support for hypothesis testing will be performed using regression analysis to test the
strength of a set of relationships between the independent variables (Trust-based Social Capital,
Swift Trust, Situational Awareness Capacity, and Goal Congruence) and the dependent variables
(Weak and Strong Ties). Survey data will also be used to evaluate the Prato Analysis: Using
regression analysis as a form of multivariate analysis, opposing design options and two
complementary design objectives will be evaluated.
(Opposing - Optimization) Number of Weak Links vs. the level of SA
(Opposing -Optimization) Number of Weak Links vs. the level of Goal Congruence
(Complementary - Maximization) Number of Weak Links vs. the level of Swift Trust
(Complementary) The use of Strong Ties vs. the level of Interpersonal Trust
40
References:
1. Ahituv, Igbaria, and Sella, (1998) ‘The Effects of Time Pressure and Completeness of
Information on Decision Making”, Journal of Management Information Systems Fall, 1998
Vol. 15 #2 p9 153-172
2.
Alberts, D. et. al., “Code of Best Practices: Experimentation”, Information Age Transformation Series,
CCRP, 2002
3. Anthony, Michael (2005) Regional Information Joint Awareness Network
US Army Communications- Electronic Research
4. Barabasi, A.(2002), Linked: The New Science of Networks. Plume Publishing, New York.
5. Beccara-Fernandez, I. And R. Sabherwal (2001) “Organizational Knowledge Management:
A Contingency Perspective”, JMIS, 18:1, Summer 2001, pp. 23-56
6. Bordetsky A. and Friman, H. (2006) Case Studies of Decision Support Models for
Collaboration in Tactical Mobile Environments, 12th ICCRTS Adapting C2 to the 21st
Century
7. Bordetsky A. (2008) “TNT MIO 08-4 Networking and Interagency Collaboration on
Maritime-Sourced Nuclear Radiation Threat Port of NY-NJ/Ft. Eustis/Europe, September 812, 2008
8. Busi M, Bititci US. “Collaborative Performance Management: Present Gaps and Future
Research”. In International Journal of Productivity and Performance Management 2006; Vol.
55 No. 1: 7-25.
9. Capra, F., (1996). The Web of Life. Anchor Books, New York
10. Calvo-Armengol, A, Verdier, T., Zenou,T., (2007) “Strong and Weak Ties in employment
and crime, Journal of Public” EconomicsVolume 91, Issues 1-2, , February 2007, Pages 203233.
11. Clements M. 2006, :Design Paper: Adaptive Network Resource Management” IS4710,
Winter 2006 – Dr. Alex Bordetsky.
12. Corning A. Peter, (2007) Synergy Goes to War: A Bioeconomic Theory of Collective
Violence. Journal of Bioeconomics. Boston: 2007. Vol. 9, Iss. 2; p. 109 (36 pages)
13. Cohen, Wesley M.; Levinthal, Daniel A.; ““Absorptive capacity: A new perspective on
learning and innovation.” Administrative Science Quarterly, Mar90, Vol. 35 Issue 1, p128,
25p
41
14. Coleman J. (1988) "Social Capital in the Creation of Human CapitalSocial Capital in the
Creation of Human Capital", The American Journal of Sociology, Vol. 94, Supplement:
Organizations and Institutions: Sociological and Economic Approaches to the Analysis of
Social Structure (1988), pp. S95-S120
15. Desanctis, G. and Poole, M. S. (1994). Capturing the complexity in advanced technology
use: adaptive structuration theory. Organization Science, 5(2):121-147.
16. Faraj, S., & Sproull, L. (2000). Coordinating expertise in software development teams.
Management Science, 46(12), pp. 1554-1568.
17. Francisco R, Azevedo, A (200?), Dynamic Performance Management in Business Networks
Environment, (complete citation pending)
18. Fuller, B. and Applewhite E, J., (1975, 1979) Synergetics; Explorations in the Geometry of
Thinking, First Published by Macmillan Publishing Co. Inc. 1975, 1979.
19. Gravnovetter, M. (1973), The Strength of Weak Ties, American Journal of Sociology, May
1973.
20. Granovetter, M (1983), The Strength of Weak Ties: A Network Theory Revisited
Sociological Theory, Vol. 1, (1983), pp. 201-233 published by: American Sociological
Association
21. Jack, Sarah(2005), The Role, Use and Activation of Strong and Weak Network Ties: A
Qualitative Analysis, Journal of Management Studies, Volume 42 Issue 6, Pages 1233
22. Jehn, K. A. (1995). A Multimethod Examination of the Benefits and Detriments of
Intragroup Conflict, Administrative Science Quarterly, Vol. 40, p.256282.
23. Krippendorff, K (1986)', “A Dictionary of Cybernetics", an 80 p. unpublished report dated
Feb. 2, 1986 - http://pespmc1.vub.ac.be/ASC/Synergy.html
24. Leonard-Barton, D (1988) “Implementation as Mutual Adaptation of Technology and
Organization,” Research Policy (17), pp. 251-267.
25. Majchrzak A., Jarvenpaa, S., Hollingshead, A., (2007) “Coordinating Expertise Among
Emergent Groups Responding to Disasters” Organization Science. Linthicum: Jan/Feb 2007.
Vol. 18, Iss. 1; p. 147 (17 pages)
26. Majchrzak, A., Rice R.E., Malhotra, A., King, N, Ba, S.(2000) "Technology Adaptation: The
Case of a Computer-Supported Inter-Organizational Virtual Team " MIS Quarterly, Vol. 24,
No. 4 (Dec., 2000), pp. 569-600
27. Miller, G. (1956) “The Magical Number Seven, Plus or Minus Two”. The Psychological
Review, 1956, vol. 63, Issue 2, pp. 81-97
42
28. Montgomery, J.D., (1994).Weak Ties, employment, and inequality: an equilibrium analysis.
American Journal of Sociology 99, 1212–1236.
29. Meyerson, D., Weick, K.E., and Krmer, R.M. Swift trust and Temporary Groups. In R.M.
Kramer & T.R.Tyler (eds.), Twr in Organizations (pp. 166- 195).Thousand Oaks, CA: Sage
Publications, 1996.
30. Nahapiet, J.,Ghoshal, S. (1998), Social Capital, Intellectual Capital, and the Organizational
Advantage, The Academy of Management Review, Vol. 23, No. 2 (Apr., 1998), pp. 242-266
31. Riggs, M., & Knight, P. (1994). The impact of perceived group success-failure on
motivational beliefs and attitudes: A causal model. Journal of Applied Psychology, 79, 755766
32. Stavroulakis, G. (2006), Rapidly Deployable, Self Forming, Wireless Networks for Maritime
Interdiction Operations, Master's thesis – Naval Postgraduate School
33. Saiz JJA, Rodríguez RR, Bas AO. “A Performance Measurement System for Virtual and
Extended Enterprises”. In Collaborative Networks and their Breeding Environments. New
York: Springer, 2005.
34. synergy. (2008). In Merriam-Webster Online Dictionary.
Retrieved August 5, 2008, from http://www.merriam-webster.com/dictionary/synergy
35. Surowiecki, James (2004). The Wisdom of Crowds: Why the Many Are Smarter Than the
Few and How Collective Wisdom Shapes Business, Economies, SocieTies and Nations
Little, Brown ISBN 0-316-86173-1
36. Szulanski, G. (1996) “Exploring Internal Stickiness: Impediments to the Transfer of Best
Practice Within the Firm”, Strategic Management Journal, 17(Winter Special Issue), 1996,
pp. 27-43.
37. TNT MIO 08-4, "Networking and Interagency Collaboration on Maritime-Sources Nuclear
Radiation Threat", Port of NY-NJ/Ft. Eustis/Europe, September 8-12, 2008
38. Tyre, M. J., and Orlikowski, W. J.(1994) “Windows of Opportunity: Temporal Patterns of
Technological Adaptation In Organizations,” Organization Science (5:1), February, pp.98118.
39. Zolin, R. “Swift Trust in Hastily Formed Networks” Cebrowski Institute, Naval Postgraduate
School.
43
Appendix A – Resources, Roles and Responsibilities (Bordetsky, A. (2008)
Resources:
“Naval Postgraduate School (Networks: ship-to-ship, ship-to-shore, Collaborative Technology,
Operations & Command Centers, VPN Reach-back, Unmanned vehicles, and Biometrics)
Lawrence Livermore National Laboratory (Radiation Sources, Radiation Detection, Radiation
Reach-back, Ultra-wide band Communication, Explosives Detection, HOPS, Export Control, and
Plume Modeling)
Port Authority NY-NJ (United States Coast Guard, Customs Border Protection, Port NewarkPort Authority of NY & NJ, PAPD EXPERIMENT Police, PAPD Emergency Services Unit,
Port Authority OEM, Jersey City/Newark/ Elizabeth Fire Departments, New York Police
Department, Fire Department NY, NYC OEM, New Jersey State Police Maritime Division, and
the Stevens Institute)
DNDO-JAC (JAC Operations section, JAC Information and Analysis section, Regional Reach
back Spectroscopists, National Reach back Spectroscopists (if necessary), and JACCIS
Components- TBD (State has not signed use agreement, MOA being drafted, will not be signed
in time for the exercise).
`
DoD and U.S. Government (USSOCOM J9, USCG, DNDO, U.S. Army Biometric Fusion
Center, OSD/HLD, HLS S&T, DOE Radiological Assistance Program)
Foreign Partners (Swedish Naval Warfare Center/Kokums, University of Bundeswehr at
Munich, Systematic/Danish Navy Training Center)
Corporate Partners:
 IST (Innovative Survivability Technologies) - Radiation detection software and ARAM
detector for fixed sensors
 CDI (Computer Deductions, Inc.) Biometrics identification hand-held devices
 Swe-Dish Satellite Systems (Swe-Dish antenna units and services for the broadband
reach back)
 Blackbird, Inc. (satellite e-tags and satellite pagers for linking with target small craft),
Persistent Systems Inc. (Wave Relay mesh ship-to-ship network)
 Software Defined Radios. (Software radios and p2p Boarding Party network, ship-tofast boat and on-the-deck communications)
 Rastech, Inc (Projectile launched sensors, projectile-based networking)
44
Roles and Responsibilities (Bordetsky 2008)
Experiment Design, Coordination, and Control
Leads
Dr. Alex Bordetsky-MIO Experiment Principal
Investigator (Experiment Design, Coordination,
and Control), NPS
Advisors
Dr. David Netzer- NPS Director, USSOCOMNPS Field Experimentation Cooperative, NPS
Experiment Advisor
Dr. Arden Dougan-LLNL Experiment Coordinator
(Experiment Design and Coordination)
Mr. David Dlugolenski-PANYNJ (NY-NJ
(Experiment Design, Coordination, and Control)
Dr. Bill Dunlop- LLNL Experiment Advisor
Mr. Keith Arthur-Ft. Eustis (Experiment Design
and Coordination)
Coordination Support
LCDR Dan Vogel-DNDO
Nuc/Rad Reach back ( scenario, planning)
LCDR John Looney
Riverine Area (Hampton Roads), scenario,
planning
JSAS environment
Dr. Erika Poulson, PANYNJ
Port of NY-NJ MIO Response Team
Boarding Team and Surface Assets
BOARDING TEAM
Lt C.K Moore
USCG Members w/
Detection equipment (Day 1)
Ft Wadsworth Operations Ctr
2 Boats (Drive by w/ ARAM) Day2
1 Boat (relay for network) Day 2
PAPD ESU
Boarding team w/ detection equipment
NYPD Boarding team
Lt Jim Griglio
TARGET VESSEL
Container Ship at Berth 17, Port of Newark
Bob Harley
TARGET BOAT
Lt. Ed Ditzel
Dep Insp John Nicholson
45
NJSP
TARGET BOAT
Marine Co. 9 Vessel
NPS Facilitators Supporting the Boarding Party on
the deck
Operation Centers
USCG Operations Center
Staten Island/ Fort WadsWorth
BC Donald Murphy
LCDR Mike Ferebee-USCG support
LCDR Jeff Olk-CBP Support
Marianna Verett-NYPD Support
Lt C.K Moore
PORT OF NEWARK Operations Center
FD MOBILE Operations Center-MCCTV
FD Operations Center
NPS Network Operations Center (Monterey)
SOCOM: Bob Bean
NPS: Col Bryan Hudgens
Ira Forman
NPS: Richard Bergin,
Ira Forman
NPS: Yaara Bergin
Lt Steve Rotello
NPS: Alex Bordetsky, Mike Clement, Eugene
Bourakov
Bob Harley
BC Donald Murphy
BC Donald Murphy
MAJ Brian Conrad, LCDR Ioannis Tzanos
Boarding Team and Surface Assets
TARGET Boat 1
Target Boat 2
?
BOARDING Vessel 1
TARGET Vessel 2
?
?
NPS Boarding Party Members
Bob Bean (SOCOM)
Marianna Verett (Biometrics)
Tom Calabro (CDI-Biometrics)
PA OEM , PA EOC (situation room)
PA MOBILE EOC and Duty Officer
PAPD PN Unified Command Center
Operation Centers
RIVERINE TOC at the MARAD Fleet Facility
CDR John Looney (NPS), Marty Cardwell
(LMCO), David Murray (LMCO), and Mike
French (AADT) Bob Yeates (AADT); Martin
Walker (JRRF)
SOCOM: Bob Bean
NPS: Networking and Experiment Control team
LLNL: Watch Officer
46
NUC/RAD Sensors and Remote Experts
LLNL Watch Officer
Drive-by and onboard detection
D-GPS and Laser Range Finder
ARAM sensors
Dr. Arden Dougan
Dr. Dave Trombino (LLNL)
Randy Sundberg, Drew Casavant (LLNL)
Brian Adlawan, Brad Hinrichs (IST-TEXTRON)
Biometrics Identification Sensors and Remote Experts
CDI Biometrics Boarding Officer
Tom Calabro (CDI)
NPS Biometrics Boarding Officer
Marianna Verett (NPS)
BFT Reachback (West Virginia)
Jon Hayes (BFT)
Networking Infrastructure
MIO Network with Ship-to-Shore, Ship-to-Ship, and
reach back to geographically distributed sites
PANYNJ Networking Infrastructure
OFDM 802.16 Network and Pico Cellular segments (Ft.
Eustis, California)
VPN Reach-back (PANYNJ, DNDO, LLNL, Overseas
sites)
Wave Relay Mesh Network (Ship-to-Shore, Target
Vessel deck, Drive-by boats and Riverine Area boats)
Utra-Wide Band Network for under-the-deck
communications
MIO Network Satellite Ground Stations
Dr. Alex Bordetsky, Eugene Bourakov,
Mike Clement (NPS), Dr. Herb Rubens
(PS)
Dr. Erika Poulsen (PANYNJ) and Mike
Germano
Eugene Bourakov (NPS)
Mike Clement (NPS)
Dr. Herb Rubens, Persistent Systems
Cique Romero (LLNL)
NPS: Mike Clement, MAJ Matt Senn,
MAJ Brian Conrad, Capt James Turner,
LCDR Ioannis Tzanos, LCDR Mike
Ferebee
Swe-Dish: Donovan Dinger
Electronic tags for small boats and vehicles tracking
Eugene Bourakov (NPS)
NPS NOC: MIO network monitoring, performance data
collection, emergency response
NPS: Maj Brian Conrad, LCDR Ioannis
Tzanos, Capt Chris Fodora
ONR 13: LCDR Rich Thorne, LCDR Rich
Moerling
47
COLLABORATIVE TECHNOLOGY AND SITUATIONAL AWARENESS
ENVIRONMENT
MIO Collaborative technology/SA Platform, CoT
Dr. Alex Bordetsky, Eugene Bourakov, Michael
integration
Clement (NPS)
JSAS Collaboration and SA
Dr. Erika Poulsen (PANYNJ), Fred Reimers
(BAE)
JAC Architecture
Robert Brecia, LCDR Dan Vogel (DNDO)
NPS SA and Vstream integration with JSAS
Eugene Bourakov (NPS)
CoT Integration and Groove management
Mike Clement (NPS),
Situational Understanding and Decision Process
Sue Hutchins (NPS)
analysis
Human Factors
John Keenan (ARDEC)
Social Network Dynamics and C2 Maturity Model Col Bryan Hudgens
Virtual C2 Environment and C2 Maturity Model
MAJ Carlos Vega
Spatial Annotation features
Mark St. John (SPAWAR)
EWall data fusion functionality
Dr. Paul Keel and Matt Sither (MIT)
Overseas Early Warning Sites
Swedish Naval Warfare Center-USV feeds,
detection alerts
Systematic team - Providing real time data
on counter diver detection (sonar) and
suspects biometrics using Systematic
Maritime C2 System in Port of Aarhus.
University of Bundeswehr, Munich
(Command Post in Munich and Mobile
Check Point in Bavarian Alps)
CDR Leif Hansson (Sweden)
Dr. Jens-Olov Lindh (Sweden)
Ulrik Høy-Petersen (Denmark)
Mikkel Verner Nielsen (Denmark)
Bjarne Ridderberg (Denmark)
LCDR Kent Meyer (NPS)
Dr. Stefan Pickl and Goran Mihlic (University of
Bundeswehr Munich)
LCDR Kent Meyer (NPS)
DoD and HLS Response Sites
LLNL Watch Officer-Export ControlRadiological Analysis
DNDO-JAC
Regional and Federal feedback
U.S. Army BFC
USSOCOM -USCG C2 Link
METOC Response, NPS NOC
Arden Dougan (LLNL at NPS)
Tzu Fang Wang, Joel Swanson (LLNL at NPS)
John Crandley (LLNL)
LCDR Dan Vogel, Robert Brecia
Jonathan Hayes (BFC)
Bob Bean, USSOCOM
Dr. Peter Guest and Mary Jordan (NPS)
48
Appendix B - Collaborative Capacity Survey Instrument (Majchrzak 2004)
Mutual Understanding Measurement
Construct
Definition
Measurement
Expertise
Location
The analysis
reveals that
expertise
coordination
shows a
strong
relationship
with team
performance
that remains
significant over
and above
team input
characteristics,
presence of
expertise, and
administrative
coordination.
1-5scale, range from "strongly disagree" to "strongly agree"
Team members in my distributed team…
[EXPLOCTN1] ……have a good “map” of each team member’s talents and skills.
[EXPLOCTN2]…work on tasks appropriate with their task-relevant knowledge and skills.
[EXPLOCTN3]…know their own skills and how they relate to the team’s work.
[EXPLOCTN4]…know who on the team has specialized skills and knowledge that is relevant to
the team’s work.
Original scale--- 1-5scale, range from "to a small extent" to "a great extent"
The team has a good "map" of each others' talents and skills
0.86
Team members are assigned to tasks commensurate with their task-relevant knowledge and
skill
0.85
Team members know what task-related skills and knowledge they each possess
0.81
Team members know who on the team has specialized skills and knowledge that is relevant to
their work 0.74
Rationale: changed scales for the convenience purpose so all the measures are
consistent throughout the study.
Results
showed that
goal similarity
is positively
associated
with
individuals'
satisfaction,
liking of other
and intent to
stay in the
group. Goal
similarity was
served as a
control
variable with a
coefficient
alpha of 0.83.
1-5scale, ranging from "strongly disagree" to "strongly agree"
[GOALSIM1] As a team, we have similar goals
[GOALSIM2] The main goals of our team are the same for all members in the team
[GOALSIM3] we on the team all agree on what is important to the team.
Original scale:
Goal Similarity (alpha -- .83)
As a work unit, we have similar goals.
The main goals of my work unit are the same for all members in my work unit.
We (my work unit) all agree on what is important to our group.
Goal
similarity
Rationale and modification: virtual team replaced “work unit”.
49
Relation Measurement
Construct Findings
Measurement
Trust-based
social capital
Relational view
of social capital
is embedded in
trustworthiness,
reliability and
institutionalised
collective
endeavour
(Solow 2000). It
has been
suggested that
this is precisely
what gives
social networks
their value in
monitoring
others’ actions
(Arrow 2000).
(Our Relation
Dimension)
No empirical
findings
(book)
Please indicate whether in general you agree or disagree with the following statements:
(1-5 Scale, ranging from “Strongly Agree” to “ Strongly Disagree”)
[TRUST1] Most people on this team are basically honest and can be trusted.
[TRUST2] On this team, team members are always interested only in their own welfare.
[TRUST3] Members in this team are always trustworthy.
[TRUST4] In this team, one has to be alert or someone is likely to take advantage of you.
[TRUST5] If I have a problem there is always someone to help me.
[TRUST6] I do not pay attention to the opinions of others in the team.
[TRUST7] Most people in this team are willing to help if you need it.
[TRUST8] I feel accepted as a member of this team.
[TRUST9] If you are not able to complete an activity at a given time, someone on this team will
pick it up and do it.
Original Scale:
a. Most people in this team are basically honest and can be trusted
b. People are always interested only in their own welfare
c. Members in this team are always more trustworthy than others
d. In this team one has to be alert or someone is likely to take advantage of you
e. If I have a problem there is always someone to help you
f. I do not pay attention to the opinions of others in the team.
g. Most people in this team are willing to help if you need it
i. I feel accepted as a member of this team.
j If you are not able to complete a task at a given time, someone in this team will pick it up and
do it.
Rationale and modification:
1. Throughout - village/community replaced with team.
2. One item removed because it did not fit - This team has prospered in the last (five
years)
3. Item j changed from “If you drop your purse or wallet in the neighborhood, someone
will see it and return it to you” to suit virtual team context.
Construct
Findings
Measurement
Access to
parties refers
to the
opportunities
to make
knowledge
combination
and
exchange
among team
members.
(Nahapiet
and Ghoshal
1998)
The result
showed that
combination and
externalization
process, but not
socialization and
internalization
process, affect
perceived
knowledge
satisfaction.
Thus, both of the
knowledge
management
processes that
provide explicit
knowledge – that
is, combination
processes,
which help
integrate several
codified areas of
knowledge, and
externalization
processes,
which help
explicate tacit
knowledge –
contribute to
knowledge
satisfaction.
1-5scale, ranging from "strongly disagree" to "strongly agree"
In terms of knowledge sharing practices of your distributed team, you are satisfied with
the…
[ACCESS1]…knowledge that is available to me from other members to help me perform my
activities.
[ACCESS2]…way knowledge is managed within the team.
[ACCESS3]…knowledge sharing among team members.
[ACCESS4]…knowledge that team members are able to provide from their external contacts
when knowledge is not available within the team.
[ACCESS5]…knowledge I am able to provide the team from my external contacts when
needed.
Access to Parties Measurement
Original scale:
Rationale: slightly reworded. 1&5 were
added to separate Outside access from
Inside access to intellectual capital
50
Anticipation of Value Measurement
Construct
Findings
Anticipation
of value
refers to
team
member’s
expectations
about value
creation as a
result of
combining
and
exchanging
recourses
with each
other.
(Nahapiet
and Ghoshal
1998)
The causal
relationship
between group
success-failure
and
subsequent
attitudinal
variables
(satisfaction
and
organizational
commitment) is
positively
mediated by
efficacy and
outcome
expectancy
variables.
Measurement
1-5scale, ranging from "strongly disagree" to "strongly agree"
I am excited to be a member of this distributed team because I feel that…
[ANTVALUE1]I am well recognized for actively providing and exchanging ideas/resources with
other team members.
[ANTVALUE2] Contributing ideas/resources to this team is not worth the effort.
[ANTVALUE3]Working with this team will lead to my intellectual growth.
[ANTVALUE4]Contributing high quality ideas/resources is a sure way to get respect in this
team.
[ANTVALUE5]My work evaluations will accurately reflect my work on this team.
[ANTVALUE6]Most of my good contribution to this team goes unnoticed by people outside the
team.
[ANTVALUE7]Top management feels that the task of the team is very important.
[ANTVALUE8]My rewards are determined by how well the team does its job
Original scale:
Personal Outcome Expectancy scale (alpha = 0.87)
Think about the results of doing your job well or doing your job poorly. Do important outcomes
depend upon how well you perform, or do most job-related outcomes occur whether or not you
do a good job? When answering the following questions, answer in reference to your current
job. Respond with 6-point scale: 1= strongly disagree, 2= disagree, 3= disagree somewhat, 4=
agree somewhat, 5=agree, 6= strongly agree.
1.
2.
3.
4.
5.
I am well rewarded for my good work.
Doing good work here is not worth the effort.
Performing your job well is a sure way to ahead here.
Most of my good work goes unnoticed.
Around here, such things as salary and promotions are determined by how well a
person does his or her job.
6. My work evaluations are accurate
7. Good work gets the same results as poor work in this job.
8. I must do a good job in order to get what I want.
Rationale:
Reworded
the
original
questions
to
reflect
three
notions:
interaction/combination/exchange; b) resources/ideas; c) value
51
a)
Combination Capability Measurement
Constr
uct
Finding
s
Recipient
lacks
absorptiv
e
capacity
Szulanski’
study
showed
the major
barriers to
internal
knowledg
e transfer
to be
knowledg
e-related
factors
such as
the
recipient’s
lack of
absorptiv
e capacity
(0.54),
causal
ambiguity
(0.34),
and an
arduous
relationsh
ip
between
the
source
and the
recipient
(0.33).
Definition
:
It refers
to the
ability to
recogniz
e the
value of
new
knowledg
e and
informati
on and to
assimilat
e and
use it.
Measurement
1-5scale, ranging from "strongly disagree" to "strongly agree"
Team members in your distributed team….
[ABSCAP1]…understand clearly the processes used to accomplish the team’s activities.
[ABSCAP2]…have the technical competence to understand and use the knowledge shared and created
by the team on the whole
[ABSCAP3]…have the organizational competence to understand and use the knowledge shared and
created by the team on the whole.
[ABSCAP4]…are generally able to exploit new knowledge created within the team.
Original Scales:
Recipient lacks absorptive capacity (alpha = 0.83, Items= 9)
Members of <<recipient>> have a common language to deal with the <<practice>>; <<recipient>> had a
version of what it was trying to achieve through the transfer; <<recipient>> had information on the stateof-the-art of the <<practice>>; <<recipient>> had a clear division of roles and responsibilities to
implement the <<practice>>; <<recipient>> had the necessary skills to implement the <<practice>>;
<<recipient>> had the technical competence to absorb the <<practice>>; <<recipient>> had the
managerial competence to absorb the <<practice>>; It is well known who can best exploit new
information about the <<practice>> within <<recipient>>; it is well known who can help solve problems
associated within the <<practice>>;
Rationale: “ To what extent do members of our virtual team”… replaced “ members of our virtual
team”…Dropped items on our own:

Members of our virtual team have a common language to deal with the each other;

Members of our virtual team has a vision of what we were trying to accomplish through sharing
of knowledge

Members of our virtual team are clear on division of roles and responsibilities to accomplish our
tasks

Members of our virtual team have the necessary skills to share knowledge and accomplish the
tasks

It is well known who can help solve any problems that arise in the virtual team related to task at
hand
52
Download