Do ongoing networks block out new friends? Reconciling the embeddedness constraint dilemma on new alliance partner addition
AffiliationUniv Arizona, Eller Coll Management, Dept Management & Org
Keywordsaddition of new alliance partners
MetadataShow full item record
CitationJiang H, Xia J, Cannella AA, Xiao T. Do ongoing networks block out new friends? Reconciling the embeddedness constraint dilemma on new alliance partner addition. Strat Mgmt J. 2017;39:217–241. https://doi.org/10.1002/smj.2695
JournalSTRATEGIC MANAGEMENT JOURNAL
RightsCopyright © 2017 John Wiley & Sons, Ltd.
Collection InformationThis item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at firstname.lastname@example.org.
AbstractResearch Summary: This study addresses a theoretical dilemma regarding how alliance network constraint (reflected by network cohesion) affects a firm's alliance formation with new partners. Using a network pluralism approach, we separate a firm's ego alliance network into two activity-based networksan exploratory network and an exploitative networkbased on the primary value chain activity involved in each alliance. We argue that the cohesion of exploratory or exploitative networks has an inverted U-shaped effect on the addition of new partners in the same activity-based network, and a positive effect on the addition of new partners in the other network. Results based on data from the biotechnology industry largely support our predictions with one exception. Our study contributes to both scholarly understanding of network embeddedness and alliance practice. Managerial Summary: The structure of firms' ongoing alliance networks may have paradoxical implications for their efforts to search for and form alliance with new partners. That is, when a firm's alliance partners are tightly connected with each other, the cohesive network tends to both encourage and impede the focal firm to add new partners. We resolve this dilemma by showing that when a firm is deeply entrenched in a cohesive alliance network conducting a certain type of activities (e.g., R&D activities), it may not easily add new R&D alliance partners. However, it may still be able to escape from the cohesive R&D alliance network by seeking new partners conducting other activities (e.g., manufacturing activities).
Note2 years embargo; published online: 14 September 2017
VersionFinal accepted manuscript
Showing items related by title, author, creator and subject.
Do-it-yourself networks: a novel method of generating weighted networksShanafelt, D. W.; Salau, K. R.; Baggio, J. A.; Univ Arizona, Dept Math (ROYAL SOC, 2017-11-22)Network theory is finding applications in the life and social sciences for ecology, epidemiology, finance and social-ecological systems. While there are methods to generate specific types of networks, the broad literature is focused on generating unweighted networks. In this paper, we present a framework for generating weighted networks that satisfy user- defined criteria. Each criterion hierarchically defines a feature of the network and, in doing so, complements existing algorithms in the literature. We use a general example of ecological species dispersal to illustrate the method and provide open- source code for academic purposes.
The Implications for Network Switch Design in a Networked FTI Data Acquisition SystemCranley, Nikki; ACRA Control (International Foundation for Telemetering, 2011-10)Switches are a critical component in any networked FTI data acquisition system in order to allow the forwarding of data from the DAU to the target destination devices such as the network recorder, PCM gateways, or ground station. Commercial off the shelf switches cannot meet the harsh operating conditions of FTI. This paper describes a hardware implementation of a crossbar switching architecture that meets the reliability and performance requirements of FTI equipment. Moreover, by combining the crossbar architecture with filtering techniques, the switch can be configured to achieve sophisticated forwarding operations. By way of illustration, a Gigabit network tap application is used to demonstrate the fundamental concepts of switching, forwarding, crossbar architecture, and filtering.