Post on 03-May-2018
1
So Many Ties, So Little Time: A Task Contingency Perspective on
The Value of Social Capital in Organizations*
Morten T. Hansen
Harvard University
Joel M. Podolny
Stanford University
Jeffrey Pfeffer
Stanford University
Running head: So many ties, so little time
Word count: 11,600
* Correspondence to: Morten Hansen, Morgan Hall 343, Soldiers Field Park, Boston, MA 02163. Phone
(617) 495 5590. Fax (617) 496 6568. E-mail: mhansen@hbs.edu. We would like to thank Herminia
Ibarra, Rakesh Khurana, and Ezra Zuckerman for helpful comments and James Schorr and William
Simpson for help with the data analysis.
2
TITLE
So Many Ties, So Little Time: A Task Contingency Perspective on
The Value of Social Capital in Organizations
ABSTRACT
We used data from 67 new product development teams to test a task contingency perspective on
social network structure in organizations. Results showed that exploratory teams completed their projects
more quickly if they had a social network structure composed of many strong external ties that were non-
redundant. In contrast, teams pursuing tasks that exploited existing expertise took longer to complete if
they had this type of social network structure, mainly because external ties had to be maintained but were
not much needed for the task. The network position that was most beneficial for exploration tasks was a
liability for exploitation tasks. We propose that organization network theories of tie strength and
structural holes need to be broadened to reflect the effects of task differences, network costs, and
difficulties in getting others to help.
3
SO MANY TIES, SO LITTLE TIME: A TASK CONTINGENCY PERSPECTIVE ON
THE VALUE OF SOCIAL CAPITAL IN ORGANIZATION
When organizational scholars first examined the effects of informal social networks in the
workplace, much of the research highlighted the possibility that these networks undermined performance
(e.g., Roy 1952; Seashore 1954). This older research was also sensitive to many of the personal costs,
challenges, and normative requirements involved in building, maintaining, and extracting resources from
a personal network. For example, Blau (1964) and Gouldner (1960) argued that an individual’s ability to
maintain a tie and extract resources from another person depends on adherence to a norm of reciprocity
and membership in some relatively well-connected collectivity of which both actors are a part (Homans
1950; Kapferer 1969; Roethlisberger and Dickson 1939).
In contrast to this older research, more recent organization network research has focused on the
instrumental value of networks, treating informal relations as social capital to be harnessed in pursuit of
goals, such as garnering resources, gaining promotions, and completing tasks (e.g., Burt 1992; Gabbay
and Zuckerman 1998; Hansen 1999; Nahapiet and Ghoshal 1998; Podolny and Baron 1997). By focusing
on the instrumental value of social networks, however, recent research has not given much attention to
potential drawbacks of social ties (e.g., Adler and Kwon 1999; Gabbay and Leenders 1999). Individuals
and groups in an organization may benefit from receiving knowledge from network contacts, but their
work may also be hampered by time-consuming activities devoted to maintaining ties, helping others in
the network, and trying to get others to provide needed help. These network-related activities may
actually outweigh the benefits derived from network positions in some circumstances and should be
considered in analyzing the effects of social networks on performance-related outcomes. To address this
concern, we analyze both potential benefits and drawbacks of social networks. Our research question is,
under what conditions does an actor’s social capital in an organization enable or hinder the realization of
the actor’s performance-related goals?
4
We argue that the type of task pursued by the focal actor will determine whether the costs and
difficulties of cultivating and using certain network configurations will outweigh the knowledge benefits
derived from the same network attributes. This approach builds on some recent network research that has
recognized that the value of social networks is contingent on particular circumstances (Burt 1997;
Gabbay and Zuckerman 1998; Hansen 1999; Podolny and Baron 1997; Uzzi 1997; Walker, Kogut and
Shan 1997) and contrasts with a pure structuralist theory of social networks, in which the focus is almost
exclusively on the potential of the pattern of relations to explain individual and organization-level
outcomes (e.g., Brass 1984; Burt 1992). In focusing almost exclusively on patterns of relations, however,
the structural perspective has tended to ignore the costs and difficulties of building and using a network
and the different types of tasks involved. If the benefits of a particular pattern of ties were completely
independent of these factors, then the exclusive focus on network structure might be reasonable, but they
are not likely to be independent. While structural network theory provides a valuable baseline, we seek to
broaden the theory by analyzing the task-contingent effects of structural network variables.
We make three contributions toward a contingency perspective on social network structure. First,
we draw on March’s (1991) distinction between exploration and exploitation tasks to develop a
contingency argument. Tasks that involve a high degree of exploration, in that they depart from the
existing expertise of the focal organization unit, require different amounts, frequency and type of help
from the network than exploitation tasks, which depart very little from the existing competence base. The
exploration-exploitation distinction is of theoretical importance because it can be used to characterize
many different types of specific work tasks and hence is more encompassing than other contingency
variables that have been studied, including the complexity of knowledge flowing through social relations
(Hansen 1999) and whether tasks involve basic research or product development (Gabbay and Zuckerman
1998).
The second contribution is that we focus on the attainment of immediate work-related objectives.
While much existing research has focused on individual promotion opportunities (e.g., Burt 1997;
Podolny and Baron 1997), there has been little research extending the arguments to the accomplishment
5
of work tasks. Network structures that enhance job mobility may not necessarily enhance the realization
of immediate work objectives. For example, applying Granovetter’s (1973) weak tie argument about
finding a job, Hansen (1999) found that there was a positive effect of having weak ties on task
accomplishment in situations where the knowledge obtained through those ties were simple, but that this
effect turned negative when the knowledge obtained was complex. We contribute a more comprehensive
analysis of the effects of network structure on task accomplishment by including the effects of tie
strength, network size, and the degree of redundancy among contacts on task accomplishment.
The third contribution is the focus on team-level networks. While classical lab research on social
networks focused on within-team networks (e.g., Shaw 1964, 1971), there has been a dearth of subsequent
social network studies that have treated teams as the unit of analysis, even though teams have long been
considered important in organization theory. Part of the problem has been the collection of team network
data. For example, although Hansen (1999) analyzed teams, his study relied on inter-divisional network
data, which were not collected from team members. In contrast, we analyze the concept of an external
team network based on the aggregate of individual team members’ responses to questions about their
network relations to non-team members within their focal organization unit. We are therefore able to
extend existing research that has addressed the effects of individual-level tie strength and structural holes
(e.g., Burt 1997; Podolny and Baron 1997) to the team-level of analysis.
We test the task contingency view of network effects with an analysis of network data on 67 new
product development teams situated in a large computers and electronics company. We analyze the
effects of team-level network attributes on the ability of teams to complete their projects in a timely
manner.
NETWORK STRUCTURE--SOCIAL CAPITAL OR LIABILITY?
Organization network research has invoked the term “social capital” as an overarching concept
for understanding what features of an actor’s social relations are most conducive to the realization of that
actor’s objectives in organizations (see Nahapiet and Ghoshal 1998; Portes 1999). In reviewing the social
6
capital literature, Adler and Kwon (1999) found that many studies have analyzed relative benefits of
various network attributes but few have investigated the costs, risks, and problems associated with social
capital in organizations (for some exceptions, see Brass, Butterfield and Skaggs 1998; Gabbay and
Leenders 1999; Leana and Van Buren 1999). Once costs and other drawbacks of having social network
positions are considered, it is no longer obvious that networks represent a positive social capital. They
may instead be a liability in certain situations.
A dominant trend in social capital studies in organizations has been the analysis of structural
network variables, including network size, network sparseness, and tie strength. For example, scholars
have found that individuals with large and broad networks have more power in the organization (e.g.,
Brass and Burkhardt 1992; Ibarra and Andrews 1993). Studies have also focused on the instrumental
benefits of having sparse or non-redundant networks (i.e., there are few ties between contacts in a
person’s network), finding that they lead to faster promotion (Burt 1992 and 1997) and higher ability to
switch careers (Higgins 1999). Studying the effects of tie strength, Granovetter (1973) originally showed
that weak ties were instrumental in getting a job, but researchers have since pointed to several values of
strong ties, including transfer of tacit knowledge (Hansen 1999), exchange of fine-grained information
(Uzzi 1997) and help in building coalitions (Krackhardt 1992). Considering all three dimensions, Burt
(1992) argued that the network structure most conducive to the realization of an actor’s objectives is one
that is composed of many strong bridging ties. According to his structural hole theory, sparse networks
are especially beneficial because each contact serves as a bridge to non-redundant sources of information.
Moreover, Burt argued that, controlling for the extent to which a tie is a bridge, strong ties are more
valuable for actors in gaining resources compared with weak ones, because they facilitate both higher
volume and higher quality of information flow.
In short, a number of organization network scholars in the structuralist network tradition have
highlighted the positive value of social capital in the form of a network composed of many strong and
non-redundant ties. This structuralist thesis provides a valuable baseline in that it is formulated a
relatively high level of abstraction and therefore can be applied equally well across different organization
7
contexts (e.g., Burt 1992). The downside to this high level of generality is the neglect of important
features of particular contexts that modify the basic thesis. We consider two related issues in the
organizational context.
First, having direct relations with others typically involves spending time building and
maintaining these relationships, as well as time helping others in the network. Such activities can be
labeled costs (or investments), because they involve discrete time-consuming activities during one time
period that may have a positive return in subsequent periods. Organization network scholars have not
fully considered the effects of such network costs but instead have limited their discussion to a
consideration of the opportunity costs of different network positions. For example, because having direct
ties involves costs, a redundant network tie can be substituted with a tie that yields more non-redundancy,
thus leading to a more optimal network. However, both types of direct ties, whether redundant or not,
involve time devoted to networks, which may be time not spent on completing one’s own work. Once
costs are considered, a network structure composed of many strong ties may not always be valuable.
Second, getting help from network contacts may be a non-trivial issue, especially in sparse
networks. As the works of Coleman (1990), Portes and Sensenbrenner (1993), and Uzzi (1997) suggest,
one actor’s ability to secure resources from another depends on the extent to which the two are part of
some broader common collectivity in which there is some pressure to help others in the collectivity. For
example, Portes and Sensenbrenner used the term “enforceable trust” to refer to a focal actor’s ability to
rely on common third parties to punish that other actor if he or she does not assist the focal actor in the
pursuit of the focal actor’s objectives. By definition, sparse networks have few such third-party ties (i.e.,
there are few ties between an actor’s contacts), leading to difficulties in getting others to help. Because of
this problem, sparse networks may not always be valuable.
The issues of costs and difficulties raise the question of whether a network structure composed of
many strong and non-redundant ties will hinder the realization of an actor’s performance-related goals in
some circumstances, and hence become a liability. The type of task pursued by an actor informs this
issue.
8
TASK CONTINGENT EFFECTS OF SOCIAL NETWORKS
Exploration versus exploitation
Depending on the work-related tasks they pursue, focal actors (i.e., individuals and groups) in
organizations rely on various types of knowledge from their network to complete their work. Tasks that
involve a high degree of exploration, in that they depart from the existing expertise of the focal actor and
the focal organization unit, require different types and amounts of knowledge than exploitation tasks,
which depart very little from the existing competence base in an organization unit. Exploration involves
problems that are novel to the focal actor and to other people in the focal organization unit (Benner and
Tushman 1999; Levinthal and March 1993; March 1991). Because the task is novel, a focal actor may
benefit from using network contacts to discuss ideas, exchange views, and brainstorm with them (cf.
Nonaka 1990; Sutton and Hargadon 1996). Although the task is novel for network contacts as well, they
may possess analogous experience which they can draw on to provide insight and suggest possible
avenues for identifying viable solutions.
Furthermore, because the task is novel, much of the knowledge involved in exploratory tasks is
likely to be tacit, that is, it is difficult to articulate or can only be acquired through experience (Hansen
1999; Nelson and Winter 1982; Polanyi 1966; Von Hippel 1988:76, 1994).1 In contrast, much of the
knowledge involved in exploitation tasks is likely not to be tacit (i.e., explicit), because the focal actor has
much of the expertise required and hence is likely to understand the problem, possible solutions, and the
causal mechanisms among the parameters involved in the task. However, actors engaged in exploitation
tasks may still benefit from obtaining knowledge through their network contacts. They may be able to
obtain existing, complementary knowledge that avoids duplication of effort (Teece 1986). For example, a
product developer that obtains an existing software code from a network contact may save several months
of work.
Moreover, exploration tasks are unpredictable in that a focal actor cannot easily predict when and
how frequently he or she needs to consult contacts to obtain knowledge. An actor may meet a network
9
contact once to talk about a novel idea, but they may need to meet again several times because they could
not foresee the development path of the idea. In contrast, in exploitation tasks, the focal actor has a good
understanding of what knowledge is needed to complete the work and therefore knows better when and
how frequently he or she needs to consult contacts to obtain knowledge. In short, actors pursuing
exploration tasks are likely to benefit by obtaining tacit and novel insights from network contacts and by
having immediate and repeated access to network contacts. In contrast, actors pursuing exploitation tasks
do not need to obtain large amounts of knowledge through their network but are likely to derive some
benefits from obtaining existing, explicit knowledge that avoids duplication of effort. These differences
between exploitation and exploration tasks have implications for the value of having many, strong, and
reciprocal ties.
The contingent effects of rich networks
Actors that are engaged in exploratory tasks are likely to benefit from having a network
composed of many, strong and reciprocal relations (hereafter called a rich network). Strong established
relations (i.e., frequent contact and close relations) are beneficial for exploratory tasks, for two reasons.
First, the exchange of tacit knowledge between two individuals is likely to be more effective in strong
than weak ties. Strong ties often mean that the parties to the relationship have established heuristics for
working together and understanding each other’s ways of expressing ideas and thoughts (Hansen 1999;
Uzzi 1997). Thus, in a strong tie, even if actors do not know much about the particular knowledge
involved, they can discuss subtle problems and vague approaches with less risk of misunderstanding each
other. Second, because the need for exchanging ideas may occur at unpredictable times in exploration
tasks, actors need quick and easy access to others willing to engage in discussions at a moment’s notice.
Strong ties afford faster and greater access to such unplanned requests for interactions because contacts
have a greater motivation to assist (Granovetter 1982; Krackhardt 1992). In contrast, in exploitation tasks,
the knowledge involved tends to be well-understood, and actors do not need established heuristics and
frequent interactions to exchange it.
10
In addition, actors pursuing exploratory tasks may benefit from having spent time in the past
helping others. A track record of reciprocal helping activities is likely to create an obligation on the part
of others to assist the focal actor (Gouldner 1960). This assistance is valuable in exploratory tasks because
of the need for quick and unpredictable access to others to obtain advice and exchange ideas. As Uzzi
(1997) found in his study of embedded ties in the apparel industry, extra effort was voluntarily given in
reciprocated ties. The benefits of having invested in reciprocal helping behaviors are less valuable in
exploitation tasks, however, because there is less need for extra and immediate efforts given by other
people, who only need to spend a few moments to pass on knowledge that is well understood by both
parties.
Actors pursuing exploratory tasks are also likely to benefit from having a relatively large number
of direct ties. Controlling for the redundancy among contacts, large networks afford more advice and
possible solutions to exploratory problems than do small networks, simply because there are more people
with whom the focal actor can brainstorm and exchange views (at some point, however, very large
networks may be counter-productive by creating a problem of assimilating numerous advice, solutions,
and ideas). This positive value of large networks is likely to be less for actors engaged in exploitation
tasks, however, because they do not benefit from considering a range of ideas and possible solutions
afforded by large networks. They already have a good understanding of what knowledge is needed and
are likely to only need a relatively small set of contacts to obtain existing, complementary knowledge that
avoids duplication of effort.
In short, the benefits of having a rich network characterized by many strong ties and extensive
reciprocity are greater for exploratory than for exploitative tasks. However, this network position comes
at a cost. First, strong ties necessarily require greater time and effort to maintain compared with weak ties.
Frequent interactions involve greater time devoted to maintaining networks, while close ties involve
higher levels of emotional intensity and thus require more energy than do distant relations (cf. Marsden
and Campbell 1984). Second, an adherence to a norm of reciprocity implies that the focal actor forgoes
the immediate pursuit of his or her own objectives in order to assist others in the pursuit of their
11
objectives. In a given time period, a focal actor that sets aside time to help another is likely to spend less
time pursuing the completion of his or her own work during that time period.2 Third, having many direct
ties is also more costly than having few, because the relations need to be maintained, even if they are
weak. More time is likely to be spent staying in touch and interacting with others to the extent that an
actor has many contacts. Thus, there are likely to be substantial costs involved a network position of
many strong and reciprocal ties.
In highly exploratory tasks, the benefits of having a rich network are likely to exceed the costs of
this network position, as shown in figure 1. The reason is the difference between the net value of rich
networks (the upper-right quadrant in figure 1) and the problems associated with non-rich networks
(lower-right quadrant in figure 1). A network of few, weak and non-reciprocal ties creates a knowledge
deficit for exploratory tasks, because the actor not only lacks the required expertise at the outset but also
cannot obtain much of it through this type of network. We therefore predict that there is a net positive
value of having rich networks in exploratory tasks:
Hypothesis 1a: In exploration tasks, rich networks (many strong and reciprocal ties) positively
affect the realization of immediate performance-related objectives.
For exploitation tasks, we predict that the costs are likely to outweigh the benefits. The benefits of having
a network of many strong ties and extensive reciprocity are much less than in exploration tasks, but the
costs of rich networks are the same for both types of tasks (compare upper-left with lower-left quadrants
in figure 1):
Hypothesis 1b: In exploitation tasks, rich networks negatively affect the realization of immediate
performance-related objectives.
-------- Insert Figure 1 about here --------
The contingent effects of network sparseness
In exploratory tasks, actors benefit from tapping into diverse knowledge. Because the task is
novel, there is likely to be more than one viable solution to the problem, implying that there is a benefit in
searching for and considering a broader set of alternatives. A diverse network is likely to be beneficial
12
because contacts are likely to offer a range of distinct knowledge, ideas, and views (cf. Burt 1992; Uzzi
1997). In contrast, in a dense network, contacts know one another and are hence likely to circulate the
same knowledge among themselves. Moreover, a very dense network—one where everybody is
connected--is likely to be closed off from the outside, making it hard for new knowledge, such as new
ideas and different kinds of insights, to penetrate the network. Such networks may therefore be ossified,
steeped in traditional ways of solving tasks and possessing little new knowledge (Uzzi 1997). Actors with
very dense networks may therefore find it difficult to receive valuable insights from the network to
complete exploratory tasks.
Although exploration tasks are likely to benefit from a sparse network because of diverse
knowledge, such a network position also involves the problem of enforcing a norm of cooperation.
However, the benefits of sparse networks are likely to outweigh the drawbacks when tasks are
exploratory, as shown in figure 2. While an actor in a sparse network benefits from diverse knowledge but
also faces the problem of enforcement (lower-right quadrant in figure 2), an actor in a dense network not
only lacks access to diverse knowledge but also has to maintain costly relations to redundant contacts
(upper-right quadrant in figure 2). The latter situation is therefore likely to be less beneficial than the
former one. Thus, we predict that actors pursuing exploratory tasks derive a net positive value from
increasing sparseness in the network:
Hypothesis 2a: In exploration tasks, network sparseness positively affects the realization of
immediate performance-related objectives.
The discussion so far points to the positive consequence of having sparse networks in exploratory
tasks. There is much less benefit of tapping into diverse knowledge in exploitation tasks, however,
because the task is well understood and can be executed without considering a range of ideas and
potential solutions that can be obtained through sparse networks. Absent this benefit of sparse networks in
exploitative tasks, the question becomes whether a sparse or dense network returns the most value.
However, both very dense and sparse networks may lead to problems in exploitative task situations, as
shown in figure 2 (compare upper-left with lower-left quadrants). As Uzzi (1997) argued, while there may
13
initially be some positive returns in shifting from a very dense network to one that is somewhat sparse,
there will at some point be diminishing returns from increasing sparseness. At relatively high levels of
sparseness, the returns to added sparseness may be negative, because it will be more difficult for the focal
actor to obtain knowledge from contacts when there are no third-parties available to enforce the norm that
contacts ought to help the focal actor by providing knowledge (Coleman 1990; Portes and Sensenbrenner
1993). Thus, because the end points of the sparseness dimension creates problems, we expect that actors
pursuing exploitation tasks benefit most by having a medium level of sparseness in their network:
Hypothesis 2b: In exploitation tasks, there is an inverted U-shaped relationship between network
sparseness and realization of immediate performance-related objectives.
-------- Insert Figure 2 about here --------
By considering costs and problems of network positions relative to the benefits they provide, we
have argued that the net value of networks depend on whether actors pursue exploration or exploitation
tasks. While we predict that exploration tasks attain a net positive value from having a rich and non-
redundant network, this position is likely to have negative consequences for exploitation tasks.
METHODS
Setting
To test our hypotheses we studied 67 new product development teams located in a large,
multidivisional electronics and computer company. These teams represent the focal actors in our
empirical analysis. The company, with annual sales of more than $5 billion, is a highly decentralized firm
engaged in developing, manufacturing, and selling a wide range of electronics and computing products. In
preparation for systematic data collection on project teams in the firm, we visited 14 divisions and
conducted initial open-ended interviews with more than 50 project engineers and managers. These
interviews helped us better understand the context and develop survey instruments that would allow us to
test our hypotheses about the effects of networks on team performance.
14
The new product development projects we studied involved products primarily for industrial
markets and typically entailed development of both hardware and software. Projects frequently began
with a product idea and the opening of a budget account. Once an account was open, there were informal
interactions with other departments, such as marketing, and with other people in the division to obtain
advice and exchange ideas. After some investigation and preliminary work, project teams presented
proposals in front of key managers. This was the only formal review meeting for projects in this
company. If the group approved the project and plan, which included a proposed budget and schedule,
the project proceeded.
After approval of the project, obtaining advice and exchanging ideas remained important
activities. Established advice relations enabled team members to obtain knowledge from other product
developers and functional specialists in marketing and manufacturing within the organization (cf.
Eisenhardt and Tabrizi 1995; Henderson and Cockburn 1994). However, network activities were not
without drawbacks. Some engineers spent a considerable amount of time working on other projects,
mainly helping solve specific technical problems. One manager whom we interviewed complained that
some of his engineers were too keen on working on interesting technical problems, regardless of whether
they occurred in their own projects. While beneficial for some projects, these activities also made it
harder for some engineers to make good progress on their own projects. In addition, engineers spent
considerable time maintaining their relationships. They frequently interacted informally across teams to
talk about projects, including new problems, opportunities, technical specifications, market demand, and
product updates. While some of these activities were related to specific project work, many of them were
not but nevertheless involved time to stay in touch with others and keep on top of new technology trends.
Thus, networking activities were not by-products of ongoing work but involved discrete time-consuming
activities.
Data and Methods
To keep the data collection and analysis manageable, we analyzed the within-division networks
for teams located in 25 different divisions, allowing us to test our predictions in 25 different sub-
15
organizations that share some common characteristics, such as the same top manager and formal reporting
structures. The divisions ranged in size from 100 to 900 people, permitting a focal person to develop
extensive network relations even in the smallest division. Although there were a number of network
contacts spanning divisions (see Hansen 1999), teams had relatively more contacts within the division.
This is not surprising since there are almost invariably more dense social relations within a boundary than
across that boundary (Deutsch 1953). Thus, the focal division provided an appropriate membership
boundary for our study (cf. Marsden 1990).3
We first created a list of all projects that the divisions in our sample undertook during a period of
three years. We limited the study to three years because it was problematic to collect data further back in
time. Because including only successfully completed projects may bias the results, we also included both
canceled projects and projects still in progress.
We administered two surveys: a survey for the project managers of the product development
projects included in the study, and a network survey to all project engineers and project managers
working on these projects. The two surveys were sent out sequentially. The first step was to send the
project survey to the project manager of the project, asking about characteristics of the project, including
starting and ending times. The project managers of 120 projects returned their surveys, yielding a
response rate of 85 percent. The second step was to administer the individual network survey, designed as
a computerized survey on a floppy disk in which respondents answered various questions about contacts
in their network. We submitted a packet of individual network surveys to each project manager, asking
him or her to distribute the surveys to the individual engineers on the team and to complete one him- or
herself. At this point, 22 project managers decided that their teams should not fill out the network surveys
and consequently did not distribute the individual surveys to the teams. There were no significant
differences between these 22 projects and the remaining 98 projects with respect to project size and
completion time (for completed projects). Among the remaining projects, 510 surveys were distributed,
and 259 (51 percent) were returned.
16
Because we wanted to have sufficient information on a team’s network relations, we only
included projects with at least a 50 percent response rate for the network survey. Thus, we ended up with
67 projects (with an average network survey response rate of 74 percent). Two of these projects were
cancelled, and 13 were still in progress at time of data collection. As Table 1 shows, there were no
significant differences between the 67 included projects and the 53 excluded projects with respect to
budget size, extent of use of existing software and hardware (existing “ware”), degree of exploitation, and
completion time for completed projects. There was a significant difference in the number of people. The
average number of people is slightly larger in the omitted group (6.37) than in the final sample (5.39),
although the difference is not large. Thus, there is most likely not a selection bias in the final sample of
projects.
--------- Insert Table 1 about here ----------
We merged the project data with the individual network data by assigning an engineer’s network
relations to the project on which he or she worked. We only included network ties that existed prior to the
start of the project, because we wanted to ensure that the network variables were measured prior to the
measure of the dependent variable. We relied on methodological standards that have been followed by
Burt (1992:173, 1997) and Podolny and Baron (1997). For example, Podolny and Baron (1997) first
asked respondents to indicate the duration of a network tie and then only included ties that had been in
existence prior to the occurrence of a promotion, which was their dependent variable. Similarly, we asked
respondents how many years each of their network ties had been in existence and then only included ties
that they said existed prior to the start of their project.
The potential bias in this approach is that it may exclude some relations that existed prior to a
project’s start but that ceased to exist by the time the respondents filled in the survey. If these relations are
prevalent, then there should be fewer relations for projects that were started in 1993 (the first year of
observation) than those started later (in 1994), because more ties are likely to have ceased to exist during
this relatively longer time span. The number of reported team ties, however, is fairly similar between
17
projects that were started in 1993 and 1994 (4.4 and 4.5 team-level advice relations outside the team,
respectively, with no significant difference in t-test of means; t=.13 and p=.89, with equal variance). This
similarity is partly due to the fact that individuals in the company tended to have long established
relations, with a reported average duration of six years. Thus, there is not likely to be a bias resulting from
missing information on recently disbanded network ties in the data set.
Dependent and Independent Variables
Project completion time. We focused on project completion time to measure teams’ realization
of immediate performance-related goals. While there were other dimensions of teams’ degree of goal
achievement, completion time was a critical factor because the resulting products had to be marketed in a
timely manner to be competitive in the electronics and computer markets into which they were launched
(cf. Eisenhardt and Tabrizi 1995). Late project teams were typically seen by managers as being poor
performers, and very late projects were seen as failures because the teams missed important market
opportunities. However, teams could not trade off other performance dimensions, such as product quality
(e.g., few software bugs), for faster completion, because there were quality standards in place to ensure
that marketed products met certain standards. Project completion time was therefore an appropriate
measure of the teams’ immediate performance-related goals.
We measured project completion time as the number of months from the start of concept
development to the time of market introduction for a given project (or time to the end of the study period
or cancellation for ongoing and canceled projects, respectively). We defined starting time as the month
when a dedicated person started working part or full time on the project, which typically coincided with
the time a budget account was opened for the project. We defined the end date as the date on which the
product was released to shipment, which is a formal milestone date in this company because it signifies
that the product is ready to be manufactured and shipped on a regular basis. These definitions turned out
to be very clear and provided few problems in specifying the starting and finishing times.
18
Scholars have proposed two other measures of project speed. First, completion time can be
measured as the extent to which the project is finished on schedule (e.g., Ancona and Caldwell 1992). The
assumption in this measure is that inherent project differences are accounted for by the original schedule,
but also that everybody sets equally ambitious schedules. These conditions were unlikely to be true in
this company, where individual project managers set their own targets. Moreover, it may not be an
objective measure: Cyert and March (1992) proposed that targets such as schedules are often adjusted
according to expectation and experiences and hence become subjective indicators. A second approach to
measuring project speed involves grouping projects by some similarity measure and then assessing a
project's deviation from the mean completion time of the group of similar projects (Eisenhardt and Tabrizi
1995). The difficulty with this approach is that it depends on a clear similarity measure, which was not
possible to obtain in this setting. Furthermore, the projects included in this study did not span several
industries but were confined to one 4-digit SIC code. Thus, their inherent differences were not as large as
those in samples where the mean-deviation measure has been used (e.g., Eisenhardt and Tabrizi 1995).
Instead, we used the number of months to complete the project as the dependent variable and then added
project-specific variables to control for differences between the projects.
Network size. To get information on contacts in an individual’s advice network, we asked
respondents, “Looking back over the last year, are there any persons in your division from whom you
regularly sought information and advice to help your project work?” The respondents were asked to enter
the last and first names of the contact and were allowed to name up to five advice relations.4 We asked the
respondent how long each advice relation had been in existence and only included advice ties that existed
prior to the start of the project and that were between a team member and non-team members in the focal
division. The size of a team’s advice network was computed by taking the team’s number of non-
duplicate contacts (outside the team) who were listed as a regular source of advice before the start of the
project (network size).
We relied on several assumptions in aggregating individual relations to team-level networks. Our
approach is illustrated in figure 3 for two individuals, John and Jim, who together constitute a project
19
team. The top half of the figure shows the individual networks (by graph and matrix; network data are
treated as symmetric), and the lower half of the figure depicts the aggregated team network. John has
three network contacts, and he reports one indirect tie between them (between Mary and Tim). Jim also
has three network contacts and reports one indirect tie as well.
The first step in constructing the team-level network data was to divide the ties into those
between team members and those between a team member and outside people. Because John and Jim are
in the team, the tie between them is counted as a within-team tie and is excluded from the team-level
advice network (we include within-team ties in a control variable). The second step accounted for
duplicate ties. Because both John and Jim have ties to Mary, those ties are counted as one in the team
network.5 The third step was to add up non-duplicate ties. The team illustrated in the figure is recorded as
having direct advice ties to three people (Tim, Laura, and Mary) and thus has an advice network of three
ties.
---------- Insert Figure 3 about here ----------
Network sparseness. We followed the procedure adopted by Burt (1992 and 1997) and Podolny
and Baron (1997). We asked the team members whether they thought there was a tie between each pair of
contacts (i.e., indirect ties) they had listed in their egocentric advice network. The computerized survey
prompted the respondent to assess such a tie by generating a list of all possible pairs in his or her advice
network. There are two important assumptions in this approach. First, we assume that the reporting on
indirect ties was not systematically biased across teams, so that members from one team were not more
biased in their reporting of indirect ties compared with members from another team (cf. Krackhardt and
Kilduff 1999).The second assumption concerns unknown data among contacts. Because we do not fully
know the extent of indirect ties, we relied on the number of indirect ties that were known in our
egocentric network data. In the example in figure 3, we do not know whether Tim and Laura have a tie
between them because neither Jim nor John were asked to assess whether such a relationship existed (they
were only asked to assess indirect ties between contacts they had named in their own individual network).
20
The area in the figure marked “not reported” indicates the number of ties in the matrix that are not known.
There is no reason to believe, however, that the extent of indirect ties for unreported contacts should
differ systematically from the extent of ties for reported contacts. Respondents did not underreport on
these ties; they were simply not asked to assess whether they existed. We therefore made the assumption
that the proportion of indirect ties among the possible number of indirect ties that are unknown equals the
proportion of estimated indirect ties among the possible number of indirect ties that respondents were
asked to assess. We used the maximum number of indirect ties that could have been reported, given the
number of individual responses among team members. This maximum number is given by:
Adjusted maximum number of indirect ties = N*(N-1) / 2 - x*(x-1)/2 - y*(y-1)/2
where N is the number of individuals listed in the team network matrix as depicted in the figure (five
individuals), x is the number of team members in this matrix (John and Jim), and y is the number of
contacts who were named by different respondents; hence, respondents were not asked to assess whether
ties existed between these pairs of contacts--Tim and Laura in figure 1. To arrive at the measure, we
divided the number of reported indirect ties by this maximum score and subtracted this proportion from 1
to measure sparseness, not density (network sparseness):
Network Sparseness = 1- (no. reported indirect ties/adjusted maximum number of indirect ties)
Finally, to test for a curvilinear relationship, we squared the standardized value of this variable
(sparseness-squared).
Tie Strength. To measure the strength of relations of the task-advice ties, we asked about the
closeness and frequency of contact that the respondents had to the named sources of task advice.
Closeness was assessed by a 4-point scale (with anchors, “distant” and “especially close”): “ how close
are you to [name of person in network]?” Frequency was assessed by a 7-point scale: “How often do you
communicate with [name]?”, with anchors “less than once a month” and “several times a day.” We took
21
the average reported closeness and frequency for the number of advice ties reported by the team (tie
strength).6
Reciprocal helping behavior. Our initial discussions with engineers and managers in the
company suggested that engineers engaged in three somewhat different behaviors to induce social
obligations of reciprocity (Ekeh 1974). First, some engineers in the company helped others, with the
implicit understanding that they would be seen as good colleagues and be helped by someone some time
in the future. Second, some engineers attempted to take the interest and goals of others into consideration
when they asked for support for their own project. For example, some engineers on a project sometimes
considered how their new product development effort could be timed to fit the staffing requirement of
another project. Third, other engineers were somewhat more explicit, helping others but making it
understood that they expected help by the same person sometime in the near future. These behaviors can
be seen as representative of both dyadic reciprocity (i.e., helping another with the expectation that the
particular other will offer help in the future) and generalized reciprocity (i.e., helping another with the
expectation that some one will offer help in the future).
To capture these different behaviors, we asked the respondents to indicate, on a six-point scale
(with anchors of “never” to “very frequently”), how often they engaged in the following behaviors: (1)
“Help others whose support or help you need?”; (2) “think about the interests and goals of others in trying
to obtain their support for your project?”; and (3) “offer help to others with their work if they will help
your project work?” To compute the overall reciprocity behaviors for a team we took the value reported
by a team member for each item and then computed the average value (reciprocal helping). Because the
Cronbach Alpha for this scale was not high (0.62), we also ran models with each of the three dimensions
entered separately.
Degree of project exploitation. We used a four-item scale to capture the extent to which a given
project was similar to the focal division’s existing technical and market expertise and therefore could
exploit that expertise (see Olson , Walker, and Ruekert 1995). The project manager was asked to answer
four questions on a 7-point scale (1= None of the required expertise, 4 = Half the required expertise, 7 =
22
All of the required expertise): (1) Prior to this project, how much experience did your team have with the
technologies and technical competencies that the project required? (2) Prior to this project, how much
experience did your team have with the market for which the product was developed? (3) Prior to this
project, how much experience did your division have with the technologies and technical competencies
that the project required? (4) Prior to this project, how much experience did your division have with the
market for which the product was developed? We computed the measure by taking the average of the
scores for the four questions (degree exploitation). The Cronbach Alpha for this scale is 0.85.
No project manager reported that the team had substantial expertise but the division had not,
while seven project manager reported that the team had little of the required expertise but the division had
substantial expertise. The similar responses for project- and division-level expertise suggest that division
managers were able to staff the projects with the division’s engineers who had the most relevant expertise
for the project. This confirms our field interviews, where we were told that the most important staffing
criterion was the matching of the engineers’ skills to project requirements. Thus, the four items on the
scale indicate the same underlying construct--the extent to which the focal project task departed from the
division’s existing competence base (we conducted separate analyses using only the two project-level
items, but we found no significant differences in the results and therefore do not report these additional
results).
To test for the contingent effects of exploitation vs. exploration, we interacted the exploitation
variable with tie strength, amount of reciprocal helping, network size, and the network sparseness
variables. The construction of the interaction term including exploitation and the network sparseness
variables were more complicated than a simple two-way interaction term because our hypotheses imply
that three variables need to be interacted (i.e., exploitation, sparseness, and sparseness squared). We chose
to model this as a step function in order to make the interpretation of the results easier. We divided the
degree of exploitation into three segments: projects in the upper third on the exploitation scale—highly
exploitative projects (exploitation 3rd); projects in the middle third on the exploitation scale (exploitation
2nd); and projects in the lower third on the exploitation scale—highly exploratory projects (exploitation
23
1st).7 We constructed three dummy variables which took on a value of 1 if the focal project belonged to
the segment, and 0 otherwise. The dummy variables were then interacted with the two network sparseness
variables.
Control variables
Project type. To make the projects comparable, we controlled for several project-specific factors.
We used the log of estimated dollar costs at the start of the project to control for size and scope
differences between the projects (budget). In our field interviews with project managers, we were also
told that estimated costs capture inherent differences in technical complexity among the projects (the
more complex the technology, the more engineering hours billed to the project). We used the budget
figure to avoid confounding final costs and the dependent variable. High final costs may reflect long
completion time because of more engineering hours billed to the project.8 We also created a variable that
measured the extent to which the project team was able to reuse existing software code and hardware
components within its division. The project manager was asked to indicate the percentage of existing
software and hardware that were reused from the focal division (existing ware).
Divisional control. Because the projects were drawn from divisions of varying sizes, we entered
a control variable measuring the sales for the respective divisions (divisional size). Teams may have
different networks depending on the size of the organization. For example, it is possible that teams in
large subunits have larger networks, simply because there are more people with whom team members
could build relations. We therefore controlled for this possible source of variation. Data on sales were
obtained from a company-specific financial database.
Respondents. To control for the possibility that a team’s number of advice relations is caused by
the number of team members who responded to the survey, we included a measure of the number of team
members who completed the survey (number respondents). We also controlled for differences in
experience among project teams by including the average years of employment in the company among
the team members (team tenure). This variable also reflects variations in skill levels among teams because
24
expertise in project work was to a significant degree a function of the number of times engineers had
worked on projects in this company. Finally, we entered a control for the proportion of advice relations
within the team (within-team density), to control for the possibility that a team’s network size is simply a
correlate of the number of relations among the team members. This measure was computed the same way
as we computed a team’s external advice relations, except that we only included ties between team
members. We took the number of reported advice relations among team members, divided by the total
possible number of relations among them (counting asymmetric relations). Thus, a team’s network of
relations is decomposed into a within-team network and an external team network.
Statistical analysis
The statistical analysis of completion time was complicated by the fact that 13 of the 67 projects
were still ongoing at the time of data collection and represented right-censored cases (Tuma and Hannan
1984). Furthermore, two projects were canceled. To incorporate these cases into the analysis, we
analyzed the time to completion using a hazard rate model. The hazard rate is a measure of the likelihood
of a project either completing or terminating at time t, conditional on it not having completed or
terminated before t. The higher the transition rate, the more likely that the project will be completed
faster. The hazard rate model takes the following form:
r(t)j = r(t) j * exp[aXj],
where r(t) j is the completion rate of project j, t is project time in the risk set, and r(t) j* is the completion
rate including the effects of all the control variables in the model. The effects of the independent variables
are specified in the exponential bracket. X is a vector of explanatory variables, and a is vector of
corresponding coefficient estimates.
We used maximum likelihood estimation as implemented in the statistical program TDA
(Blossfeld and Rohwer 1995). We used the piecewise exponential specification because we did not want
25
to make any assumption about duration dependence that would require a specific parametric distribution.
To control for duration dependence, the model included four time periods that reflect the time-distribution
of events; the interval marks are 200, 300, 400, 500 and 650 days.9 The transition rate is assumed to be
constant within these periods, and covariates are assumed not to vary across time periods (Blossfeld and
Rohwer 1995:114).
RESULTS
Descriptive statistics are shown in table 2, and the results of the hazard rate analysis are presented
in table 3. Because we include several interaction measures that involve the degree of project exploitation,
we standardized the relevant variables to avoid problems of multicollinarity among the main variables and
the interaction terms (the results reported in table 3 remain the same if non-standardized values are used).
Model 1 in table 3 presents the baseline model with all the control variables and the main effects for the
three main structural network variables we have considered (i.e., network size, tie strength, and
sparseness). The network size variable is positive and significant throughout the models in table 3. The
main effect for tie strength is also significant and positive, but the network sparseness variable is not
significant in model 1. Thus, this baseline model shows that teams with many strong ties took shorter
time to complete their projects than teams with few and weak ties. However, as the subsequent models
demonstrate, this baseline does not hold for exploitation projects.
---------- Insert Tables 2 and 3 about here ----------
In models 2 through 7, we entered the variables relating to the richness of the teams’ networks.
The first set of results concerns tie strength. The main effect of tie strength is positive and significant,
while the interaction term including tie strength and exploitation is negative and significant in models 2
through 7. The two effects must be seen together, as follows (from model 7):10
Rate = exp [0.632*tie strength – tie strength*(0.737*exploitation)].
Because the variables are standardized (observed value minus mean, divided by standard deviation), the
relative effects can best be seen through a plot of the results, as shown in figure 4. For exploitation
26
projects (one standard deviation above the mean on the exploitation scale), the stronger the ties, the lower
the completion rate (i.e., the longer the completion time). For exploration projects (one standard deviation
below the mean on the exploitation scale), the stronger the ties, the faster the completion rate. Although
the magnitude of the effect for exploration projects is quite high, as shown in figure 4, there is also a
substantive decline for exploitation projects. For example, a change in tie strength of two standard
deviations implies a reduction of the completion rate from 1.11 to 0.90, a drop of 19%. In short, these
results lend support to hypotheses 1a and 1b, that strong ties are beneficial for exploration projects but
harmful for exploitation projects. We also ran separate models including only one of the two dimensions
of tie strength—frequency and closeness. These results (not reported here) showed that the magnitude of
the negative coefficient for the interaction term was twice as large for frequency than for closeness. That
is, there was a much larger negative impact of having frequent than close ties for exploitation projects.
This was most likely the case because maintaining frequent interactions is likely to be more time
consuming than maintaining close ones.
The results for the interaction term including amount of reciprocal helping and degree of
exploitation is entered in models 3 through 7. This variable is not significant in any of the models, but the
main effect for the amount of reciprocal helping remains significant and negative in all models. The lack
of significant result for the interaction term and the significant estimate for the main variable hold even
when we ran separate models for the three sub-items of the reciprocity variable. Teams whose members
engaged in the three reciprocal helping behaviors took longer time to complete their projects, regardless
of project type. This surprising and interesting result indicates that helping others has a negative effect on
completing one’s own work in a timely manner, although such helping may benefit others, as we discuss
below.
The variable interacting network size and degree of exploitation is entered in models 4 through 7
in table 3. The effect of the interaction variable is negative and significant throughout the models, while
the main effect for network size remains positive. These two effects must been seen together (from model
7): 11
27
Rate = exp [0.671*network size – network size*(1.023*exploitation) ].
Figure 5 shows the combined effect of network size and the interaction term for exploitative and
exploratory projects. As the plots reveal, exploratory teams had higher completion rate with increasing
network size, while exploitation teams had lower completion rate with increasing network size. These
results confirm hypotheses 1a and 1b, that large networks are beneficial for exploratory tasks but harmful
for exploitative tasks. These findings must be seen in context of the range of the network size variable
(which ranges from 1 to 17 team-level advice ties). First, because no teams in the sample had zero ties, we
cannot infer that exploitation teams were better off having no ties. Second, because we limited the
maximum number of advice ties to five for each respondent on a team, there is an upper boundary limit
on a teams’ reported network size. Thus, we cannot infer from the results that exploratory teams with very
large networks were better off. It is possible that exploratory teams with very large networks experience
problems in maintaining many ties, but our results cannot test for this possibility.
In short, the results for the network richness variables show that exploratory teams took less time
to complete their projects to the extent that they had many strong ties, while exploitation teams with many
strong ties took longer time to complete their projects. These findings support hypotheses 1a and 1b.
However, both types of project teams took longer to complete their projects to the extent that their
members engaged in reciprocal helping behaviors.
---------- Insert figures 4 and 5 about here ---------
We entered the effects for the network sparseness variables in models 5 through 7. First, in model
5, we added the squared term for the network sparseness variable (but did not interact it with degree of
exploitation). When the squared term is entered, the effect for the main sparseness variable becomes
positive and significant, while the effect for the squared term is negative. Thus, there is an inverted U-
shaped relationship between network sparseness and completion rate. In models 6 and 7, we entered the
network sparseness variables for each of the three segments of exploitation.12 The curvilinear relationship
holds for highly exploitative projects (i.e., projects in the upper third on the exploitation scale) and
28
medium exploitative projects (i.e., the middle third on the exploitation scale), but not for exploratory
projects (i.e., the lower third on the exploitation scale). Thus, highly exploitative teams took less time to
complete their project if they had a medium-level of network sparseness. The plot in figure 6 shows that
exploitative project teams that went from a very low level of network sparseness (i.e., high density) to a
medium level of sparseness completed their projects more quickly. Beyond a medium level of network
sparseness, however, exploitative project teams took longer to complete. The turning point is 0.6 standard
deviation below the mean level of network sparseness (at this point, teams had a density of 40% of the
maximum possible indirect ties in their egocentric team network). This result lends support to hypothesis
2a, that there is an inverted U-shaped relationship between network sparseness and the realization of
immediate performance-related goals for exploitation teams.
While the curvilinear relationship between network sparseness and completion time did not hold
for exploratory projects, the effect for the main variable of network sparseness is positive for exploration
teams, as shown in model 7. However, this result is only significant at p < 0.1 and using a one-tailed test
of significance. Because hypothesis 2b states that a high level of network sparseness is more beneficial
for exploratory teams, using a one-tailed test for this directional hypothesis is appropriate. Thus, there is
evidence – albeit weak evidence -- that exploratory teams took less time to complete their projects to the
extent that they had sparse networks. This result is also plotted in figure 6. In the discussion, we consider
in greater detail why this particular result is not as strong as some of the others.
--------- Insert figure 6 about here ----------
In summary, the statistical analysis by and large confirmed our hypotheses, with two
qualifications. Our hypothesis about the positive effect of reciprocal helping activity for exploratory
projects were not supported; all teams experienced a negative effect on completion time of engaging in
reciprocal helping activities. In addition, while all other results were significant at the p<0.01 or p<0.05
levels (see model 7 in table 3), the result for the positive effect of network sparseness on completion time
for exploratory projects was only significant at p<0.10 in a one-tailed test.
29
DISCUSSION
The main finding of this study is that different tasks required different network structures to be
effective. Several network attributes that were valuable for exploratory teams were harmful for
exploitation tasks, and vice versa. Specifically, exploratory project teams in our sample benefited from a
network structure similar to the one laid out in Burt’s (1992) structural hole theory: they took less time to
complete their projects to the extent that they had many strong and non-redundant ties. In contrast,
exploitation teams took less time to finish if they had a network composed of weakly tied contacts that
were moderately interconnected. Thus, the network position that was most beneficial for exploration
teams was a liability for exploitation teams.
Limitations and research issues
Our results are specific to the context we studied. In a high-technology environment in which
speed is important for competition, the time required to build social relationships and to help others can
have negative consequences. In environments in which speed is less critical, the investment of time and
energy in network building may be less problematic. Also, the firm we studied coordinates its
development activities informally. By decentralizing so much of its activities to divisions and forgoing
the use of strong, central coordination, the benefits of building efficient networks for completing projects
may be greater.
Nevertheless, our findings are generalizable to some other work contexts, especially to those with
low levels of slack and where network-related activities are simply not a by-product of ongoing work
(Nohria and Gulati 1996). If individuals and groups experience time constraints, there is likely to be some
tradeoff between spending time doing one’s own work well and allocating time to cultivating networks
and helping others. Because of this tradeoff, there are substantial costs associated with some network
positions, and these costs should affect a range of performance-related goals. For example, decisions may
be delayed or poorly made, production quality may suffer, and the degree of innovation may be lacking to
the extent that individuals and groups do not fully commit time to conduct high-quality work because
30
they spend time on networks. Subsequent research could apply the basic idea of a tradeoff between
network-time and work-time to investigate network costs in other settings involving a range of tasks.
Another important issue is the limitation imposed by our unit of analysis. By studying individual
project teams, we were unable to pinpoint whether network positions and activities that prolonged a single
project’s completion had negative consequences for the organization as a whole. Helping others may have
harmed the focal project team but may have provided substantial benefits for other projects, yielding a net
positive effect overall. While this issue can complicate interpretation, it has also been partially addressed
by how we conducted the study. Because we have a representative sample of all projects that this
organization had started during a period of two years, our data set includes many project teams that were
recipients of help from others. Receiving this help should be partially captured by the network variables: a
team’s incoming flow of knowledge through advice-seeking relations is most likely the result of helping
activities carried out by members of other teams. Thus, the benefit of having many advice-seeking
relations (a positive effect for the focal team) is likely to be the result of someone else’s reciprocal
helping behaviors (a negative effect for the focal team). Although our analysis thus partially captured this
dual effect, our study did not pinpoint in detail the recipients of specific helping behaviors. We can
therefore not conclude that the demonstrated negative effect of reciprocal helping behaviors on
completion time is offset (or even surpassed) by some positive effect associated with receiving all that
help. Although our result about the negative consequence of reciprocal helping behaviors for task
performance is interesting, more research is needed to understand the various consequences of reciprocal
helping activities for both the focal actor and the aggregate unit.
Finally, because we did not track investments in networks over time, we could not analyze
whether investments made in one period (e.g., helping others and interacting frequently with contacts)
had positive or negative returns in subsequent periods. Theoretically, investments in activities that slow
down current product development efforts might actually enhance completion of subsequent product
development efforts, if people do not need to invest as heavily in the future and if some of the benefits
from these activities are deferred in the form of social capital to be drawn upon in subsequent efforts. This
31
issue suggests that future research should be more dynamic, considering how network benefits and
investments in the network are allocated differentially across time.
From network structure to contingency theory
An important implication of our study is that the effects of structural network attributes, such as
network size, sparseness, and tie strength, cannot be fully understood without considering the specific
organization context, including costs of networks, difficulties in getting others to help, and different task
requirements. Our results suggest that organization network research would benefit from using the
structuralist approach as a foundation but then proceeding to consider these context-specific issues. The
implication is that network structure theories, such as Burt’s (1992) structural hole theory, Coleman’s
(1990) prediction about the value of connected networks, and Granovetter’s (1973, 1982) weak-tie theory,
need to be modified to reflect the possibility that their predictions only hold in some organization
contexts.
An exciting task for organization network researchers is therefore to develop parsimonious
contingency theories about the effects of social networks in organizations. Building on traditional
contingency perspectives on organization design (e.g., Lawrence and Lorsch 1967; Tushman 1977), some
recent network research has shown that individual or group network effects are contingent on particular
organization contexts, including whether the task is basic research or product development (Gabbay and
Zuckerman 1998), the knowledge required is tacit or explicit (Hansen 1999; Uzzi 1997), and managers’
peer groups are large or small (Burt 1997). Our study contributes to this emerging body of work in two
ways. First, we use March’s (1991) distinction between exploration and exploitation because it captures a
fundamental difference in the nature of work, that is, between work that is inherently novel (innovation,
experimentation, one-time decisions, radical change, etc.) and work that is routine (daily work,
continuous improvement, production efficiency, etc.). Particular work tasks (e.g., basic versus applied
research) can thus be studied at a more abstract level of classification, leading to a more parsimonious
32
contingency model, because the fundamental distinction between exploration and exploitation is used
instead of many different and highly context-specific task variables.
Second, the distinction between exploration and exploitation complements the distinction
between tacit and explicit knowledge, which has emerged as another important contingency variable for
understanding knowledge flows among people and groups (Hansen 1999; Szulanski 1996; Uzzi 1997;
Zander and Kogut 1995). While there is likely to be a positive association between the degree of
exploration and the tacitness of knowledge involved, they are not the same underlying dimension. For
example, some exploratory tasks involve innovations that are mainly based on recombination of existing
components, which contain a high level of explicit knowledge (cf. Henderson and Clark 1990; Nahapiet
and Ghoshal 1998). Likewise, for exploitation tasks, some routine work involves execution of skills that
are largely based on tacit know-how (cf. Von Hippel 1988, 1994). Thus, social network research studying
contingency effects needs to distinguish between the effects of tacit knowledge (which was studied by
Hansen 1999) and the degree of project exploitation, which has been the focus of our study.
While our study highlighted task differences, future research could profitably combine a task
contingency view with a knowledge contingency approach and study the combined effects of both
constructs on outcomes such as task performance. For example, do exploratory tasks that involve highly
explicit knowledge (e.g., recombination of chunks of existing knowledge) require different network
structures compared with exploratory tasks involving highly tacit knowledge? We speculate that they do.
While both tasks are likely to benefit from a non-redundant network that enables the inflow of diverse
knowledge and ideas, the exploratory-explicit situation may not require strong ties to transfer explicit
knowledge. This assertion needs to be developed further and tested in future research.
Our study also highlights another interesting contingency issue concerning exploratory tasks. We
hypothesized that exploratory tasks benefit from sparse networks. However, our empirical results were
not as strong for this hypothesized effect as for the other results. The reason may be that the positive
benefit of receiving diverse input from sparse networks may be offset by an integration problem.
Disconnected contacts in a sparse network do not have established relationships among one another and
33
thus are less likely to come together to exchange views, brainstorm, deepen their understanding of a
problem through discussions, and pass on their collective knowledge to a focal actor. Although each non-
redundant contact may have distinct views and knowledge, the contacts are unlikely to engage one
another to develop their collective insight to help the focal actor. Sutton and Hargadon (1996), in their
research on brainstorming among product designers, found that effective brainstorming sessions
involving a team and other designers relied on past and enduring social relationships among the people
involved. Designers knew one another and had established a set of heuristics for relating to one another
(cf. Uzzi 1997). The existence of a dense network among the designers made it easier, faster, and more
effective to engage in discussions about subtle and vague concepts.
Thus, people and groups that are engaged in exploration tasks may face a tradeoff between having
sparse networks (which enable diverse input) and dense ones (which enable extended brainstorming). For
some exploration tasks, receiving diverse input may be more important than having an extended
brainstorming group, implying that a sparse network is relatively more important. Other exploration tasks
may benefit relatively more from being able to use an interconnected set of people as a forum in which to
brainstorm and gain insight. In our study, we were unable to disentangle the relative values of these
benefits for exploratory project teams, but this topic needs to be studied in order to pinpoint the
conditions under which sparse or dense networks are beneficial for exploration tasks.
Our results also point to some other research questions that warrant exploration in subsequent
studies. One of the interesting findings from our analysis is that some exploitation teams had ties that
were too strong and, as a result, their projects were completed more slowly. This raises the question of
why presumably rational individuals overinvest in ties. One answer involves one of the assumptions
implicit in the organization network literature. Much of this literature assumes that the network that is
most conducive to the mobility of the individual is also the network that is most conducive to task
performance (e.g., Burt 1997; Podolny and Baron 1997), but this assumption may not hold. For example,
it may be that it is in the individual’s interest to have strong ties because those ties are a basis of future job
34
opportunities and promotions (e.g. Burt, 1992). This finding means that future studies of the effects of
networks need to consider carefully whether the dependent variable is relevant to the organization, the
individual, or both.
A second possible explanation for overinvestment in building strong ties does not presuppose that
individual and organizational interests are necessarily antithetical. Rather, individuals must make
decisions about network investments under conditions of considerable uncertainty. It is difficult to
forecast what sorts of projects one will work on in the future and what kinds of connections and
information those projects will require. Therefore, even if people are considering the organization’s needs
completely, individuals may still overinvest in social relations, which may be harmful in some projects,
such as exploitation projects. Future research could profitably examine which of these explanations for
network building hold and how individuals decide to make investments in building networks.
Although the older research on networks in organization highlighted the possibility that networks
may undermine performance, this negative view of networks has been largely been replaced by a more
positive view of social network effects in organizations. While organization network research has moved
from a negative to a positive view spanning a period of forty years, there is a dearth of research
synthesizing positive and negative effects of social networks in organization. Our task contingency
perspective on network effects in organizations is one approach to this synthesis.
35
REFERENCES
Adler, Paul S., and Seok-Woo Kwon. 1999. “Social Capital: The Good, The Bad, and The Ugly.”
Unpublished manuscript, Department of Management and Organization, University of Southern
California, CA: Los Angeles.
Ancona, Deborah G., and David F. Caldwell . 1992. “Bridging the boundary: External activity and
performance in organizational teams." Administrative Science Quarterly 37: 634-665.
Benner, Mary. J., and Michael L. Tushman. 1999. “Process management and organizational adaptation: the
productivity dilemma.” Unpublished manuscript, Harvard Business School, MA: Boston.
Blau, Peter M. 1964. Exchange and Power in Social Life. New York: John Wiley.
Blossfeld, Hans-Peter, and Gotz Rohwer. 1995 Techniques of Event History Modeling. Mahwah, NJ:
Lawrence Erlbaum Associates, Inc.
Brass, Daniel J. 1984. “Being in the right place: A structural analysis of individual influence in an
organization.” Administrative Science Quarterly 29: 518-539.
Brass, Daniel . J. and Marlene E. Burkhardt. 1992. "Centrality and Power in Organizations". Pp.191- 215 in
Networks and Organizations: Structure, Form and Action, edited by N. Nohria and R.G. Eccles.
Boston, MA: Harvard Business School Press.
Brass, Daniel J., Kenneth D. Butterfield, and Bruce C. Skaggs. 1998. “Relationships and unethical behavior:
A social network perspective.” Academy of Management Review 23: 14-31.
36
Burt, Ronald S. 1992. Structural Holes: The Social Structure of Competition. Cambridge, MA: Harvard
University Press.
------------. 1997. “The contingent value of social capital.” Administrative Science Quarterly 42: 339-365
Coleman, James S. 1990. Foundations of social theory. Cambridge, MA: Belknap Press of Harvard
University Press.
Cyert, Richard M., and James G. March. 1992. Foundations of social theory. 2nd ed. Cambridge, MA:
Blackwell Business.
Deutsch, Karl W. 1953. Nationalism and Social Communication. New York: Wiley.
Eisenhardt, Kathleen, and Benham N. Tabrizi. 1995. "Accelerating adaptive processes: Product innovation in
the global computer industry.” Administrative Science Quarterly 40: 84-110.
Ekeh, Peter P. 1974. Social Exchange Theory: the two traditions. Cambridge, MA: Harvard University Press.
Gabbay, Shaul M. & Roger Th. A.J. Leenders. 1999. “CSC: The structure of advantage and disadvantage.”
Pp. 1-14 in Corporate social capital and liability, edited by Roger Th. A.J. Leenders & Shaul M.
Gabbay. Boston: Kluwer Academic Publishers.
Gabbay, Shaul M. and Ezra W. Zuckerman. 1998. “Social capital and opportunity in corporate R&D:
The contingent effect of contact density on mobility expectations.” Social Science Research 27: 189-
217.
37
Gouldner, Alvin W. 1960. “The norm of reciprocity: A preliminary statement.” American Sociological
Review 25: 161-178.
Granovetter, Mark S. 1973. “The strength of weak ties." American Journal of Sociology 6: 1360-1380.
-------, 1982. "The strength of weak ties: A network theory revisited." Pp. 105-130 in Social Structure
and Network Analysis, edited by Peter V. Marsden and Nan Lin . Beverly Hills, CA: Sage.
Hansen, Morten T. 1999. “The search-transfer problem: The role of weak ties in sharing knowledge
across organization subunits,” Administrative Science Quarterly 44: 82-111.
Henderson, Rebecca M., and Kim B. Clark. 1990. "Architectural innovation: The reconfiguration of existing
product technologies and the failure of established firms." Administrative Science Quarterly 35: 9-30.
Henderson, Rebecca M., and Ian Cockburn. 1994. “Measuring competence? Exploring firm effects in
pharmaceutical research." Strategic Management Journal, Winter Special Issue, 15: 63-84.
Higgins, Monica C. 1999. “Changing careers: The effects of social context.” Unpublished manuscript,
Harvard Business School, 98-016.
Homans George C. 1950. The Human Group. New York: Harcourt.
Ibarra, Heminia, and Steven B. Andrews. 1993. “Power, social influence, and sense making: Effects of
network centrality and proximity on employee perceptions.” Administrative Science Quarterly 38:
277-303.
Kapferer, Bruce. 1969. “Norms and the manipulation of work relationships in a work context.” Pp. 181-244
38
in Social Networks in urban settings, edited by J.C. Mitchell. Manchester, England: Manchester
University Press.
Krackhardt, David. 1992. “The strength of strong ties: The importance of philos in organizations”. Pp. 216-
239 in Networks and Organizations, edited by N. Nohria and R. G. Eccles. Boston, MA: Harvard
Business School Press.
Krackhardt, David and Martin Kilduff. 1999. “Whether close or far: Social distance effects on perceived
balance in friendship networks.” Journal of Personality & Social Psychology 76: 770-782.
Lawrence, Paul, and Jay Lorsch. 1967. Organizations and Environments: Managing Differentiation and
Integration. Boston, MA: Harvard Business School Press.
Leana, Carrie R. and Harry J. Van Buren III. 1999. “Organization social capital and employment practices.”
Academy of Management Review 24: 538-557.
Levinthal, Daniel A., and James G. March. 1993. “The myopia of learning.” Strategic Management Journal
14: 95-112.
March, James G. 1991. “Exploration and Exploitation in Organization Learning,” Organization Science 2:71-
87.
Marsden, Peter V. 1990. "Network data and measurement." Annual Review of Sociology 16: 435-463. Palo
Alto, CA: Annual Reviews, Inc.
Marsden, Peter V., and Karen E. Campbell. 1984. “Measuring tie strength." Social Forces 63: 482-501.
39
Nahapiet, Janine, and Sumantra Ghoshal. 1998. “Social capital, intellectual capital, and the organizational
advantage.” Academy of Management Review 23: 242-266.
Nelson, Richard R., and Sidney G. Winter. 1982. An Evolutionary Theory of Economic Change. Cambridge,
MA: Belknap Press.
Nohria, Nitin, and Ranjay Gulati. 1996. “Is slack good or bad for innovation?” Academy of Management
Journal 39: 1245-1264.
Nonaka, Ikujiro. 1990. “Redundant, overlapping organizations: A Japanese approach to managing the
innovation process.” California Management Review 32: 27-37.
Olson, E., Walker, O., and Ruekert, R. 1995. "Organizing for effective new product development: the
moderating role of product innovativeness." Journal of Marketing 48-62.
Podolny, Joel M., and James N. Baron. 1997. “Relationships and resources: Social networks and mobility in
the workplace.” American Sociological Review 62: 673-693.
Polanyi, Michael. 1966. The Tacit Dimension. New York: Anchor Day Books.
Portes, Alejandro. 1999. “Social Capital: Its origin and applications in modern sociology.” Annual Review of
Sociology 24: 57-76.
Portes, Alejandro and J. Sensenbrenner. 1993. “Embeddedness and immigration: Notes on the social
determinants of economic action.” American Journal of Sociology 98: 1320-1350.
40
Roethlisberger, F. J., and William J. Dickson. 1939. Management and the Worker. Cambridge, MA: Harvard
University Press.
Roy, Donald. 1952. “Quota restriction and goldbricking in a machine shop.” American Journal of
Sociology 57: 427-442.
Seashore, Stanley E. 1954. Group Cohesiveness in the Industrial Work Group. Ann Arbor, MI: Institute
for Social Research, University of Michigan.
Shaw, Marvin E. 1964. “Communication networks.” in Advances in Experimental Social Psychology, edited
by L. Berkowitch. New York: Academic Press.
--------- 1971. Group Dynamics: The Psychology of Small Group Behavior. New York: McGraw-Hill
Sutton, Robert I., and Andrew Hargadon. 1996. “Brainstorming groups in context: Effectiveness in a product
design firm.” Administrative Science Quarterly 41: 685-718.
Szulanski, Gabriel. 1996. "Exploring internal stickiness: Impediments to the transfer of best practice within
the firm.” Strategic Management Journal, Winter Special Issue, 17: 27-43.
Teece, David J. 1986. "Profiting from technological innovation: Implications for integration, collaboration,
licensing and public policy." Research Policy 15: 285-305.
Tuma, Nancy B., and Michael T. Hannan. 1984. Social Dynamics: Models and Methods. New York:
Academic Press.
41
Tushman, Michael L. 1977. “Special boundary roles in the innovation process." Administrative Science
Quarterly 22: 587-605.
Uzzi, Brian. 1997. “Social structure and competition in interfirm networks: The paradox of embeddedness.”
Administrative Science Quarterly 42: 35-67.
Von Hippel, Eric. 1988. The Sources of Innovation. New York: Oxford University Press.
---------1994. “Sticky information and the locus of problem solving: Implications for innovation.”
Management Science 40: 429-439.
Walker, Gordon, Bruce Kogut and W. Shan. 1997. “Social capital, structural holes and the fromation of an
industry network.” Organization Science 8: 109-125.
Zander, Udo, and Bruce Kogut. 1995. "Knowledge and the speed of transfer and imitation of organizational
capabilities: An empirical test." Organization Science 6: 76-92.
42
Many, strong,reciprocal ties
Few, weak,non-reciprocalties
Networkrichness(direct ties)
Exploitation Exploration
Task Type
Positive:very high knowledge benefits,high network costs
Positive:Some knowledge benefits,low network costs
Negative:Knowledge deficit,low network costs
Negative:Some knowledge benefits,High network costs
Figure 1. Comparing the net value of network richness for exploitation and exploration tasks
43
VeryDense
VerySparse
Networksparseness(indirect ties)
Exploitation Exploration
Task Type
Negative:No diverse knowledge benefit,redundant contacts
Negative:Some knowledge benefits,but enforcement difficulty
Positive:High diverse knowledge benefits,but enforcement difficulty
Negative:Some knowledge benefits,redundant contacts
Figure 2. Comparing the net value of network sparseness for exploitation and exploration tasks
Positive
44
Table 1. Comparing samples.
Excluded Sample Final Sample
N=53 N=67
Mean St.dev. Mean St.dev. T-test (p-level)
Number of people 6.37 3.12 5.39 2.49 1.89*
Budget 6.89 1.19 6.65 0.98 1.39
Existing ware 0.49 0.33 0.41 0.28 1.51
Degree exploitation 4.66 1.43 4.61 1.49 0.19
Completion time + 14.44 5.30 15.04 5.87 0.52
* p < 0.1 +) n = 38 for excluded sample and n=54 for final sample
45
1 1 1
1
1
1 1
1
0 0
0
0
Figure 3. Aggregating individual networks to a team network
John’s Network
Mary
Jim
Tim
John
John
Mary
Laura
Jim
John Jim Mary Tim
John
Jim
Mary
Tim
1 1
11
1
0 0
0
1
0
1
1
John Jim Mary Laura
John
Jim
Mary
Laura
Team Network
Jim
John
Mary
Tim
Laura
11
1
1
1 1
1
1
John Jim Mary Tim
John
Jim
Mary
Tim
1
0
Laura
01Laura
Jim’s Network
Not
Reported
46
Table 2. Descriptive statistics and correlations
Variable Mean St. dev. Min Max 1 2 3 4 5 6 7 8 9 10 11 12 13 14 151. Existing ware .41 .28 0 .902. Budget 6.65 .98 4.49 9.21 -.373. Tenure mean 13.60 4.85 2.00 25.0 .20 -.144. Product .76 .43 0 1 .26 -.07 .045. Divisional sale (log) 3.74 .93 1.09 4.93 .40 -.16 .12 .206. No. respondents 3.81 1.84 1 10 -.06 .59 -.32 .06 .147. Within-team density .23 .22 0 1.00 .14 -.13 .23 .15 .08 -.308. Exploitation1 0 1.00 -2.24 1.59 .52 -.22 -.01 .41 .27 .10 .269. Network Size1 0 1.00 -1.45 4.03 .03 .29 .09 .17 .10 .44 -.07 .0710. Tie Strength1 0 1.00 -3.78 2.32 -.10 .19 -.23 -.14 .11 .17 -.10 -.07 -.1611. Reciprocity1 0 1.00 -2.24 1.52 .11 .34 -.21 .01 -.04 -.48 -.13 -.05 .44 -.0212. Network sparseness1 0 1.00 -1.91 1.21 -.19 .08 .10 .10 -.28 .06 -.17 -.05 .25 -.21 .0013. Netw. Sparse-squared .98 1.11 0.00 3.63 .03 -.04 -.31 -.07 -.05 -.16 .15 -.01 -.50 .14 -.14 .4514. Strength*Exploit -.06 1.06 -4.83 2.51 .01 .07 .12 .21 .02 .15 .01 .19 .18 -.17 .02 .06 -.1015. Reciprocity*Exploit -.05 .93 -3.17 2.43 .04 .02 -.02 -.11 .05 .12 .27 .02 .15 .02 .22 .13 -.03 -.1916. Netw Size*Exploit .07 .87 -1.83 3.01 -.19 .18 -.05 .02 -.04 -.02 -.11 -.30 -.01 .23 .15 -.28 -.14 .22 -.221 Variables are standardized by subtracting the mean from the value and dividing by the standard deviation.N=67
47
Table 3. Results from Hazard Rate Analysis of Completion Time (N=67)
Model 1 Model 2 Model 3 Model 4 Model 5 Model 6 Model 7Control variablesPeriod –1 -2.140(1.797) -2.432(1.823) -2.434(1.847) -4.294**(2.099) -5.355**(2.101) -5.580**(2.201) -4.729**(2.044)Period – 2 -.320(1.834) -.654(1.861) -.656(1.875) -2.436(2.099) -3.479*(2.108) -3.677*(2.205) -2.822(2.047)Period –3 .498(1.834) .165(1.856) .164(1.870) -1.615(2.080) -2.513(2.085) -2.687(2.194) -1.830(2.037)Period –4 1.503(1.890) 1.174(1.911) 1.173(1.922) -.568(2.109) -1.405(2.104) -1.557(2.204) -.731(2.0 61)Period- -5 1.452(1.978) 1.125(1.994) 1.124(2.008) -.595(2.183) -1.328(2.184) -1.510(2.281) -.719(2.150)Period- 6 1.991(2.040) 1.743(2.054) 1.741(2.071) .058(2.235) -.819(2.226) -1.078(2.326) -.251(2.193)
Existing ware 2.617***(.816) 2.636***(.815) 2.637***(.824) 2.737***(.823) 3.168***(.834) 2.872***(.980) 2.341***(.858)Budget -.749***(.246) -.706***(.249) -.705***(.252) -.561**(.262) -.656**(.258) -.663**(.278) -.728***(.272)Team tenure -.048(.041) -.032(.042) -.032(.02) -.034(.045) -.025(.044) -.018(.047) -.016(.047)Product .395(.499) .236(.503) .235(.531) .395(.536) .608(.568) .603(.625) .627(.621)Divisional sale (log) -.269(.200) -.261(.199) -.261(.201) -.102 (.210) -.176(.206) -.148(.209) -.119(.210)No. respondents -.255*(.140) -.257*(.138) -.257*(.138) -.274*(.140) -.223*(.134) -.213(.141) -.186(.140)Within-team density -.386(.493) -.381(.485) -.380(.506) -.617(.530) -.726(.535) -.829(.550) -.846(.542)Exploitation1 .131(.192) .213(.207) .214(.213) .112(.237) .213(.248) .391(.565) .095(.485)
Network Richness(direct ties)Advice size1 .691***(.212) .782***(.222) .782***(.230) .867***(.228) .606**(.253) .664**(.277) .671**(.271)Tie strength1 .334*(.194) .326*(.192) .325(.245) .512*(.272 .605**(.291) .642**(.297) .632**(.288)Reciprocity1 -.301*(.177) -.519**(.239) -.519**(.249) -.639**(.267) -.636**(.251) -.632**(.271) -.538**(.251)Tie strength*exploitation -.331*(.187) -.330*(.194) -.628**(.262) -.798***(.286) -.821***(.282) -.737***(.260)Reciprocity*exploitation -.001(.225) .119(.235) .136(.244) .153(.251) .188(.247)Advice size*exploitation -.510**(.248) -.750***(.280) -.895**(.360) -1.023***(.336)
Network Sparseness(indirect ties)Sparseness1 -.069(.155) -.137(.162) -.137(.163) -.052(.168) 2.015**(.847)Sparseness-squared -.583**(.230)
Sparseness*exploit 1st 2.030(1.441) .399†(.290)Sparseness-squared * exploit 1st -.495(.414)
Sparseness *exploit 2nd 1.886*(1.119) 1.261(.961)Sparseness-squared * exploit 2nd -.540*(.319) -.384(.288)
Sparseness *exploit 3rd 2.250*(1.175) 2.380**(1.137)Sparseness-squared * exploit 3rd -.663*(.351) -.726**(.341)
Log-likelihood -356.3 -354.7 -354.7 -352.6 -349.2 -348.7 -349.4Chi square (d.f.) †† 3.2*(1) 3.2 (2) 7.4*(3) 14.2***(4) 15.2*(8) 13.8*(7)1Variables are standardized (see table 2).*p < .10, **p < .05, and ***p < .01 (two-tailed test for variable coefficients) ; †p<.10 (one-tailed test).†† Compared with model 1.
48
Figure 4. Plot of hazard rate for tie strength and degrees of exploitation
Weak tie strength (st.dev from mean) Strong
Note: estimates based on model 7. Formulas were:
Exploitation (+1 st.dev): Rate = exp [0.632*tie strength – tie strength*(0.737*(+1)) ].
Exploration (-1 st.dev): Rate = exp [0.632*tie strength – tie strength*(0.737*(-1)) ].
0
1
2
3
4
5
-2.5 -2 -1.5 -1 -0.5 0 0.5 1 1.5 2
Mul
tiplie
r of
the
Rat
e
Exploration
Exploitation
49
Figure 5. Plot of hazard rate for network size and degrees of exploitation
Small Network size (st.dev. from mean) Large
Note: estimates based on model 7. Formulas were:
Exploitation (+1 st.dev): Rate = exp [0.671*network size– tie strength*(1.023*(+1)) ].
Exploration (-1 st.dev): Rate = exp [0.671*tie strength – tie strength*(01.023*(-1)) ].
0
2
4
6
8
10
12
14
-2.5 -1.5 -0.5 0.5 1.5 2.5
exploration
exploitation
50
Figure 6. Plot of hazard rate for network sparseness and degrees of exploitation
Network sparseness (st.dev. from mean)*
Note: estimates based on model 7. Formulas were:
Exploitation (upper third on scale): Rate = exp [2.380*sparseness –0.726*sparseness-squared].
Exploration (lower third on scale): Rate = exp [0.399*sparseness].
*) Sparseness variable was rescaled from prior range (-1.91,1.21) to positive range (0, 3.12) in models 6 and 7.
0
1
2
3
4
5
6
7
8
-2.5 -1.5 -0.5 0.5 1.5 2.5
exploration
exploitation
51
1 Although exploration tasks are likely to contain more tacit knowledge than exploitation tasks, we do not
argue that there is a one-to-one relationship between exploration and tacitness of knowledge involved. For
example, many exploitation tasks involve tacit knowledge, including psycho-motor skills such as riding a
bike.
2 It may be in the focal actor’s long-term interest to help others because of other concerns. For example,
even though helping others may hamper a person’s work performance in the short-term, it may be
beneficial to do so for career advancement because he or she is likely to be seen as a helpful colleague.
But this possibility does not mitigate the short-term problem that time spent helping others is time not
spent on one’s own work.
3 A number of team members naturally had relations outside the focal division, including ties to engineers
in other divisions and to peers outside the company. We controlled for the potential bias by including a
variable measuring a team’s number of ties to members of other divisions in the company. Because this
variable did not alter results, we excluded it from the final statistical analysis.
4 We set the limit to five network contacts because of the difficulties of asking for ties between contacts
when many contacts were named. This approach restricts the upper range of network size. However, only
20% of respondents listed five relations in their network, with a majority (40%) listing three relations.
Thus, this restriction is not likely to substantially bias the network measures.
5 These duplicate ties can be seen as a form of contact redundancy, which may benefit exploratory teams.
We ran separate models including duplicate ties in the network size variable, but these did not alter the
results, and we therefore do not report this additional analysis.
6 Because some scholars have found that these two measures of tie strength represent different dimensions
(e.g., Marsden and Campbell, 1984), we also ran models with frequency and closeness entered separately.
52
7 We chose thirds instead of quartiles to be able to have enough projects in each sub-sample. We
experimented by slightly altering the cut-off values for the boundaries between the thirds, but this did not
change the results. The results are therefore not sensitive to arbitrary boundaries between the three
segments of degree of exploitation.
8 Because the biggest budget item was engineering hours, we did not include a separate control for the
number of team members (the correlation between budget size and number of team members was 0.80).
9 Inspection of the survivor function revealed that the hazard rate is non-monotonic, suggesting that an
exponential model without specific time intervals is not an appropriate functional form for this data set.
10 We use the coefficient estimates from model 7 to assess the magnitude of the effects and plot the
results, because this model is the most specified one and allows for a comparison of the effects for the
various independent variables.
11 The magnitude of the negative coefficient for the interaction term is lower in model 4, meaning that
teams had to be highly exploitative (1.5 standard deviations above the mean value on the exploitation
scale) for the combined effect to turn negative. Regardless of which model is considered, however, results
show that highly exploitative teams with large networks took longer time to complete their projects.
12 We rescaled the standardized network sparseness variable from the original range (-1.91 to 1.21) to a
range with positive values (0 to 3.12), because having only positive values makes it easier to interpret the
combined impact of the main effect and the squared term. Results remained the same before and after
rescaling the variable.