Structural holes
Structural holes is a concept from social network research, originally developed by Ronald Stuart Burt. A structural hole is understood as a gap between two individuals who have complementary sources to information. The study of structural holes spans the fields of sociology, economics, and computer science. Burt introduced this concept in an attempt to explain the origin of differences in social capital. Burt’s theory suggests that individuals hold certain positional advantages/disadvantages from how they are embedded in neighborhoods or other social structures.
The concept
[edit]Most social structures tend to be characterized by dense clusters of strong connections, also known as network closure. The theory relies on a fundamental idea that the homogeneity of information, new ideas, and behavior is generally higher within any group of people as compared to that in between two groups of people.[1] An individual who acts as a mediator between two or more closely connected groups of people could gain important comparative advantages. In particular, the position of a bridge between distinct groups allows him or her to transfer or gatekeep valuable information from one group to another.[2] In addition, the individual can combine all the ideas he or she receives from different sources and come up with the most innovative idea among all.[1] At the same time, a broker also occupies a precarious position, as ties with disparate groups can be fragile and time consuming to maintain.
If we compare two nodes, node A is more likely to get novel information than node B, even though they have the same number of links. This is so because nodes connected to B are also highly connected between each other. Therefore, any information that any of them could get from B, it could easily get from other nodes as well. Furthermore, the information, which B gets from different connections, is likely to be overlapping, so connections involving node B are said to be redundant. On contrary, the position of node A makes it serve as a bridge or a ‘broker’ between three different clusters. Thus, node A is likely to receive some non-redundant information from its contacts. The term ‘structural holes’ is used for the separation between non-redundant contacts. As a result of the hole between two contacts, they provide network benefits to the third party (to node A).
Measures
[edit]Bridge counts
[edit]Bridge count is a simple and intuitive measure of structural holes in a network. Bridge is defined as a relation between two individuals if there is no indirect connection between them through mutual contacts.[3]
Effective size
[edit]Burt's formula
[edit]Burt introduced the measure of a network’s redundancy. He aims to estimate to what extent contact j is redundant with other contacts of node i. Redundancy is understood as an investment of time and energy in a relationship with another node q, with whom node j is strongly connected.[2]
Where piq is proportion of i’s energy invested in relationship with q,
And mjq is calculated as j’s interaction with q divided by j’s strongest relationship with anyone.
The redundancy in network is calculated by summing up this product across all nodes q. One minus this expression expresses the non-redundant portion of relationship. Effective size of i’s network is defined as a sum of the j’s nonredundant contacts.
The more each node is disconnected from other primary contacts, the higher the effective size would be. This indicator varies from 1 (network only provides a single link) to the total number of links N (each contact is non-redundant).
Borgatti's reformulation of Burt's formula
[edit]Borgatti developed a simplified formula to calculate effective size for unweighted networks.[4]
Where t is the number of the total ties in the egocentric network (excluding those ties to the ego) and n is the number of total nodes in the egocentric network (excluding the ego). This formula can be modified to calculate the effective size of the ego's network.
Constraint
[edit]Network constraint of a network is a sum of each connection's constraints cij:
This indicator measures the extent to which time and energy is concentrated within a single cluster. It consists of two components: direct, when a contact consumes a large proportion of a network's time and energy, and indirect, when a contact controls other individuals, who consume a large proportion of a network's time and energy.
Network constraint measures the extent to which the manager’s network of colleagues is like a straitjacket around the manager, limiting his or her vision of alternative ideas and sources of support. It depends on three network characteristics: size, density, and hierarchy. Constraint on an individual would be generally higher in case of a small network (he or she has just few contacts), and if contacts are highly connected between each other (either directly as in a dense network, or indirectly, through the mutual central contact as in a hierarchical network).[5]
Structural holes vs. Weak ties
[edit]The idea behind structural holes theory is somewhat close to the strength of weak ties theory, famously developed by Mark Granovetter. According to weak ties argument, the stronger the tie between two people is, the more likely their contacts will overlap so that they will have common ties with the same third parties.[6] This implies that bridging ties are a potential source of novel ideas. Therefore, Granovetter argues that strong ties are unlikely to transfer any novel information.[6]
Both concepts rely on the same underlying model, however, some differences between them can be distinguished. While Granovetter claims that whether a contact would serve as a bridge depends on a tie’s strength, Burt considers the opposite direction of causality.[7] Thus, he prefers the proximal cause (bridging ties), while Granovetter argues in favor of the distal cause (strength of ties).[7]
Applications
[edit]The networks rich in structural holes were referred to as entrepreneurial networks, and the individual who benefits from structural holes is considered as an entrepreneur. Application for this theory can be found in one of Burt's studies of entrepreneurial network. He studied a network of 673 managers in the supply chain for the firm, and measured the degree of social brokerage. All the managers had to submit their ideas about the ways to improve supply chain management, which were then evaluated by judges.[1] The findings of this empirical study:
- An idea's value corresponded to the degree that the individuals were measured as social brokers;
- The wages of individuals corresponded to the degree that they were measured as social brokers;
- Managers who discussed issues with other managers were better paid, better evaluated positively, and more likely to be promoted.
There are several practical scenarios related to structural hole-related applications, including enterprise settings, information diffusion in social networks, software development, mobile applications, and machine learning (ML)-based social prediction.[8]
References
[edit]- ^ a b c Burt, R. (2004). "Structural holes and good ideas". American Journal of Sociology. 110 (2): 349–399. CiteSeerX 10.1.1.388.2251. doi:10.1086/421787.
- ^ a b Burt, Ronald S. (1995). Structural Holes: The Social Structure of Competition. Cambridge: Harvard University Press. ISBN 978-0-674-84372-1.
- ^ Burt, R. S.; Hogarth, R. M.; Michaud, C. (2000). "The social capital of French and American managers". Organization Science. 11 (2): 123–147. doi:10.1287/orsc.11.2.123.12506.
- ^ Borgatti, Stephen (1997). "Structural Holes: Unpacking Burt's Redundancy Measures". Connections. INSNA. Retrieved 2021-06-02.
- ^ Buskens, V.; van de Rijt, A. (2008). "Dynamics of Networks if Everyone Strives for Structural Holes" (PDF). The American Journal of Sociology. 114 (2): 371–407. doi:10.1086/590674. hdl:11370/e69c3271-5cff-40a3-b64f-3d75ef039e0e. S2CID 16347266.
- ^ a b Granovetter, M. S. (1973). "The Strength of Weak Ties" (PDF). The American Journal of Sociology. 78 (6): 1360–1380. doi:10.1086/225469.
- ^ a b Borgatti, S. P.; Kidwell, V. Carrington, P.; Scott, J. (eds.). "Network Theorizing". The Sage Handbook of Social Network Analysis. Sage Publications.
- ^ Lin, Zihang; Zhang, Yuwei; Gong, Qingyuan; Chen, Yang; Oksanen, Atte; Ding, Aaron Yi (2022). "Structural Hole Theory in Social Network Analysis: A Review" (PDF). IEEE Transactions on Computational Social Systems. 9 (3): 724–739. doi:10.1109/TCSS.2021.3070321. S2CID 234947970.