Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?
description
Transcript of Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?
![Page 1: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/1.jpg)
OverviewGranovetter: Strength of Weak Ties
What are ‘weak ties’?why are they ‘strong’?
Burt: Structural HolesWhat are they?What do they do?How do they work?
“Good Ideas”
Methods & Measures:1) Moving data around
SAS Data steps2) Calculating Ego-Network Measures
From Ego-network modulesFrom Global Networks
Structural Holes & Weak Ties
![Page 2: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/2.jpg)
Granovetter argues that, under many circumstances, strong ties are less useful than weak ties. Why?
Redundancy
Local Density, Global Fragmentation
Structural Holes & Weak Ties
![Page 3: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/3.jpg)
What are the implications?
For individuals?
For Communities?
Structural Holes & Weak TiesThe Strength of Weak Ties
![Page 4: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/4.jpg)
Structural Holes & Weak TiesStructural Holes
Burt. Structural Holes
Similar idea to SWT: Your ties matter because of who your connects are not connected to.
What is (for Burt) Social Capital?Relationships with other players
Why does it matter?
“Social capital is as important as competition is imperfect and investment capital is abundant.”
![Page 5: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/5.jpg)
A structural Hole is a buffer: a space between the people you are connected to.
2 ways:CohesionStructural Equivalence
Structural Holes & Weak TiesStructural Holes
![Page 6: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/6.jpg)
EfficiencyMaximize the number of non-redundant contacts
EffectivenessDraw your primary contacts from different social worlds
Structural Holes & Weak TiesStructural Holes
![Page 7: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/7.jpg)
Number of Contacts
Num
ber
of N
on-R
edun
dant
Con
tact
s
Maximum Efficiency
Minimum Efficiency
Decreasing Efficiency
Increasing Efficiency
Structural Holes & Weak TiesStructural Holes
![Page 8: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/8.jpg)
Difference between SWT & SH:
Burt’s claim is that he focuses directly on the causal agent active in Granovetter.
(but note the footnote in “good ideas,” where he says the effect is not causal).
Structural Holes & Weak TiesStructural Holes
![Page 9: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/9.jpg)
Structural Holes & Weak TiesGood Ideas
The hypothesis is that those who broker different groups are exposed to different ideas and thus more likely to have a good idea.
Uses data on discussions among managers in a large electronics firm.
![Page 10: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/10.jpg)
Structural Holes & Weak TiesGood Ideas
Burt’s idea discussion network
![Page 11: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/11.jpg)
Structural Holes & Weak TiesGood Ideas
Burt’s idea discussion network
![Page 12: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/12.jpg)
Structural Holes & Weak TiesGood Ideas
Figure 3: Core network in the supply chain
With headquarters
![Page 13: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/13.jpg)
Structural Holes & Weak TiesGood Ideas
Figure 3: Core network in the supply chain
Without headquarters
![Page 14: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/14.jpg)
Structural Holes & Weak TiesGood Ideas
The results show a strong effect of network constraint on salary, evaluation and promotion, independent of the job/age characteristics related to human capital explanations.
![Page 15: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/15.jpg)
Structural Holes & Weak TiesGood Ideas
The results show a strong effect of network constraint on salary, evaluation and promotion, independent of the job/age characteristics related to human capital explanations.
![Page 16: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/16.jpg)
Structural Holes & Weak TiesGood Ideas
![Page 17: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/17.jpg)
Calculating the measures
Burt discusses 4 related aspects of a network:1) Effective Size2) Efficiency3) Constraint4) Hierarchy
Structural Holes & Weak TiesCalculations
![Page 18: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/18.jpg)
Effective Size
Conceptually the effective size is the number of people ego is connected to, minus the redundancy in the network, that is, it reduces to the non-redundant elements of the network.
Effective size = Size - Redundancy
Structural Holes & Weak TiesCalculations
![Page 19: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/19.jpg)
Effective SizeBurt’s measures for effective size is:
j qjqiqmp1
Where j indexes all of the people that ego i has contact with, and q is every third person other than i or j.
The quantity (piqmjq) inside the brackets is the level of redundancy between ego and a particular alter, j.
Structural Holes & Weak TiesCalculations
![Page 20: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/20.jpg)
Effective Size:
j qjqiqmp1
Piq is the proportion of actor i’s relations that are spent with q.
1
2
4 5
3 Adjacency 1 2 3 4 51 0 1 1 1 12 1 0 0 0 13 1 0 0 0 04 1 0 0 0 15 1 1 0 1 0
P 1 2 3 4 51 .00 .25 .25 .25 .252 .50 .00 .00 .00 .503 1.0 .00 .00 .00 .004 .50 .00 .00 .00 .505 .33 .33 .00 .33 .00
Structural Holes & Weak TiesCalculations
![Page 21: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/21.jpg)
Effective Size:
j qjqiqmp1
mjq is the marginal strength of contact j’s relation with contact q. Which is j’s interaction with q divided by j’s strongest interaction with anyone. For a binary network, the strongest link is always 1 and thus mjq reduces to 0 or 1 (whether j is connected to q or not - that is, the adjacency matrix).
The sum of the product piqmjq measures the portion of i’s relation with j that is redundant to i’s relation with other primary contacts.
Structural Holes & Weak TiesCalculations
![Page 22: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/22.jpg)
Effective Size:
j qjqiqmp1
1
2
4 5
3
P 1 2 3 4 51 .00 .25 .25 .25 .252 .50 .00 .00 .00 .503 1.0 .00 .00 .00 .004 .50 .00 .00 .00 .505 .33 .33 .00 .33 .00
Working with 1 as ego, we get the following redundancy levels:
PM1jq
1 2 3 4 51 --- --- --- --- ---2 --- .00 .00 .00 .253 --- .00 .00 .00 .004 --- .00 .00 .00 .255 --- .25 .00 .25 .00
Sum=1, so Effective size = 4-1 = 3.
Structural Holes & Weak TiesCalculations
![Page 23: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/23.jpg)
Effective Size:
j qjqiqmp1
1
2
4 5
3 When you work it out, redundancy reduces to the average degree, not counting ties with ego of ego’s alters.
Node Degree 2 1 3 0 4 1 5 2Mean: 4/4 = 1
Structural Holes & Weak TiesCalculations
![Page 24: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/24.jpg)
Effective Size:
j qjqiqmp1
1
2
4 5
3 Since the average degree is simply another way to say density, we can calculate redundancy as:
2t/n where t is the number of ties (not counting ties to ego) and n is the number of people in the network (not counting ego).
Meaning that effective size = n - 2t/n
Structural Holes & Weak TiesCalculations
![Page 25: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/25.jpg)
Effective Node Size Size: Efficiency 1 4 3 .75 2 2 1 .5 3 1 1 1.0 4 2 1 .5 5 3 1.67 .55
1
2
4 5
3
Efficiency is the effective size divided by the observed size.
Structural Holes & Weak TiesCalculations
![Page 26: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/26.jpg)
1
2
4 5
3
Constraint
Conceptually, constraint refers to how much room you have to negotiate or exploit potential structural holes in your network.
“..opportunities are constrained to the extent that (a) another of your contacts q, in whom you have invested a large portion of your network time and energy, has (b) invested heavily in a relationship with contact j.” (p.54)
Structural Holes & Weak TiesCalculations
![Page 27: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/27.jpg)
1
2
4 5
3
Constraint
P 1 2 3 4 51 .00 .25 .25 .25 .252 .50 .00 .00 .00 .503 1.0 .00 .00 .00 .004 .50 .00 .00 .00 .505 .33 .33 .00 .33 .00
2
qqjiqijij pppC
Structural Holes & Weak TiesCalculations
![Page 28: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/28.jpg)
Constraintq
i jpij
piq pqj
Cij = Direct investment (Pij) + Indirect investment
2
qqjiqijij pppC
Structural Holes & Weak TiesCalculations
![Page 29: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/29.jpg)
Constraint2
qqjiqijij pppC
Given the p matrix, you can get indirect constraint (piqpqj) with the 2-step path distance.
P 1 2 3 4 51 .00 .25 .25 .25 .252 .50 .00 .00 .00 .503 1.0 .00 .00 .00 .004 .50 .00 .00 .00 .505 .33 .33 .00 .33 .00
P*P 1 2 3 4 51 ... .083 .000 .083 .2502 .165 ... .125 .290 .1253 .000 .250 ... .250 .2504 .165 .290 .125 ... .1255 .330 .083 .083 .083 ...
1
2
4 5
3
Structural Holes & Weak TiesCalculations
![Page 30: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/30.jpg)
Constraint2
qqjiqijij pppC
Total constraint between any two people then is:
C = (P + P2)##2
Where P is the normalized adjacency matrix, and ## means to square the elements of the matrix.
Structural Holes & Weak TiesCalculations
![Page 31: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/31.jpg)
Constraint2
qqjiqijij pppC
P+P2 Cij C .00 .33 .25 .33 .50 .00 .11 .06 .11 .25 .53 .67 .00 .13 .29 .63 .44 .00 .02 .08 .39 1.0 .25 .00 .25 .25 1.0 .06 .00 .06 .06 .67 .29 .13 .00 .63 .44 .08 .02 .00 .39 .66 .41 .08 .41 .00 .44 .17 .01 .17 .00
Structural Holes & Weak TiesCalculations
![Page 32: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/32.jpg)
Hierarchy
Conceptually, hierarchy (for Burt) is really the extent to which constraint is concentrated in a single actor. It is calculated as:
)ln(
ln
NN
NC
C
NC
C
H j
ijij
Structural Holes & Weak TiesCalculations
![Page 33: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/33.jpg)
Hierarchy
)ln(
ln
NN
NC
C
NC
C
H j
ijij
2 3 4 5 CC: .11 .06 .11 .25 .53
.83 .46 .83 1.9
1
2
4 5
3
NC
Cij
H=.514
Structural Holes & Weak TiesCalculations
![Page 34: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/34.jpg)
Playing with data: Getting information from one program to another
If our data are in one format (SAS, for example) how do we get it into a program like PAJEK or UCINET?
1) Type it in by hand.Too slow, error prone, impossible for very large networks
2) Write a program that moves data around for you automatically
SPAN contains programs that write to:PAJEKUCINETNEGOPYSTRUCTURE
![Page 35: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/35.jpg)
Playing with data: Using SAS to move data.
Back-up: 1) How does SAS store & move data?
2) How do you store & use programs over again?
Basic Elements:SAS is a language:
Data Steps = Nouns
Procedures = Verbs
Data needs:Creation / Read OrganizationTransformationManipulation
Procedures:SummarizeAnalyzeCommunicateManipulate
http://wks.uts.ohio-state.edu/sasdoc/
![Page 36: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/36.jpg)
SAS
The procedure we have been using is IML or the Interactive Matrix Language.
![Page 37: Overview Granovetter: Strength of Weak Ties What are ‘weak ties’? why are they ‘strong’?](https://reader035.fdocuments.net/reader035/viewer/2022070414/56814e21550346895dbb86ce/html5/thumbnails/37.jpg)
Data
Libraries: Links to where data are storedDatasets: the actual data
You refer to a data set by a two-level name:library.data