Dynamics of Networks if Everyone Strives for Structural Holes

نویسندگان

  • Vincent Buskens
  • Arnout van de Rijt
  • Marcel van Assen
  • Michael Macy
  • Werner Raub
  • Erik Volz
چکیده

When entrepreneurs enter “structural holes” in information networks, they can make a profit by exploiting the access and control benefits that these provide. That is Ronald Burt’s 13-year-old argument. Ever since, evidence for the suggested advantages from the occupancy of strategic network positions has steadily accumulated. What has not been shown, however, is whether those who strive for such structural advantages can actually obtain and maintain them. We ask what would happen if people followed Burt’s advice and indeed entered structural holes by manipulating their local networks in pursuit of access and control benefits. Using an explicit model of network entrepreneurship, we characterize the networks that are obtained after beneficial links have been added and costly ones removed, and we assess the returns that network entrepreneurs earn on their social capital investments in these networks. An important class of stable networks turns out to be “balanced complete bipartite networks.” In these networks, benefits are evenly distributed, so no one has a structural advantage. This result sharply contrasts with Burt’s typical example of what a network may look like after entrepreneurial activity, in which the majority of access and control benefits accrue to only one individual.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Routing Hole Handling Techniques for Wireless Sensor Networks: A Review

A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensi...

متن کامل

The Social World of Twitter: Topics, Geography, and Emotions

Debate is open as to whether social media communities resemble real-life communities, and to what extent. We contribute to this discussion by testing whether established sociological theories of real-life networks hold in Twitter. In particular, for 228,359 Twitter profiles, we compute network metrics (e.g., reciprocity, structural holes, simmelian ties) that the sociological literature has fou...

متن کامل

Reinforced structural holes

Holes in social structure are variably reinforced by the social organization around the hole. The more reinforced the hole, the greater the difficulty in bridging it, but the more likely a successful bridge will carry information novel, and so potentially valuable, to people on the other side. To study how reinforcement varies with access to structural holes, and the achievement associated with...

متن کامل

Balanced clusters and diffusion process in signed networks

In this paper we study the topology effects on diffusion process in signed networks. Considering a simple threshold model for diffusion process, it is extended to signed networks and some appropriate definitions are proposed. This model is a basic model that could be extended and applied in analyzing dynamics of many real phenomena such as opinion forming or innovation diffusion in social netwo...

متن کامل

Psychological predispositions and network structure: The relationship between individual predispositions, structural holes and network closure

We examine the effect of individual psychological differences on network structures, proposing several hypotheses about how individual differences might predispose actors to structure their social environment by seeking network closure or by sustaining structural holes. We introduce a new triad census method to examine personal networks of strong and weak ties. For 125 egocentric networks we co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005