Skip to content
Licensed Unlicensed Requires Authentication Published by De Gruyter February 14, 2015

Risk Aversion and Social Networks

  • Jaromír Kovářík and Marco J. van der Leij EMAIL logo

Abstract

This paper first investigates empirically the relationship between risk aversion and social network structure in a large group of undergraduate students. We find that risk aversion is strongly correlated to local network clustering, that is, the probability that one has a social tie to friends of friends. We then propose a network formation model that generates this empirical finding, suggesting that locally superior information on benefits makes it more attractive for risk averse individuals to link to friends of friends. Finally, we discuss implications of this model. The model generates a positive correlation between local network clustering and benefits, even if benefits are distributed independently ex ante. This provides an alternative explanation of this relationship to the one given by the social capital literature. We also establish a linkage between the uncertainty of the environment and the network structure: risky environments generate more clustered and more unequal networks in terms of connectivity.

JEL codes: D81; D85

Corresponding author: Marco J. van der Leij, CeNDEF, University of Amsterdam, Valckeniersstraat 65-67, 1018 XE Amsterdam, The Netherlands, e-mail: ; Tinbergen Institute, Gustav Mahlerplein 117, 1082 MS Amsterdam, The Netherlands; and Research Department, De Nederlandsche Bank, Westeinde 1, 1017 ZN Amsterdam, The Netherlands

Acknowledgments

We thank Michèle Belot, Pablo Brañas, Arthur Campbell, Pascal Courty, María Paz Espinosa, Marcel Fafchamps, James Fowler, Edoardo Gallo, Jayant Ganguli, Sanjeev Goyal, Daan in ’t Veld, Matthew Jackson, Friederike Mengel, Paolo Pin, Andrea Prat, Giorgio Topa, Fernando Vega-Redondo, Adrien Vigier, Andrew Zeitlin and audiences at the European University Institute, University of Amsterdam, University of Cambridge, University of Málaga, University of the Basque Country, University of Oxford, University of Warwick, SAE 2009 in Zaragoza, ICFSN 2009 in Paris and EAA-ESEM 2009 in Barcelona. Marco van der Leij would like to thank The Netherlands Organisation for Scientific Research (NWO FinComplexity) and Jaromír Kovářík to the Spanish Ministerio de Economía y Competividad (ECO 2012-31626, ECO 2012-35820), the Government of the Basque Country (IT783-13), and GACR (14-22044S) for financial support. Views expressed are those of the authors and do not necessarily reflect official positions of De Nederlandsche Bank.

Appendix

A Perfect rationality for m=3

There is an important issue concerning the rationality of players for m>2. In particular, the clustering of the network can lead to a situation, such that anytime a node i links through network there is a positive probability that one or more of newly observed neighbors of neighbor have already been observed and not chosen in previous linking stages. A completely rational individual should take this into account. Since the entering node has not linked up to such node(s), i has information about them. This affects the mean field analysis, because the expected payoff from linking to such neighbors of neighbors is lower than the expected payoff i gets from observing and linking to someone i has no information about. In this section, we illustrate this argument formally.

Denote the nodes that t+1 connects in each linking stage as j1, j2 and j3. First, note that this issue never concerns the first and last linking decision, since the first is always random, while in the last linking decision the entering nodes do not care about who they observe afterwards. Hence, for m=3 the only linking decision, in which he may observe someone, whom he has already observed, is the second one. Suppose that t+1 decides to link to a node j2Nj1(t+1) such that j2argmaxjNj1(t+1)uij. If so, then there is a positive probability that j1 is connected to a neighbor of j2. It this occurs there exist a node l, an out-degree neighbor of both j1 and j2, who t+1 observes after linking to j1 and will observe after linking to j2. Furthermore, there is an important information in the fact that t+1 observed l, but has not connected to him.

Formally, t+1 links to a j2argmaxjNj1(t+1)uij if

(7)maxjNj1(t+1)uijs=1m1{C(g)s(ms)m[u¯msmu¯smamaxjNj1(t+1)uijudF(u)]}>u¯rt+1 (7)

where C(g) is the fraction of transitive triples in the population and measures the average probability that a triangle exists. C(g)=pθ(m1)m2pθm for m=3 and reflects the average probability that t+1 observes m–1 new individuals and 1 individual t+1 has already been observed and have not chosen because the utility he would reported to t+1 was lower that maxjNj1(t+1)uij. The second expression, u¯m1mu¯1mamaxjNj1(t+1)uijudF(u), reflects the expected utility loss due the fact that t+1 observes only m–1 new individuals (instead of m), taking into account the expected utility from the individual observed and unchosen in the previous linking stage.

After some simplification of (7), we get

(8)maxjNj1(t+1)uijs=1m1C(g)ss2ms[u¯amaxjNj1(t+1)uijudF(u)]>u¯rt+1 (8)
(9)maxjNj1(t+1)uij[s=1m1C(g)ss2ms][maxjNj1(t+1)uijbudF(u)]>u¯rt+1. (9)

As a result, the probability that t+1 links through network search in its second linking decision is

p2nd(rt+1)=1F[u¯rt+1+s=1m1C(g)ss2msmaxjNj1(t+1)uijbudF(u)m]>p(rt+1).

Then, the expected probability of node i<t+1 to receive a new link in t+1, analogous to expression (15), is

(10)ddi(t)dt=1t+[1p2nd(rt+1)t+p2nd(rt+1)di(t)t1m]+[1p(rt+1)t+p(rt+1)di(t)t1m]. (10)

The only difference between (15) and (10) is the intermediate term. The effect of perfect rationality is to enhance global search. In (10), it increases the probability of receiving a random link and decreases the probability of receiving a link from a neighbor of a neighbor. The overall effect, hence, depends on the current in-degree of each node. In particular, nodes with large in-degrees will be negatively affected by perfect rationality, because a large fraction of nodes they receive is through local linking. Nodes with low connectivity, on the other hand, benefit from the form of rationality we model here, since they receive almost no links through network anyway. Formally, ddi(t)dtp(rt+12nd)=di(t)t1m1t>0 if di(t)>m. Hence, the effect of the rationality discussed here is the following:

  • If di(t)>m, i receives a link with lower probability than in the original specification,

  • If di(t)=m, i is unaffected by the new specification,

  • If di(t)<m, i receives a link with higher probability in the new specification.

In sum, the effect of the perfect rationality considered here is to enhance random search. This will affect the in-degree of each agent as a function of his connectivity. From the global point of view, the tails of the degree distribution shift down, more frequent global search lowers the clustering coefficient, and the distances would shrink.

B Generated Network Architectures

In this section, we show theoretically and via simulations that the network formation process proposed in Section 3 exhibits typical features of empirical social networks. Given the complexity of the problem (especially due to the dependence of meetings on the network structure), we rely on mean-field analysis of the model. The mean-field approach approximates the complex evolution of a stochastic system by a simpler deterministic system, in which the evolution is determined by the expected change. The first results is theoretical: [20]

Theorem 6Under mean field approximation,

  1. if m>1 and p(rL)>0, the (complementary) cumulative distribution function of in-degrees in period t can be characterized as

    • (11)1Ft(d)=(m(m+pθmpθ)(m1)pθd+m(m+pθmpθ)(m1)pθ)m(m1)pθ (11)

  2. the average clustering coefficient in the network satisfies

    • (12)C(g)pθm2(m1). (12)

Proof of Theorem 6. Let us first prove part (i) of the theorem. For an entering individual t+1 after linking to js, p(r) equals the probability that at least one of m friends of js is more attractive than the benefits of linking randomly, that is

(13)p(r)=1F(u¯r)m. (13)

This probability naturally depends on the risk aversion of agent t+1, such that p(rH)>p(rL), and the expected probability that a random agent finds it optimal to follow a network-based meeting is pθ=θp(rH)+(1–θ)p(rL).

At entrance, the linking process of t+1 is as follows: She first links up randomly. Thus, for a particular agent i<t+1 the probability of receiving this link is 1t. Once this link has been created, t+1 faces m–1 decisions between linking locally through the network (by observing the neighbors of his neighbors), or linking to a randomly chosen agent from the population. In this case, the probability of i to increase its degree in one of these decisions is approximately

(14)1p(rt+1)t+p(rt+1)di(t)t1m, (14)

where the first part corresponds to the probability that t+1 decides for a random search and links up to i. The second part of the expression is the joint probability of three events: (i) t+1 finds it attractive to connect through the network structure, p(rt+1), (ii) she has connected to one of the di (in-degree) neighbors j of i in the previous decision, di(t)/t, [21] and (iii) i has the largest gain for t+1 out of the (out-degree) neighbors of j, 1/m.

Given that each link i<t+1 can receive at most one link in each period, that is, multiple links are ruled out, we can write the deterministic change of i’s in-degree in period t as

(15)ddi(t)dt=1t+(m1)[1pθt+pθdi(t)t1m]. (15)

Note that (15) can be rewritten as ddi(t)dt=adi(t)t+bt+c, where a=(m1)pθm,b=[1+(m–1)(1–pθ)], and c=0. Given that m>1 and that p(rL)>0 ensures pθ>0, the first part of Lemma 1 in Jackson and Rogers (2007) applies.

As for the clustering coefficient, consider an agent i. Each agent initially creates 1 random link and afterwards faces m–1 decisions to either link locally or search randomly. The first case occurs with probability p(ri). Thus the agent has on average p(ri)×(m–1) links that are based on network search. If k is found through network search, then it must be through j to whom i is also linked. So we have gij=gjk=gik=1. Each such network-searched link creates at least one transitive triple. Given that the amount of triples for which gij=gjk=1 equals m2 and E[p(ri)]=pθ, we obtain (12).    ■

Theorem 6 shows that – as long as there is a positive probability of low-risk individuals to find an attractive agent through network – f(d)d(m(m1)pθ+1) for large d; that is, the in-degree distribution of agents for large d has a power-law distribution in the tail, and the average clustering coefficient will be strictly positive independently of other characteristics of the model.

To check the precision of the mean-field approximations and to check whether the generated architectures exhibit other stylized facts of empirical social networks, we also run simulations of the model and match them with the approximations. The simulation assumes that uij is drawn from a standard uniform distribution. Agents have a risk premium of either rL=0 and rH=0.25 with equal probability (θ=0.5). We initially set m=2 and we generate a network of 5000 nodes. Figures 4 and 5 contain various plots for four of the five stylized facts of observed social networks that our model predicts. The distances are only discussed at the end of this section.

Figure 4 (A) The Predicted (solid line) and Simulated (crosses and circles) Degree Distributions. (B) The Average Clustering Coefficient.The solid line is the predicted lower bound from proposition 4.
Figure 4

(A) The Predicted (solid line) and Simulated (crosses and circles) Degree Distributions. (B) The Average Clustering Coefficient.

The solid line is the predicted lower bound from proposition 4.

Figure 5 (A) Relation Between Degree and Clustering. (B) Assortativity.
Figure 5

(A) Relation Between Degree and Clustering. (B) Assortativity.

The simulations confirm the findings from Theorem 6 and Proposition 1. Figure 4A contrasts the predicted in-degree distribution with the simulated one. We can conclude that the mean field approach approximates very well the degree distribution generated by the model. Moreover, we distinguish between the high (crosses) and low (circles) risk premium types and find no systematic difference. Figure 4B plots the average clustering coefficient (in terms of fraction of transitive triples) for several values of m. The figure shows that the clustering coefficient is indeed positive and lies above the lower bound derived in Proposition 6. In fact, the simulated values of the average clustering coefficient are well above and increase over m, suggesting that the more connections the agents of our model form, the more clustered the network becomes.

In addition, the generated networks exhibit short network distances, assortativity, and the negative clustering/degree correlation. The first states that the average network distances and the largest distance between two (reachable) nodes in real-life networks are in general low in relation to the size of the network. The second property, assortativity, is a tendency such that high (low) degree nodes are more likely linked to high (low) degree nodes. Last, negative clustering/degree correlation simply suggests that the larger the degree of the node the lower its clustering coefficient. The reader is referred to Goyal (2007) or Jackson (2008) for formal definitions and evidence.

Figure 5A shows the negative clustering/degree correlation. (Here the clustering coefficient is measured ignoring the direction of the links.) The x- and y-axes plot the degree and clustering, respectively, and there is an obvious negative relation between the two variables in the graph. Moreover, in this plot we also make a distinction between the clustering coefficient of high risk-averse agents and low risk-averse agents. The plot shows that the clustering coefficient is substantially higher for high-risk averse agents, in particular for low degree values, where the majority of the nodes lies. To check for assortativity, in Figure 5B we draw a plot with the degree of a node on the x-axis and the average degree of an out-neighboring node on the y-axis. This plot shows a positive correlation. Nodes with high degree have also high degree neighbors, indicating positive assortativity. We also compute the degree correlation, which is 0.260, well above zero.

To check for network distances, we compute the average networks distance and the largest distance between two nodes in the resulting simulated network, again ignoring directions. The obtained values are 5.74, and 13, respectively, thus of the order of ln(n).

C Proofs

Proof of Proposition 1. Using that the initial in-degree of entering agents is 0, solving (15) leads to the in-degree of an agent i at period t:

(16)di(t)=[m(m+pθmpθ)(m1)pθ](ti)(m1)pθmm(m+pθmpθ)(m1)pθ. (16)

Given that it is independent of ri, the first part of the proposition directly follows. The second follows from that p(rH)>p(rL), thus high types are more likely to search through the network. Each time an agent i decides to link through the network at least one transitive triple is created in its neighborhood, whereas the probability that a transitive triple is created after a random linking decision converges to 0 for large t. The proposition directly follows.       ■

Proof of Proposition 2. Note that

E[jNiuij|ri=r]=u¯+(m1){[1p(r)]u¯+p(r)E[maxjNiuij|maxjNiuij>u¯r]}.

Since

1p(rH)]u¯+p(rH)E[maxjNiuij|maxjNiuij>u¯rH]=au¯rHu¯dF(u)m+u¯rHbudF(u)m=au¯rHu¯dF(u)m+u¯rHu¯rLudF(u)m+u¯rLbudF(u)m<au¯rHu¯dF(u)m+u¯rHu¯rLu¯dF(u)m+u¯rLbudF(u)m=[1p(rL)]u¯+p(rL)E[maxjNiuij|maxjNiuij>u¯rL],

it directly follows that E[jNiuij|ri=rL]>E[jNiuij|ri=rH].      ■

Proof of Theorem 3. For any existing link ij, define Lij an indicator that is 1 if i found j through local network search, and 0 if found by random search. For any existing link ij, let

u¯E[uij|Lij=0]=abudF(u)

and

u˜E[uij|Lij=1]=P[ri=rH|Lij=1]E[uij|Lij=1,ri=rH]+P[ri=rL|Lij=1]E[uij|Lij=1,ri=rL]=P[ri=rH|Lij=1]u¯rHbudF(u)m+P[ri=rL|Lij=1]u¯rLbudF(u)m

denote the expected payoff of linking up to a random individual and a neighbor of a neighbor, respectively. Let Li=jNiLij. Then

E[jNiuij|Ci=c]=u¯E[mLi|Ci=c]+u˜E[Li|Ci=c].

Naturally, u˜>u¯. Hence, nodes who search more often locally will tend to earn higher payoffs.

To complete the proof, we now show that E[Li|Ci=c] is weakly increasing in c for m<5. Note that each node i can close at most j=1m1j=m(m1)2 triples in period i since links are directed and entering nodes can only link up to older nodes.

Suppose m=2. Then Ci is (approximately) 0 or positive, depending on whether the second link was random or via a friend of friend. Hence, E[Li|Ci=0]=0 and E[Li|Ci>0]=1.

Next, suppose m=3 and denote the out-degree neighbors of i as j1, j2, j3. Then Li is at most 2, and at most 3 triples can be closed. The first link does not close triples, the second link closes one triple if Lij2=1, and the third link closes one or two triples if Lij3=1. Hence, E[Li|Ci=0]=0, E[Li|Ci=1/9]=1, E[Li|Ci≥2/9]=2.

Finally, suppose m=4 and let i have out-degree neighbors j1, …, j4. Then Li is at most 3, and at most 6 triples can be closed. We have, E[Li|Ci=0]=0, E[Li|Ci=1/16]=1, E[Li|Ci=2/16]=2,, E[Li|Ci=3/16]∈(2, 3), and E[Li|Ci=4/16]=3.     ■

Proof of Proposition 4. With utility (5), the certainty equivalent y of linking to a random agent solves

Ui(y)=EF[U(x)].

Hence, with normal distribution of payoffs, y is given by

y=u¯ρi2σ2

The risk premium is defined as r=u¯y=ρi2σ2, leading to

p(ρi2σ2)=1F(u¯ρi2σ2)m.

With a normal distribution, F(u¯ρi2σ2)=Φ(ρi2σ) where Φ(.) is the cumulative distribution function of standard normal distribution. Since it is decreasing with σ2 and independent of u̅, the proposition directly follows.      ■

Proof of Theorem. Since pθ=θp(rH)+(1–θ)p(rL), it follows from Proposition 4 that ratio of the global and local search probabilities 1+(1pθ)(m1)pθ(m1) decreases with σ2 and is independent of u̅F. It then directly follows from Jackson and Rogers (2007), Theorem 6, that the degree distribution of g′ second order stochastically dominates the degree distribution of g whenever σ2>σ2, independently of u̅ and u̅̅′. Moreover, since pθ increases with σ2 and remains constant with u̅, the results on the clustering coefficient directly follow.      ■

References

Atalay, E. (2013) “Sources of Variation in Social Networks,” Games and Economic Behavior, 79:106–131.10.1016/j.geb.2013.01.009Search in Google Scholar

Ballester, C., A. Calvó-Armengol and Y. Zenou (2006) “Who is Who in Networks. Wanted: The Key Player,” Econometrica, 75(4):1403–1418.10.1111/j.1468-0262.2006.00709.xSearch in Google Scholar

Barabási, A. L. and R. Albert (1999) “Emergence of Scaling in Random Networks,” Science, 286(5439):509–512.10.1126/science.286.5439.509Search in Google Scholar

Bianconi, G. and A. L. Barabasi (2001) “Bose-Einstein Condensation in Complex Networks,” Physical Review Letters, 86(24):5632–5635.10.1103/PhysRevLett.86.5632Search in Google Scholar

Bloch, F., G. Genicot and D. Ray (2008) “Informal Insurance in Social Networks,” Journal of Economic Theory, 143:36–58.10.1016/j.jet.2008.01.008Search in Google Scholar

Bramoullé, Y. and R. Kranton (2007) “Risk-Sharing Networks,” Journal of Economic Behavior and Organization, 64:275–294.10.1016/j.jebo.2006.10.004Search in Google Scholar

Bramoullé, Y., S. Currarini, M. O. Jackson, P. Pin and B. W. Rogers (2012) “Homophily and Long-Run Integration in Social Networks,” Journal of Economic Theory, 147:1754–1786.10.1016/j.jet.2012.05.007Search in Google Scholar

Brañas-Garza, P., F. Jiménez-Jiménez and A. J. Morales (2004) “Strategic Uncertainty and Risk Attitudes: The Experimental Connection,” Cuadernos de Economa, 27:139–152.Search in Google Scholar

Burt, R. S. (1995) Structural Holes: The Social Structure of Competition. Cambridge: Harvard University Press.Search in Google Scholar

Burt, R. S., J. E. Jannotta and J. T. Mahoney (1998) “Personality Correlates of Structural Holes,” Social Networks, 20:63–87.10.1016/S0378-8733(97)00005-1Search in Google Scholar

Buskens, V. and A. Van de Rijt (2008) “Dynamics of Networks if Everyone Strives for Structural Holes,” American Journal of Sociology, 114:371–407.10.1086/590674Search in Google Scholar

Campbell, A. (2014) “Signaling in Social Networks and Social Capital Formation,” Economic Theory, 57:303–337.10.1007/s00199-014-0844-9Search in Google Scholar

Cesarini, D., C. Dawes, M. Johannesson, P. Lichtenstein and B. Wallace (2009) “Genetic Variation in Preferences for Giving and Risk Taking,” Quarterly Journal of Economics, 124:809–842.10.1162/qjec.2009.124.2.809Search in Google Scholar

Coleman, J. (1988) “Social Capital in the Creation of Human Capital,” American Journal of Sociology, 94:95–120.10.1086/228943Search in Google Scholar

Croson, R. and U. Gneezy (2009) “Gender Differences in Preferences,” Journal of Economic Literature, 47:448–474.10.1257/jel.47.2.448Search in Google Scholar

de Weerdt J. (2004) “Risk-Sharing and Endogenous Network Formation,” In: (S. Dercon ed.) Insurance Against Poverty. New York: Oxford University Press, pp. 197–216.10.1093/0199276838.003.0011Search in Google Scholar

Eeckhout, J. and K. Munshi (2010) “Matching in Informal Financial Institutions,” Journal of the European Economic Association, 8:947–988.10.1162/jeea_a_00012Search in Google Scholar

Fafchamps, M., S. Goyal and M. Van der Leij (2010) “Matching and Network Effects,” Journal of the European Economic Association, 8:203–231.10.1162/jeea.2010.8.1.203Search in Google Scholar

Fowler, J., C. Dawes and N. Christakis (2009) “A Model of Genetic Variation in Human Social Networks,” Proceedings of the National Academy of Sciences, 106(6):1720–1724.10.1073/pnas.0806746106Search in Google Scholar

Galeotti, A., S. Goyal and J. Kamphorst (2006) “Network Formation with Heterogeneous Players,” Games and Economic Behavior, 54(2):353–372.10.1016/j.geb.2005.02.003Search in Google Scholar

Goyal, S. (2007) Connections. An Introducion to the Economics of Networks. Princeton: Princeton Univ. Press.Search in Google Scholar

Goyal, S. and S. Joshi (2006) “Unequal Connections,” International Journal of Game Theory, 34:319–349.10.1007/s00182-006-0023-8Search in Google Scholar

Goyal, S. and F. Vega-Redondo (2007) “Structural Holes in Social Networks,” Journal of Economic Theory, 137:460–492.10.1016/j.jet.2007.01.006Search in Google Scholar

Goyal, S., M. J. van der Leij and J. L. Moraga-Gonzalez (2006) “Economics: An Emerging Small World,” Journal of Political Economy, 114(2):403–412.10.1086/500990Search in Google Scholar

Granovetter, M. (1985) “Economic Action and Social Structure: The Problem of Embeddedness,” American Journal of Sociology, 91:481–510.10.1086/228311Search in Google Scholar

Holt, C. A. and S. K. Laury (2002) “Risk Aversion and Incentive Effects,” American Economic Review, 92:1644–1655.10.1257/000282802762024700Search in Google Scholar

Jackson, M. (2008) Social and Economic Networks. Princeton: Princeton University Press.Search in Google Scholar

Jackson, M. and B. Rogers (2005) “The Economics of Small Worlds,” Journal of the European Economics Association, 3(2–3):617–627.10.1162/jeea.2005.3.2-3.617Search in Google Scholar

Jackson, M. and B. Rogers (2007) “Meeting Strangers and Friends of Friends: How Random Are Social Networks,” American Economic Review, 97(3):890–915.10.1257/aer.97.3.890Search in Google Scholar

Jackson, M. O. and A. Wolinsky (1996) “A Strategic Model of Social and Economic Networks,” Journal of Economic Theory, 71(1):44–74.10.1006/jeth.1996.0108Search in Google Scholar

Kong, J., N. Sarshar and V. Roychowdhury (2008) “Experience versus Talent Shapes the Structure of the Web,” Proceedings of the National Academy of Sciences 105(37):13724–13729.10.1073/pnas.0805921105Search in Google Scholar

Kovářík, J., P. Brañas-Garza, R. Cobo-Reyes, M. Paz Espinosa, N. Jiménez and G. Ponti (2012) “Prosocial Norms and Degree Heterogeneity in Social Networks,” Physica A, 392:849–853.10.1016/j.physa.2011.08.040Search in Google Scholar

Krishnan, P. and E. Sciubba (2009) “Links and Architecture in Village Networks,” Economic Journal, 119:917–949.10.1111/j.1468-0297.2009.02250.xSearch in Google Scholar

Lin, N. (1999) “Building a Network Theory of Social Capital,” Connections, 22:28–51.Search in Google Scholar

Montgomery, J. (1991) “Social Networks and Labor Market Outcomes: Toward an Economic Analysis,” American Economic Review, 81(5):1408–1418.Search in Google Scholar

Rothenberg, R. B., J. J. Potterat, D. E. Woodhouse, S. Q. Muth, W. W. Darrow and A. S. Klovdahl (1998) “Social Network Dynamics and HIV Transmission,” AIDS, 12(12):1529–1536.10.1097/00002030-199812000-00016Search in Google Scholar

Snyder, D. and E. L. Kick (1979) “Structural Position in the World System and Economic Growth, 1955-1970: A Multiple-Network Analysis of Transnational Interactions,” American Journal of Sociology, 84:1096–1126.10.1086/226902Search in Google Scholar

Vázquez, A. (2003) “Growing Network with Local Rules: Preferential Attachment, Clustering Hierarchy, and Degree Correlations,” Physical Review E, 67:056104.10.1103/PhysRevE.67.056104Search in Google Scholar

Vigier, A. (2014) “Meeting Friends of Friends and Homophily: A Complementarity,” Economic Theory Bulletin, 2:45–52.10.1007/s40505-013-0025-1Search in Google Scholar

Zaheer, A., and G. G. Bell (2005) “Benefiting from Network Position: Firm Capabilities, Structural Holes, and Performance,” Strategic Management Journal, 26:809–825.10.1002/smj.482Search in Google Scholar

Published Online: 2015-2-14
Published in Print: 2014-6-1

©2014 by De Gruyter

Downloaded on 27.5.2024 from https://www.degruyter.com/document/doi/10.1515/rne-2014-0029/html
Scroll to top button