How Intra-Firm Networks Create Value and Liabilities in Micro-Level Processes of Global Virtual Teams

Total Page:16

File Type:pdf, Size:1020Kb

How Intra-Firm Networks Create Value and Liabilities in Micro-Level Processes of Global Virtual Teams How Intra-firm Networks Create Value and Liabilities in Micro-level Processes of Global Virtual Teams By Pekka Vahtera PhD Candidate Leeds University Business School Centre for International Business University of Leeds (CIBUL) University of Leeds Supervised by: Professor Peter Buckley Professor Jeremy Clegg Mr. Adam Cross Submitted in accordance with the requirements for the degree of Doctor of Philosophy Submitted for examination on September 2013 The candidate confirms that the work submitted is his/her own and that appropriate credit has been given where reference has been made to the work of others. This copy has been supplied on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. © 2013The University of Leeds and Pekka Johannes Vahtera II Acknowledgements This thesis has been completed with the help and support of many people. My first acknowledgement goes to Jonna, my loving fiancée. She has supported me throughout my academic studies in Finland, Australia, and United Kingdom unconditionally for a long time. Her love, support, and encouragement have been my greatest assets in making this dissertation possible. I would also like to extend my warmest thanks to my family. My Mom has always supported me in every way possible, and encouraged me to further pursue my academic studies. Her advice and assistance have formed the very basis upon which this dissertation is built on. I am also grateful to my sister, who has always been proud of my achievements and highly supportive of my studies. People in CIBUL have had a remarkable impact on my studies throughout. I have been very proud to be supervised by Peter, Jeremy, and Adam, who have formed an excellent supervisory team. From the day one, I have been very impressed with the amount of time and dedication these academics place into supervising their PhD students. The help and guidance I have received from them has been immensely valuable. Moreover, it has been an absolute pleasure to work with other wonderful people in CIBUL, especially: Mario Kafouros, Hanna Gajewska-De Mattos, Hinrich Voss, Surender Munjal, Liz Mason, Hayley Smith, and Janet Wood. I would also like to thank the Finnish Cultural Foundation as well as the Foundation for Economic Education (Finland) for their financial support. Scholarships obtained from these foundations have covered the main expenditures involved in crafting this dissertation and therefore made this study possible. Finally, I would like to thank my colleagues and friends who have made my studies and my life in Leeds in general a fantastic experience. Especially, I would like to extend my gratitude to Conor McDonald, Charlotte Coleman, Jane Stoate, Adam Clenton, Ger Duff, Lucy McVay, Janja Trstenjak, Liang Chen, and Le Thai Phong. Pekka Vahtera Leeds, March 2014 III Abstract Research on organisational networks is abundant, yet understanding about the positive and negative effects of networks in global business settings remains relatively limited. This dissertation analyses the network mechanisms that add value to global virtual teams (GVTs). More specifically, it examines the role of (i) network structure, (ii) individuals’ network position, and (iii) the types of relationships which people share as both value-adding mechanisms as well as sources of potential liabilities. Added value in this study refers to interpersonal benefits which may help GVTs realise their full potential, meaning an increased knowledge flow, decreased levels of conflict and a higher degree of integration among diverse team members, amongst other things. The theoretical underpinning of this study lies within the intersection of network theory, international business, and virtual team management. The empirical analysis is conducted within a social network data set collected from 160 GVT members from three multinational companies working in a high technology sector. Statistical analyses of these data suggest that network mechanisms such as the types of ties people share (i.e. friendship), reciprocity (i.e. two-way interaction), the structure of ties (i.e. cliques), and an individual’s network positions (i.e. brokerage over structural holes) have important effects on knowledge sharing and potential for conflict. Surprisingly, the GVTs are found to show little tendency for homophily (tendency for similar others) and no support is found for the argument that cultural dissimilarities or geographical distance would negatively affect interpersonal interactions. It is concluded that network-based theories need to be more rigorously tested in global contexts in order to truly evaluate their generalisability for international business. IV Table of Contents Acknowledgements ................................................................................................................... II Abstract .................................................................................................................................... III List of tables ............................................................................................................................. IX List of figures ........................................................................................................................... IX Glossary of terms and abbreviations ........................................................................................ XI 1. Introduction to the dissertation .......................................................................................... 1 1.1 Formal and informal networks in organisations .......................................................... 2 1.2 Defining global virtual teams ...................................................................................... 4 1.3 Social networks in global business environments ....................................................... 7 1.4 Positioning of the present study .................................................................................. 9 1.5 Research objectives ................................................................................................... 16 1.6 Research setting......................................................................................................... 18 2.1 Methodological underpinning: methodological individualism ................................. 19 1.7 Contribution to theory and practice ........................................................................... 21 1.8 Structure of the dissertation....................................................................................... 23 2 Previous research and context of the dissertation ............................................................ 27 2.2 Complexity of the global business environment ....................................................... 27 2.3 Key benefits of virtuality and technology in GVTs .................................................. 29 2.4 Key challenges of virtuality and technology in GVTs .............................................. 31 2.5 Key benefits of diversity in GVTs ............................................................................ 35 2.6 Key challenges induced by diversity ......................................................................... 38 2.7 Managing diversity .................................................................................................... 41 2.8 The effect of group size for GVTs ............................................................................ 43 2.9 Structure of a GVT: hierarchy and centralisation of decision-making ..................... 43 3 Overview of network theory ............................................................................................ 48 3.1 Network theory and social network analysis............................................................. 49 3.1.1 What is a network?............................................................................................. 49 V 3.1.2 A Brief history of social network analysis ......................................................... 49 3.1.3 What makes social network analysis a distinctive approach? ........................... 51 3.2 Introduction to key social network concepts ............................................................. 52 3.3 Key benefits of networks........................................................................................... 56 3.3.1 Social Capital ..................................................................................................... 56 3.3.2 Key benefits at the level of individual, group, and organisation ....................... 57 3.3.3 Benefits of networks in GVTs ........................................................................... 59 3.4 Costs and trade-offs in network formation ................................................................ 60 3.4.1 Network size ...................................................................................................... 61 3.4.2 Overly cohesive networks .................................................................................. 62 3.4.3 Overreliance on network partners ...................................................................... 64 3.4.4 Access to information and resources ................................................................. 65 3.5 Main criticisms of network theory and ways forward............................................... 67 4 Research methods ...........................................................................................................
Recommended publications
  • Evaluating Services and Systems Interventions
    Evaluating Services and Systems Interventions LEARNING AND GROWING THROUGH EVALUATION MODULE 5 2021 Updates National Center for Environmental Health Division of Environmental Health Science and Practice MODULE 5 TABLE OF CONTENTS Page Chapter 1 Evaluating Services and Systems Interventions ............................. 1-1 Step 1 – Engage Stakeholders ............................................................................................................... 1-6 Step 2 – Describe the Intervention ........................................................................................................ 1-7 Step 3 – Focus the Evaluation Design................................................................................................... 1-8 Step 4 – Gather Credible Evidence ..................................................................................................... 1-13 Step 5 – Justify Conclusions ............................................................................................................... 1-16 Step 6 – Ensure Use of Evaluation Findings and Share Lessons Learned .......................................... 1-18 Applying the Program Evaluation Standards Throughout the Evaluation.......................................... 1-19 LIST OF TABLES Table 1.1 Intervention Evaluation Question Types – Process Questions.................................................. 1-9 Table 1.2 Intervention Evaluation Question Types – Outcome Questions ............................................. 1-10 LIST OF FIGURES Figure 1.1 Comprehensive
    [Show full text]
  • Building Research Collaboration Networks - an Interpersonal Perspective for Research Capacity Building
    Huang 89 Building Research Collaboration Networks - An Interpersonal Perspective for Research Capacity Building Jun Song Huang, PhD National Institute of Education, Singapore Abstract: While collaboration is increasingly recognized to be important for research, researchers’ collaboration networks are still not adequately recognized as a form of research capacity in the literature. Research is a knowledge creation activity and interpersonal research collaboration networks are important for knowledge cross-fertilization and research productivity. By referring to social network theories, this paper argues that research collaboration networks are a form of research capacity at interpersonal level. It complements capacity building at individual, organizational and inter-organizational levels. However, building research collaborations can be challenging. Three key issues are raised for discussion. First, collaboration networks have nonlinear effecton research productivity. Second, fostering heterophilous communications and maintaining degrees of heterophily can be contradicting and thus challenging. Third, building research collaboration networks proactively requires shift of research management philosophy as wellas invention of analytical tools for research management. Debates and solutions with regard to these issues may contribute to the advancement of theory and practice of research management. Keywords: Capacity Building, Research Collaboration, Social Network Theories Introduction The development of social network theories has revealed
    [Show full text]
  • A Comparative Study of Financial Crimes and Criminal Networks in the United States
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Where Political Extremists and Greedy Criminals Meet: A Comparative Study of Financial Crimes and Criminal Networks in the United States Author: Roberta Belli, LL.M., Ph.D. Document No.: 234524 Date Received: June 2011 Award Number: 2009-IJ-CX-0006 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. WHERE POLITICAL EXTREMISTS AND GREEDY CRIMINALS MEET: A COMPARATIVE STUDY OF FINANCIAL CRIMES AND CRIMINAL NETWORKS IN THE UNITED STATES by Roberta Belli A dissertation submitted to the Graduate Faculty in Criminal Justice in partial fulfillment of the requirements for the degree of Doctor of Philosophy, The City University of New York 2011 This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S.
    [Show full text]
  • Challenges and Opportunities to Counter Information Operations Through Social Network Analysis and Theory
    2019 11th International Conference on Cyber Conflict: Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profit or Silent Battle non-commercial purposes is granted providing that copies bear this notice T. Minárik, S. Alatalu, S. Biondi, and a full citation on the first page. Any other reproduction or transmission M. Signoretti, I. Tolga, G. Visky (Eds.) requires prior written permission by NATO CCD COE. 2019 © NATO CCD COE Publications, Tallinn Challenges and Opportunities to Counter Information Operations Through Social Network Analysis and Theory Alicia Bargar, MS Stephanie Pitts, PhD Data Scientist Social Scientist Asymmetric Operations Asymmetric Operations Johns Hopkins Applied Physics Johns Hopkins Applied Physics Laboratory Laboratory Laurel, Maryland, United States Laurel, Maryland, United States [email protected] [email protected] Janis Butkevics, MS Ian McCulloh, PhD Data Scientist Chief Data Scientist Asymmetric Operations Accenture Federal Services Johns Hopkins Applied Physics Accenture Laboratory Arlington, Virginia, United States Laurel, Maryland, United States [email protected] [email protected] Abstract: Information operations on social media have recently attracted the attention of media outlets, research organizations and governments, given the proliferation of high-profile cases such as the alleged foreign interference in the 2016 US presidential election. Nation-states and multilateral organizations continue to face challenges while attempting to counter false narratives, due to lack of familiarity and experience with online environments, limited knowledge and theory of human interaction with and within these spaces, and the limitations imposed by those who own and maintain social media platforms.
    [Show full text]
  • Exploring the Characteristics of Innovation Adoption in Social Networks: Structure, Homophily, and Strategy
    Entropy 2013, 15, 2662-2678; doi:10.3390/e15072662 OPEN ACCESS entropy ISSN 1099-4300 www.mdpi.com/journal/entropy Article Exploring the Characteristics of Innovation Adoption in Social Networks: Structure, Homophily, and Strategy Yongli Li, Chong Wu *, Peng Luo and Wei Zhang School of Management, Harbin Institute of Technology, No.92 West Street, Harbin 150001, China; E-Mails: [email protected] (Y.L.); [email protected] (P.L.); [email protected] (W.Z.) * Author to whom correspondence should be addressed; E-Mail: [email protected]; Tel.: +86-158-0451-9346; Fax: +86-451-8641-4022. Received: 3 May 2013; in Revised form: 29 June 2013 / Accepted: 3 July 2013 / Published: 10 July 2013 Abstract: Exploration of the characteristics of innovation adoption in the context of social network will add new insights beyond the traditional innovation models. In this paper, we establish a new agent-based model to simulate the behaviors of agents in terms of innovation adoption. Specifically, we examine the effects of the network structure, homophily and strategy, among which homophily is a new topic in this field of innovation adoption. The experiments illustrate six important findings involving five aspects and their influences on the innovation adoption. The five aspects are initial conditions, homophily, network topology, rules of updating and strategy, respectively. This paper also compares the different cases within one aspect or across several aspects listed above. Accordingly, some management advices and future work are provided in the last part of this paper. Keywords: innovation adoption; homophily; network structure; adoption strategy; social networks; agent-based simulation 1.
    [Show full text]
  • The Pennsylvania State University the Graduate School
    The Pennsylvania State University The Graduate School College of the Liberal Arts TECHNOLOGY USE AND SOCIAL CONNECTION: MOBILE PHONE OWNERSHIP, DEVICE SHARING, AND SOCIAL TIES IN MALAWI A Dissertation in Sociology & Demography by Hannah E. Furnas © 2017 Hannah E. Furnas Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy August 2017 The dissertation of Hannah E. Furnas was reviewed and approved* by the following: Ashton Verdery Assistant Professor of Sociology and Demography Dissertation Co-Adviser Co-Chair of Committee Michelle Frisco Associate Professor of Sociology and Demography Dissertation Co-Adviser Co-Chair of Committee Jenny Trinitapoli Associate Professor of Sociology The University of Chicago Special Member Jennifer Van Hook Professor of Sociology and Demography Glenn Firebaugh Roy C. Buck Professor of American Institutions, Sociology, and Demography Carleen Maitland Associate Professor of Information Sciences and Technology John Iceland Professor of Sociology and Demography Department Head, Department of Sociology and Criminology *Signatures are on file in the Graduate School. ii ABSTRACT Scholars lack an understanding of how the digital divide – disparities in access to and use of technology – operates within developing nations. Sub-Saharan Africa (SSA), in particular, is experiencing enormous growth in access to and use of technology, although it is well documented that the region lags behind the rest of the world in mobile phone ownership and Internet use. Within SSA nations, the relationship between social ties, socioeconomic status, and the ownership and use of mobile phones lacks attention. In this dissertation, I investigate the digital divide in Malawi, a country in Southeastern Africa. I focus on mobile phones, given that mobile phones in Malawi are more common than other information and communication technologies and are the primary way people access the Internet.
    [Show full text]
  • View and Conceptualization 8
    CATCHING THE VIDEO VIRUS: UNDERSTANDING INDIVIDUALS INVOLVED IN DIFFUSION OF ONLINE VIDEOS THROUGH SOCIAL NETWORKS TRUPTI GUHA Master of Business Administration in Marketing K. J. Somaiya Institute of Management Studies and Research, Mumbai, India April 2004 Submitted in partial fulfillment of requirements for the degree MASTER OF APPLIED COMMUNICATION THEORY AND METHODOLOGY at the CLEVELAND STATE UNIVERSITY May, 2008 ACKNOWLEDGEMENTS Sincere gratitude goes out to my thesis advisor Dr. Gary Pettey for his guidance and support during my graduate studies at the School of Communication in Cleveland State University. With his enthusiasm, inspiration and explanations, he helped to make this thesis a great learning experience for me. I thank him for the constant encouragement throughout the course of this work. I would also like to thank my thesis committee members Dr. Cheryl Bracken and Dr. Robert Whitbred for their invaluable advice throughout the various revisions of this thesis. Their interest, assistance and questioning were of special importance in stimulating the arguments which follow. I am grateful to the faculty and the staff at the School of Communication for helping me out in many different ways. I also thank my fellow graduate students and colleagues for providing a stimulating and fun environment to learn and grow. I wish to thank my entire extended family for being supportive. Last but not least, I thank my husband Abhishek on whose encouragement and love I have relied throughout my time at Cleveland State University. CATCHING THE VIDEO VIRUS: UNDERSTANDING INDIVIDUALS INVOLVED IN DIFFUSION OF ONLINE VIDEOS THROUGH SOCIAL NETWORKS TRUPTI GUHA ABSTRACT In the process of computer-mediated exchange, some online videos travel from one person to another resulting in the process of diffusion of the video.
    [Show full text]