Download

44
Hostages and the Rise of US Venture Capital Jennifer Kuan September, 2009 Abstract: The vast majority of venture capital investments in the US today are made within thriving and dynamic networks of venture capitalists. These networks reduce venture capital’s risk—and thus expand total investment—by allowing investors to diversify their portfolios. But how did these networks arise? This question is economically important—20% of publicly traded firms was once funded by venture capital—and at the same time, relatively understudied, for the existing literature analyzes the inner workings of established networks, but the mechanisms needed for starting a network are known to be substantially different from those used to maintain one. This paper uses data from the 1970s, a time of explosive network growth in the US, to explore the role of hostage exchange, a self-enforcing mechanism proposed by theory. We find that hostage exchange, especially multi- lateral exchange, helped venture capitalists overcome extreme agency problems to establish fledgling networks. 1

description

 

Transcript of Download

Page 1: Download

Hostages and the Rise of US Venture Capital

Jennifer Kuan

September, 2009

Abstract:

The vast majority of venture capital investments in the US today are made within thriving and dynamic networks of venture capitalists. These networks reduce venture capital’s risk—and thus expand total investment—by allowing investors to diversify their portfolios. But how did these networks arise? This question is economically important—20% of publicly traded firms was once funded by venture capital—and at the same time, relatively understudied, for the existing literature analyzes the inner workings of established networks, but the mechanisms needed for starting a network are known to be substantially different from those used to maintain one. This paper uses data from the 1970s, a time of explosive network growth in the US, to explore the role of hostage exchange, a self-enforcing mechanism proposed by theory. We find that hostage exchange, especially multi-lateral exchange, helped venture capitalists overcome extreme agency problems to establish fledgling networks.

Contact Information: Stanford Institute for Economic Policy Research, Stanford University, Stanford, CA 94306-6015; [email protected]

1

Page 2: Download

Over the past forty years, many of the world’s most innovative new firms were financed

by venture capital, with 20% of publicly traded firms in 2000 having been VC-funded

(Gompers and Lerner, 2001). By financing firms in information technology, venture

capital has brought to market dozens of household names in computers, software and

communications—and changed the way Americans live and do business (Von Burg and

Kenney, 2000). But as a way of financing innovation, venture capital as it is practiced

today is relatively new. Less than a century before venture capital’s arrival, chemical

firms were financed by an entrepreneur’s own personal or family fortune because of the

unavailability of outside finance (Da Rin, 1998). Financiers were reluctant to invest in

that high-tech industry, with its market uncertainty and their own lack of scientific or

technological knowledge.

All of this makes the very existence of venture capital financing surprising, and its rapid

rise, from its beginnings in the late 1950s to its explosive growth in the 1980s, an

interesting puzzle. The vast majority of research on venture capital examines various

features of venture investing today, with relatively few studies looking at the early period

before 1980. One important feature of venture capital investing is the cooperation among

individual firms that co-invest in start-ups. The “trust” necessary to co-invest has been

much studied, however, the mechanisms holding together an existing network can differ

from the mechanisms used to start up a network (Bercovitz et al, 2006; Hallen, 2007). For

example, reputations and the expectation of future interactions are both mechanisms that

could prevent opportunistic behavior in a co-investing partner, but both of these take time

to establish. How, from the first steps, did shared norms and expectations form?

2

Page 3: Download

The 1960s were a period of experimentation that eventually led to the “limited

partnership” venture capital firm that prevails today (Kenney and Florida, 2000). During

this time, venture capitalists co-invested with one another, creating the foundation for

future cooperation (Kogut et al, 2007; Cohen and Fields, 2000). In this paper, I examine

the role that one mechanism might have played in starting up venture capital networks:

hostage exchange. According to the theory proposed by Williamson (1996), hostage

exchange involves a buyer and a seller. The buyer has reason to suspect that the seller

will fail to deliver a good as promised, so the seller offers something of value to be

forfeited to the buyer in such an event. But this makes the seller vulnerable to the buyer,

who could make a false claim in order to keep the hostage. To guard against this, the

buyer also offers a hostage. One difficulty of hostage exchange is the hostage itself. An

obvious hostage is money; but if both sides post funds, the net effect is zero. Thus the

practicality of hostage exchange may be impeded by the inability to find a suitable

hostage. (One exception is the use of equity investments among Japanese firms

(Ahmadjian and Oxley (2006)).

In venture capital co-investing, however, hostages are possible. By taking turns serving

as “lead investor”, venture capitalists who co-invest together can in effect post hostages. I

describe the details below. To test whether hostages laid the groundwork for today’s

network, I examine data from 1970-1975, a period of apparent calm. During this period,

total investment was relatively stable and the number of venture capitalists grew slowly.

However, connections between venture capitalists grew explosively (figures 1 and 2), as

3

Page 4: Download

the network experienced a period of phase transition, according to Kogut et al (2007).

Using both a discrete time and continuous time model, I show that venture capitalists

who exchanged hostages were more likely to cooperate again.

This study examines the role of hostages, a rarely-seen self-enforcing mechanism, in the

context of venture capital. By helping safeguard cooperative transactions during a period

without shared norms or expectations, hostages laid the foundation for the rapid growth

in venture capital and firms in the 1980s. Moreover, the use of hostages in the early

period of network formation suggests further research in other segments of the capital

market.

Background

In the modern practice of venture capital investing, venture capitalists raise funds from

“limited partners” who pay venture capitalists a management fee to invest in risky new

firms (“start-ups”). Each fund exists for a fixed, pre-announced period of time, typically

ten years, and invests in ten to twenty entrepreneurial start-ups. Ljungquist et al, (2005)

estimate that VCs write off 75.3% of their investments, on average, while Kenney and

Florida (2000) cite a common rule of thumb: “for every ten investments, three are

complete losses; another three or four neither succeed nor fail; another two or three return

three or more times the initial investment; and one or perhaps two investments return

more than ten times the initial investment.” The high-return outcomes for a start-up are

usually a buy-out by another firm or an initial public offering, but until these exits occur,

4

Page 5: Download

it can be very hard to predict which start-up will succeed and which will not. At the end

of the fund’s term, limited partners share any returns with the venture capitalists who

have a “carried interest” (usually 20%).

Another important feature of modern venture capital investing is hands-on management.

Venture capitalists occupy board seats, provide advice and business contacts, and

function as active managers. Sahlman (1990) estimates that VCs spend half their time

monitoring their start-ups, suggesting that managerial time is a key scarce resource in

venture capital investing. This heavy managerial involvement sets venture capital

investing apart from other types of private equity investing and accounts for the success

of many start-ups. However, active management by venture capitalists also complicates

the venture fund’s portfolio problem. On the one hand, the fund would like to invest in

many start-ups in order to minimize its portfolio risk; on the other hand, each start-up

requires active management, which limits the number of start-ups a fund can invest in.

Syndicates

Co-investing with another venture capitalist helps solve the portfolio problem. If a

venture capitalist invests funds in a start-up being actively managed by a different

venture capitalist, he can invest in more start-ups than he can manage himself. Thus co-

investing among venture capitalists takes the form of a “lead investor” who actively

manages the start-up and “participants”1. While the literature describes many other

1 Gorman & Sahlman (1989) find that a VC spends ten times more time managing a start-up when he serves as the lead VC than when he is only a participant.

5

Page 6: Download

reasons for such syndicates (including risk sharing (Wilson, 1968), liquidity constraints

(Brandner, Amit, Antweiler, 2002) and expertise (Stuart and Sorenson, 2001)), reducing

portfolio risk alone (Diamond, 1984) would result in improved survival of venture capital

firms and increased total investment in venture capital.

That said, syndicates present venture capitalists with an additional set of agency

problems, in addition to the more-studied problems between venture capitalist and

entrepreneur2 and between venture capitalist and limited partner3. Venture capitalists

within a syndicate face an information asymmetry between the lead investor and the

participants. Examples of how a firm’s managers can cheat investors come mostly from

parts of the capital market that are regulated, so that fraud comes to light as a violation of

securities laws. At Enron, insiders overstated profits to boost share prices; Bernard

Madoff misstated investment returns to attract investors whose funds he embezzled, and

Sibir Energy “lent” its CEO hundreds of millions of dollars before folding. A lead

investor is in a similar position to cheat fellow investors with the added benefit of a lack

of regulation and a shared understanding that a start-up’s failure does not imply fraud,

2 Contractual arrangements also include staged financing (issuing funds in stages as the start-up grows, reserving the right to abandon the start-up) (Gompers, 1995), and use convertible securities to prevent entrepreneurs from misrepresenting the start-up’s prospects (Cornelli and Yosha, 2003). Kaplan and Stromberg (2003), in their study of venture capital contracts, find various combinations of these and other contract provisions, including anti-dilution protection, conditions under which venture capitalists relinquish control (automatic conversion of preferred shares to common shares), vesting and non-compete clauses for entrepreneurs. Also, contracts in their sample seem to respond to information, so repeat entrepreneurs, about whom venture capitalists have some information about quality, face weaker restrictions than first-timers, for example.3 Gompers and Lerner (1996) discuss some solutions to the limited partner (LP) problem, including covenants, or contractual limitations on how the general partners of a venture capital firm should be compensated, what types of start-ups the fund can invest in, and what outside activities general partners can engage in (e.g. to avoid conflicts of interest). But these covenants are expensive to monitor and appear inconsistently among limited partner contracts. Lerner, Schoar, and Wongsunwai (2007) find large differences in the performance of LPs, attributing some of this to differences in sophistication and objectives. In general, the LP problem has prevented unsophisticated public participation in venture capital investing (Hsu and Kenney, 2004, described the failure of ARD in the 1950s and McGee, 2000, describes the more recent failure of meVC).

6

Page 7: Download

since start-ups commonly fail even in the best of circumstances. Because fraud is so hard

to detect in a venture capital setting makes it more attractive, especially as the funds

available for expropriation can far exceed a lead investor’s 20% carried interest.

Given the opportunity and temptation to cheat participants, syndication should be very

difficult to accomplish, let alone become the prevailing mode of investing. The literature

explores mechanisms that are used in existing networks, such as the norm of reciprocity

between high-status incumbents (Piskorski, 2002) and low-status entrants (Ferrary,

2001). However, shared norms, including the expectation of future interaction, must be

established. Cohen and Field (2000) note that venture capital networks were built not just

among strangers but among “immigrants” to a region. Thus the civic engagement of

individual venture capitalists could not have provided the social capital for cooperation.4

Even such notions as high- and low-status and reputation are features of an existing

network. Given the ten-year lifetime of a fund, other mechanisms would have been

necessary to promote cooperation before reputations could be firmly established.

Hostages

While hostage exchange is a difficult mechanism to implement, when it is possible, it is

both powerful and simple. The trouble, of course, is in finding a suitable hostage, since

the ideal hostage is worth more to the party offering the hostage than to the potential

4 By contrast, long-distance trade, as studied by Greif (1990), exhibits the same informational problems as venture capital syndicates, and probably did exploit social interconnectedness to reduce incentives to cheat. With the long-distance traders, one member of the Maghribi ethnic group would sell a distant member’s goods, and vice versa. However, because the goods are sold far away, a member must rely on his partner’s report of revenues; hence the information asymmetry. Cheating a fellow member would result in social sanctions.

7

Page 8: Download

recipient. In the case of venture capital syndicates, the hostage is the participant

investment. When a participant invests in a start-up managed by a lead investor, his

investment is vulnerable to expropriation by the lead. To guarantee against expropriation,

the lead investor invests as a participant in another start-up, this time managed by the

previous deal’s participant. Now the investors take turns serving as participant and lead,

leaving each vulnerable to the other, but where both are better off if neither cheats.

Suppose two venture capitalists operate in an initial condition without shared beliefs.

Venture capitalist B expects venture capitalist A to cheat if left unsupervised as lead

investor and therefore does not co-invest as a participant. However, both would gain if

they could participate in each other’s start-ups because doing so solves their portfolio

problem. To persuade venture capitalist B of his honesty, venture capitalist A offers to

invest as a participant in a start-up that B leads. If B then invest in A’s start-up, B can

keep A’s investment if he is cheated. A’s investment in B’s start-up gives an honest A the

incentive to disclose information about the start-up he manages, so that in the likely event

the start-up fails, B will believe failure was not due to fraud. The exchange of hostages

thus differentiates the lead investors from fraudulent corporate insiders who attempt to

hide information from investors and regulators.

In this example, two venture capitalists exchange hostages, but such an arrangement

could extend to several parties, so long as each venture capitalist could be sanctioned.5 In

5 One example of a multilateral arrangement is a three-way kidney exchange, in which each patient has a willing but incompatible donor who matches a different patient (Kohn, 2003). It is easy to see that each patient must supply a donor, and that should any donor change his mind, all three patients are halted. That is, with a closed chain, any patient can “punish” any other patient.

8

Page 9: Download

practice, posting hostages within a small group greatly increases the impact of a single

hostage by opening up transactions to multiple co-investors. Table 6 illustrates a

multilateral hostage exchange involving five investors (A, B, C, D, and E) and five start-

ups (1, 2, 3, 4, and 5). Investor A leads the syndicate for Start-up 1, with Investors B and

E investing as participants. If this deal were considered in isolation, then A would be in a

position to cheat participants B and E. However, Start-up 5, in which E leads and A

participates, makes A punishable by E should A cheat E in Start-up 1. Add to this Start-

ups 2, 3, and 4: B leads Start-up 2 and C participates; C leads Start-up 3 and D

participates; and D leads Start-up 4, and E participates. Now, if A cheats B, B can

withhold C’s return, who can withhold D’s return, who can withhold E’s return, who can

withhold A’s return. That is, B can induce punishment of A. In the end, all five investors

have the power to punish all other investors.6

The hostage mechanism is clearly one that threatens punishment and as such differs

notably from the withholding of future cooperation or loss of reputation. While this

distinction may be merely one of degree, with one punishment being worse than others,

experimental evidence suggests that a “stick”, added to the “carrot” of future interactions

may be particularly helpful in sustaining cooperation among equals (Molm, 1997).

Data

6 Sociologists measure the “closure” of a network as the number of ties that two players have in common divided by the sum of the ties of those two players. Greater closure is thought to correlate with “stronger” networks. The case of a highly structured closed loop extends this general concept of closure, though it is not known whether larger loops are more difficult to maintain.

9

Page 10: Download

Given the plausibility of a hostage mechanism in early venture capital syndicates, the

empirical question now arises, Was hostage exchange used? This paper uses data from

1970-1975, the earliest period for which data are available and a time of explosive

network formation, to explore the role of hostage exchange. For example, in 1970, a

quarter of venture capital investments involved syndicates; by 1980, over half did (Figure

3).7 Figures 1 and 2 show how quickly the network of venture capitalists grew, showing

co-investors who did at least two deals together in the period 1970-1972 and 1970-1975,

respectively. Did venture capitalists exchange hostages, and if so, did this facilitate the

growth of network ties?

To answer this question, we use data from Venture Xpert (one of two privately compiled

databases of venture capital investments) like a number of other studies in the literature.

However, most studies discard the data from the 1970s for being relatively incomplete.8

Also, because other studies focus on venture capital firms, they discard data on banks and

insurance companies making venture capital investments. But the data show that in this

early period, financial firms comprised a relatively large share of venture investors: only

42% are venture capital firms, the rest are banks, insurance companies and large firms

(Table 2). Kenney and Florida (2000) note that limited partnerships eventually displace

these financial institutions as well as federally subsidized SBICs (Small Business

Investment Companies).

7 The figures are similar for dollars amounts invested.8 Because VCs are not required to make regulatory filings, no public data are available on venture capital investment activity. Rather, the data are compiled from surveys. The design of this study requires only that VCs in the database be surveyed each year, which is clearly the case with this data set.

10

Page 11: Download

In the first three years of the decade, 1970-2, 150 VCs made at least one investment. This

cohort is examined over the 6-year period 1970-1975.9 Most firms seem open to trying

syndication: 123 invest as part of a syndicate, but 57 do so only once and another 24 just

twice (Table 3). This means that many of the syndicates involved a small number of

repeat-syndicators: 42 investors participated in more than two syndicates, and ten took

part in ten or more, including Sprout, Charles River, TA Associates and Mayfield Fund;

investment banks Hambrecht&Quist, and Rothschild; and venture arms of commercial

banks BankAmerica, Citicorp, First Chicago and BancBoston.

About half of the investors were based in New York or New England while only 10%, or

16 firms, were based in Northern California (see Table 1). But West Coast venture

capitalists achieve a higher level of cooperation than East Coast venture capitalists. This

fits with a broader literature on differences between innovative regions (e.g., Saxenian,

1996) and suggests future research into why venture capital networks are less active

elsewhere in the world, especially if building them involves hostage exchange, a self-

enforcing mechanism.

Model and Analysis

How did the tentative experimentation in syndication during the 1970s eventually

become the dominant mode of venture capital investing? Using an approach similar to

9 Note that the period studied, the first half of the 1970s, experienced the oil price rise of 1974. This may depress venture capital investment, however in interviews, VCs claim that a market downturn is the best time to invest in start-ups as inputs tend to be lower-priced. Indeed, the data show that a majority of VCs (79) invested more or less constantly throughout the period.

11

Page 12: Download

Sorenson and Stuart (2001), each syndicate is modeled as consisting of one-on-one

relationships among syndicate members (as in Powell et al, 2004, for instance), which in

turn comprise a network of relationships. For example, suppose a venture capitalist

invests with two other venture capitalists in a syndicate. This three-party syndicate is

made up of three pair-wise relationships or “dyads”. The many interconnected

relationships among pairs of venture capitalists in various syndicates ultimately form a

network.

If hostage exchange facilitates co-investment, then dyads that exchange hostages should

co-invest more frequently than those that do not. However, other factors may explain

frequent co-investing. For example, high quality venture capitalists might prefer to co-

invest with each other (Sorensen, 200X). In this period, reputation—as might be formed

by a successful fund—are less of a factor because funds take ten years to mature so very

few venture capitalists had a reputation for success in 1970.

Table 5 reports the results of a logit regression exploring several variables that might

represent co-investor attractiveness, where the dependent variable is dyad formation

between two venture capitalists10. The measure of “network centrality” used here is

simply the number of different co-investors a venture capitalist has. Notice that size

variables are not significant, but quality variables are, suggest that higher quality venture

capitalists do form more dyads. A tendency to join syndicates was also significant; the

percentage of deals that were syndicated made a dyad more likely to form, though the

10 Count models produce similar results.

12

Page 13: Download

number of syndicated deals had a slight negative effect. Proximity was also significant, as

investors worked more with others in the same region.

A. Discrete time analysis

The first model for testing whether hostages aided network formation is the most

intuitive, a discrete time logit model that analyzes whether hostage exchange in period 1

makes two venture capitalists more likely to cooperate again in period 2. Dividing the

whole period, 1970-1975, into two three-year periods, we find that in period 1, 123 of

150 venture capitalists participated in at least one syndicate creating 386 different dyads.

Most of these dyads engage just once in period 1 and do not re-engage in period 2. Of the

small minority that do multiple deals in period 1, over half go on to re-engage in period 2

(see Table 4).

In addition to the control variables identified above, other explanatory variables must be

considered, especially repeated interaction. The “shadow of the future” prevents a

venture capitalist who values future deals with his partner from behaving

opportunistically. The number of deals two investors do together in period 1 might be one

indication of how valuable future deals are for both partners. Also, the more deals two

partners do in period 1, the more compatible they are and thus the more likely they are to

do deals in period 2.

13

Page 14: Download

Finally, to test the hypothesis, hostage exchange must be identified in the data. Following

the literature, the lead investor invests the most capital in the first round of funding.11 In

the bilateral case, a hostage exchange would require a pair of investors to invest in at

least two deals with each taking a turn as lead. Support for the hypothesis would take the

form of a dyad investing in this reciprocal pattern in period 1 producing a greater

likelihood of re-engaging in period 2. Descriptively, seven dyads swapped leadership

roles in period 1, of which only two paired again in period 2. Expanding the definition of

hostage exchange to include partners who invested as equals at least twice (since with

equal partners, either might serve as the leader) adds another 34 dyads. Of these, only

30% paired again in period 2, less than the average dyad that does multiple deals in

period. Taking into consideration multilateral hostage arrangements adds another 30

period 1 pairings, of which 21 or 70% paired again in period 2 (see Table 4).

Table 7 reports the results of the logit regression in which dyad formation in period 2 is

the dependent variable and hostage exchange and repeated interaction are explanatory

variables. Hostage exchange (the “stick”) helped facilitate syndication but repeat

interaction (the “carrot”) was also important. Geography was also significant as VCs in

the same state were more likely to partner. This last finding fits with the findings of other

studies that show how proximity helps with information gathering (Lerner, 1995).

B. Continuous time analysis

11 “Staged financing” is one of many mechanisms VCs use to overcome agency problems with entrepreneurs (Gompers, 1995). Start-ups typically raise funds in “stages” or “rounds”; early stages involve greater risk and smaller amounts of funding.

14

Page 15: Download

Another approach to analyzing the effect of hostages is to measure the time between

deals for each dyad. Using a hazard model, we measure the effects of hostage exchange

on the rate of dyad formation, controlling for other factors identified above. Table 8

shows that hostages are indeed an important factor in facilitating dyad formation. Venture

capitalist quality as measured by centrality is also significant, as is the tendency of

venture capitalists to form syndicates. Geographical proximity is positive but not

significant.

Discussion and Conclusion

For students of the modern practice of venture capital investing, it is hard to imagine

funding start-ups without syndicates; once venture capital funds began forming, co-

investing quickly became standard. One reason for the widespread use of syndicates is

the venture capital fund’s portfolio problem: co-investing allows funds to invest in more

start-ups than it can actively manage. While it is possible to increase the size of the

venture capital firms to increase managerial capacity—and today’s limited partnerships

typically have more general partners than the solo operations of the 1970s—even for

larger firms with greater management capacity, investing in syndicates is a Pareto

improvement because it allows firms more flexibility and diversity in its investments.

In the 1970s, venture capital firms performed their first tentative experiments with

syndication, as dozens of venture capitalists co-invested with one another, often only

15

Page 16: Download

once. But in a few short years, a sparse network filled out to become a large, densely

connected network of co-investors, laying the groundwork for the explosion in the

number of venture capitalists and invested capital that would come at the end of the

decade. During a period of seemingly flat growth, when the number of venture capitalists

grew slowly, total investments remained stable, and the 1974 oil price rise created a

pervasive sense of pessimism, venture capitalists began to establish a clever means of

survival through cooperation. So when the ERISA (Employee Retirement Income

Security Act) decision allowing pension funds to invest in venture capital funds was

made in 1978, the influx of new capital was readily absorbed by highly functioning

venture capital funds.

The ability of venture capitalists to deploy large amounts of capital to innovative start-

ups faced tremendous problems. Syndicates involve an information asymmetry among

investors so severe that similar cooperation has been stymied throughout history. This

study has argued that hostages are a mechanism that helped overcome the agency

problem facing co-investors and facilitated the establishment of the thriving venture

network that serves as an engine of growth today.

16

Page 17: Download

References

Bercovitz, Janet, Sandy D. Jap, and Jack A. Nickerson, 2006, “The antecedents and Performance Implications of Cooperative Exchange Norms,” Organization Science, 17: 6, pp724, 740.

Brandner, James A., Raphael Amit, Werner Antweiler, 2002, “Venture-Capital Syndication: Improved Venture Selection vs. the Value-Added Hypothesis,” JEMS, 2:3, Fall (423-452).

Castilla, Emilio J., Hokyu Hwang, Ellen Granovetter, and Mark Granovetter, 2004, Social Networks in Silicon Valley, Stanford, mimeo.

Cornelli, Francesca and Oved Yosha, 2003, “Stage Financing and the Role of Convertible Securities,” Review of Economic Studies, 70, 1-32.

Da Rin, Marco, “Finance and the Chemical Industry,” 1998, in Chemicals and Long-Term Economic Growth: Insights from the Chemical Industry, eds. Ashish Arora, Ralph Landau, Nathan Rosenberg, New York, Wiley, 309-339.

Diamond, Douglas, “Financial Intermediation and Delegated Monitoring,” 1984, Review of Economic Studies, 51,3: 393-414.

Dossani, Rafiq and Martin Kenney, 2002, “Creating an Environment for Venture Capital in India,” World Development, 30:2, 227-253.

Ferguson, Charles H., 1999, High Stakes, No Prisoners: A Winner’s Tale of Greed and Glory in the Internet Wars, New York: Times Books, Random House.

Ferrary, Michel, 2001, “The Gift Exchange in the Social Networks of Silicon Valley,” Working paper.

Gompers, Paul, 1995, “Optimal Investment, Monitoring, and Staging of Venture Capital,” Journal of Finance, 50, 1461-1490.

Gompers, Paul A. and Joshua Lerner, 1996, “The Use of Covenants: An Empirical Analysis of Venture Partnership Agreements,” Journal of Law and Economics, 39 (463-498).

-------, 2001, The Money of Invention, Harvard Business School.

Grimes, Ann, 2003, “Now, MVC Faces the Wrath of the Little Guys It Courted,” Wall Street Journal, January 13.

Hellman, Thomas, 1998, “The Allocation of Control Rights in Venture Capital Contracts,” RAND, 29, 57-76.

17

Page 18: Download

Hsu, David and Martin Kenney, 2004, “Organizing Venture Capital: The Rise and Demise of American Research & Development Corporation, 1946-1973” mimeo.

Lerner, Josh, 1995, “Venture Capitalists and the Oversight of Private Firms,” Journal of Finance, 50:1.

Kaplan, Steven N. and Per Stromberg, 2003, “Financial Contracting Theory Meets the Real World: An Empirical Analysis of Venture Capital Contracts,” Review of Economic Studies, 70: 281-315.

Kortum, Samuel and Josh Lerner, 2000, “Assessing the Contribution of Venture Capital to Innovation,” RAND, 31:4 (674-692).

Marshall, Matt, “Inroads have been made on VC disclosure, but some questions remain unsettled,” San Jose Mercury News, Feb 16.

McGee, Suzanne, 2000, “MeVC Gives Public Chance to Invest in Start-Up Arena,” Wall Street Journal, August 8.

Myers, Stewart and Nicholas Majluf, 1984, “Corporate Financing and Investment Decisions When Firms Have Information That Investors Do Not Have,” Journal of Financial Economics, 13: 187-221.

Piskorski, Mikolaj, (2002) “Reciprocity and Power in the Venture Capital Market,” Stanford, mimeo.

Powell, Walter W., Douglas R. White, Kenneth W. Koput, and Jason Owen-Smith, 2004, “Network Dynamics and Field Evolution: The Growth of Interorganizational Collaboration in the Life Sciences,” American Journal of Sociology, forthcoming.

Sahlman, W. A., 1990, “The Structure and Governance of Venture-Capital Organizations,” Journal of Financial Economics, 27: 473-521.

Saxenian, AnnaLee, 1996, Regional Advantage.

Smith, Randall, 2004, “Harvard Parents Got a Hard Lesson in Investing Perils,” Wall Street Journal, June 11, p.1.

Sorenson, Olav and Toby E. Stuart, 2001, “Syndication Networks and the Spatial Distribution of Venture Capital Investments,” American Journal of Sociology, 106: 1546-88.

Von Burg, Urs and Martin Kenney, “Venture Capital and the birth of the Local Area Networking Industry,” (2000) Research Policy, 29, 1135-1155.

Williamson, Oliver E., 1996, The Mechanisms of Governance, Oxford.

18

Page 19: Download

Wilson, John W. 1985, The New Venturers: Inside the High-Stakes World of Venture Capital, Menlo Park, Calif., Addison-Wesley.

Wilson, R., 1968, “The Theory of Syndicates,” Econometrica, January, (119-132).

19

Page 20: Download

Figure 1: Network of VCs with repeated interaction (1970-1972)

20

Page 21: Download

Figure 2: Network of VCs with repeated interaction (1973-1975)

QuickTime™ and aTIFF (LZW) decompressor

are needed to see this picture.

21

Page 22: Download

Figure 3: Venture Capital Deals, 1970-1980

Figure 4: Frequency of Investors Participating in Syndicates

22

0

10

20

30

40

50

60

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18

Number of Syndicatees

0

100

200

300

400

500

600

1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980

Year

Number of Deals

0

10

20

30

40

50

60

% Syndicated

Number of Deals% Syndicated

Page 23: Download

Figure 5: Frequency of Firms’ Time to Next Transaction After 1970-2

Figure 6: A Multilateral Hostage Arrangement, 1970—1972

Leader Participant

23

0

10

20

30

40

50

60

70

80

90

1 2 3 4 5 6 7 8 8+

Years

Frequency

Citicorp

First Chicago

Heizer

Sprout

Rothschild

Patricof

Texas

BA

BancBoston

Becker

Page 24: Download

Figure 7: The California Network, 1970-1972

Table 1: Frequency of Geographical Region among Venture Capital Firms, 1970-2

Region

FrequencyGreater New York 51New England 21N. California 16Southeast 14Great Lakes 13Great Plains 7S. California 5Mid-Atlantic 4Ohio Valley 4South 4Non-US 3Canada 1Rocky Mountains 1Unknown 6

24

BA Arthur Rock

Union Venture

Sutter Hill

Norwest Venture

Idanta Partners

Stanford University

Bryan & Edwards

LightspeedContinental Capital

Mayfield Fund

H&Q (Chase)

Page 25: Download

Table 2: Frequency of Firm Type among Venture Capital Investors, 1970-2

Type of Investor FrequencyPrivate Firm Investing Own Capital 64Non-Financial Corp. Affiliate or Subsidiary 18Investment/Merchant Bank Subsid/Affil 16SBIC Not elsewhere classified 15Affiliate/Subsidary of Oth. Financial. Instit. 11Insurance Firm Affiliate or Subsidiary 6Commercial Bank Affiliate or Subsidiary 5Investment Management/Finance Consulting 4Endowment 3MESBIC not elsewhere classified 3Individuals 3Private Equity Advisor or Fund of Fund Mgr 1Pension Fund-Public 1

Table 3: Descriptive Statistics for 1970-1972:

Number of Investors 150

Exited 26

Participated in a Syndicate (1970-2) 123

Total Dollar Amount Invested ($000) $710,316

Total Rounds of Financing 1480

Number of New Start-ups 349

Amount Invested in New Start-ups ($000) $239,426

25

Page 26: Download

Table 4: Frequency of Period 1 and Period 2 Pairings

All Venture Capitalists “California Network”

Period 1 Pairing Arrangement

Pairs in Period 1

% “Re-pairings”in Period 2

Pairs in Period 1

% “Re-pairings”in Period 2

One Pairing Only 340 19% 7 29%

2+ Pairings 46 54% 10 70%

Swapped or Joint Leadership

41 30% 2 100%

Multilateral Hostage Posting

30 70% N/A N/A

Table 5: Logit regression of firm characteristics on pairing between investors

Independent Variable: Dyad Formation (1970-1972)

Range Coefficient

Centrality 0 - 27 0.018***(0.001)

Leader (y=1) 0.305***(0.115)

Number of deals 1 - 36 0.001(0.002)

Total $ invested (000) $10 - $30,970 0.000(0.000)

$ invested in syndicates (000) $0 - $15,435 0.000(0.000)

Number of syndicated deals 0 - 18 -0.016***(0.005)

% Deals that were Syndicated 0 – 1,mean = 0.6

1.131***(0.251)

Same Region (y=1) 0.587***(0.156)

Pseudo R-Squared 0.276Number of observations 7340

* indicates that the estimated coefficient is significantly different from zero at the 10 percent level, ** indicates that is significant at the 5 percent level, and *** indicates significance at the 1 percent level.

26

Page 27: Download

Table 6: Multilateral Hostage Situation

Start-up Investors

Heizer (A) Sprout (B) Rothschild (C ) First Chicago (D) Citicorp (E)

(1) Paradyne L P P

(2) Archon L P

(3) Detwiler L P

(4) Entrex L P

(5) Data 100 P LP = Participant L = Leader

Table 7: Logit Regression of Period 2 Dyad Formation

Independent Variable: Period 2 Dyad FormationN=7340Number of Deals Done by a Pair in Period 1 0.66***

(0.14)Hostage Posting (y=1) 0.91*

(0.49)Centrality 0.01***

(0.001)Leader (y=1) 0.61***

(0.11)Number of Syndicated Deals -0.003

(0.004)% Deals that were Syndicated 0.33

(0.21)Same State (y=1) 0.53***

(0.16)Pseudo R-Squared 0.20

* indicates that the estimated coefficient is significantly different from zero at the 10 percent level, ** indicates that is significant at the 5 percent level, and *** indicates significance at the 1 percent level.

27

Page 28: Download

Table 8: Hazard model of time between deals for a dyad

Time elapsed between dealsN = 7966

Hazard ratio

Hostage Posting (y=1) 2.925***(0.449)

Centrality 1.001***(0.0004)

Leader (y=1) 0.979(0.018)

Number of Syndicated Deals 1.003***(0.001)

% Deals that were Syndicated 0.990(0.034)

Same Region (y=1) 1.034(0.031)

* indicates that the estimated coefficient is significantly different from zero at the 10 percent level, ** indicates that is significant at the 5 percent level, and *** indicates significance at the 1 percent level.

28