Escolar Documentos
Profissional Documentos
Cultura Documentos
Social Networks
journal homepage: www.elsevier.com/locate/socnet
a r t i c l e
i n f o
Keywords:
Granovetters thesis
Weak ties
Graph theory
Cooperative game theory
Gloves game
a b s t r a c t
We employ concepts from graph theory and cooperative game theory to reconstruct Granovetters famous
thesis concerning the strength of weak ties. In contrast to existing formal models related to this thesis,
our approach captures the mechanisms Granovetter invokes in the derivation of his thesis. Notably, our
model allows for an analytical distinction between the strength of ties and the value of ties a distinction
empirical research on the labor market has shown to be of great importance. We use our model to test
the theoretical validity of Granovetters thesis and to evaluate its robustness if implicit assumptions in
Granovetters argumentation are dropped.
2015 Published by Elsevier B.V.
1. Introduction
One of the most important and most widely cited articles in
sociology is Granovetter (1973). He is concerned with the ties or
links between agents. According to Granovetter (1973, p. 1366)
these links may have different strengths which stand for e.g. the
amount of time invested in a relationship, the emotional intensity governing the relationship, or the velocity of transmission of
information.
Granovetter bases his work on two postulates. First, he relates
ties between two agents to common ties with other agents.
Granovetter (1973, p. 1362) argues that a stronger tie between
agents 1 and 2 leads to a higher proportion of third agents to
whom both are tied. We call this the common-friends postulate.
Granovetter nds arguments from various elds in support of this
claim.
Granovetters second postulate is known as the forbidden triad.
In a typical network the strong ties an agent 1 has with 2 and 3 imply
a tie between agents 2 and 3. For example, 2 and 3 are friends with
1 and hence friends with each other (e.g. having met at parties
organized by 1). Therefore, Granovetter (1973, p. 1363) wants to
rule out the situation where 2 and 3 (both being friends with 1) do
not have a link between themselves. Triads that are not forbidden
are called balanced and so are networks without forbidden triads.
From the beginning, the thesis of the strength of weak ties was
applied to the labor market. Granovetter (1974) provides empirical support for the claim that workers use contacts in addition
to formal means if they search for a new job. Further, for reasons outlined above, scholars conjectured that weak ties should
be more important in the search for a new job, i.e., more jobs
should be found through the use of weak ties, these jobs should be
paid better and should have higher occupational prestige. Empirical studies show that about 4050% of all job matches are due to
social contacts (e.g. Franzen and Hangartner, 2006; Granovetter,
1974), conrming his rst claim. However, the second claim
weak ties are more important for job matches than strong ties
is highly controversial. Some studies provide clear negative evidence (e.g. Bridges and Villemez, 1986; Forse, 1997; Marsden and
Hurlbert, 1988), while other studies provide rather modest support
(e.g. Biang and Ang, 1997; Sprengers et al., 1988). More recently,
Tassier (2006, p. 706), whose own study validates the claim, comments on the state of the art as follows: In summary, despite the
intuitive appeal of the notion that using weak ties to nd a job may
increase income, for the most part, past effort to show a clear empirical link between weak ties and income have failed (Mouw, 2003).
Granovetter (2005, p. 37) himself comes to a somewhat more positive assessment: Whether the use of weak or other ties in nding
jobs signicantly affects wages, wage growth, job satisfaction and
productivity has been debated but not resolved. Large aggregated
data sets sometimes do not show clear effects (as in Mouw, 2003),
but more focused and specialized samples often do.
1.2. Theoretical models related to Granovetters thesis
While these empirical studies show that Granovetters thesis is
too general and must be qualied, the formal models related to
Granovetters ideas either corroborate his thesis or use the thesis
as an assumption to derive additional implications. Following are
short discussions of the most relevant models with respect to Granovetters thesis, i.e., Boorman (1975), Montgomery (1992, 1994),
Fararo (1983) and Fararo and Skvoretz (1987).
Boorman (1975) constructs a game-theoretical model based on
the following ideas. Each of a set of agents has to distribute a xed
time budget on weak ties and strong ties. Strong ties are more
expensive to maintain than weak ties. In each time period there
is a certain probability that an agent loses his job and there is a certain probability that an agent gets the information about a vacant
position (this information comes from outside the model). Each
agent employs a priority rule: If he gets the information about a
vacancy and is unemployed, he takes the job himself. If he is not
unemployed, he offers the job to some of his unemployed strong
contacts. If he and all of his strong contacts already have a job, he
offers the job to some of his unemployed weak contacts. Assuming that each agent wants to minimize the probability of being
unemployed, Boorman (1975) shows that in a symmetric equilibrium agents invest all their time in weak contacts, provided that
the probability of losing a job is not too close to 1.
While Granovetter and Boorman come to a similar conclusion
weak ties are more important than strong ties for the transmission of information in networks the underlying mechanisms are
very different. Granovetters argument rests on the forbidden triad
which has the consequence that all bridges are weak ties. Boorman
(1975, p. 224) explicitly rejects this idea and in fact assumes that
there are no closed triads, i.e., he assumes that if a is connected
with b and b is connected with c, there is no connection between a
and c. Instead, Boormans model is driven by the assumption that
strong ties take more time to maintain than weak ties. While this
assumption certainly is in line with Granovetters reasoning, Boormans model does not capture the central mechanism Granovetter
invokes to establish his thesis.
137
138
139
Note that the number of players and thus the number of paths
are nite.
As mentioned in the introduction, Granovetters typical
networks consist of cliques and bridges. A simple example is given
in Fig. 1 where
N = {1, . . ., 8} and
E = {12, 13, 14, 23, 24, 34, 26, 35, 56, 57, 67, 78}.
The players 1 through 4 form a clique and so do the players 5
through 7. Player 8 is a clique on his own. Thus, these cliques
partition N = {1, . . ., 8} into three components. The partition is
P = {{1, 2, 3, 4}, {5, 6, 7}, {8}}. Links 26, 35 and 78 are bridges.
Preparing the following denition, note that 26 is a bridge of
degree 3 because in the absence of this link players 2 and 6 would
need to be linked by the path (2, 3, 5, 6) with ((2, 3, 5, 6)) = 4 1 = 3.
Intuitively, Granovetters denition of the degree of a bridge refers
to the opportunity cost (in terms of path length) of not using a
specic bridge. Note, also, that this degree does not depend on the
strengths of the ties, but only on the length of the path.
Denition 5 (undirected graph, Granovetter). A Granovetter graph
G is a tuple (N, Eweak , Estrong ) where N is a set of vertices (or players,
or agents), Eweak (Estrong ) is the set of weak (strong) links such that
Eweak Estrong = .
Denition 6 (cliques and bridges, Granovetter). Assume a Granovetter graph (N, Eweak , Estrong ) and the existence of a partition PENstrong
(according to Denition 3). Components of this partition are also
called cliques. Every weak link between agents from different
cliques C1 and C2 is called a (local) bridge (Granovetter, 1973, p.
1364) between C1 and C2 . If there is only one such link, the bridge
is called global. The degree of a bridge ij is dened by
bridge (ij) :=
min
P(ij) P(ij),
(P(ij)).
ij : i is connected to j within K.
The resulting partition of equivalence classes is denoted by PEK
P(K).
Consider, for example, N = {1, 2, 3} and E = {12, 13}. We obtain
the partitions
PEN = {N}, PE{1,2} = {{1, 2}}, PE{1,3} = {{1, 3}} and
140
Agents ij are said to be directly connected if s(ij) > 0 holds and indirectly if cl(ij) > 0.
Note
Fig. 2. A probabilistic network.
The intuition is the same in both cases: The higher the social distance measured by (ij), the more difcult it is for agents i and j
to link up. Note also that the probabilistic concepts are related by
cl(ij) = 1 (ij).
We now want to introduce probabilistic cliques which is a group
of agents with social distances below a certain threshold.
Proposition 10.
i(s,)
j : (ij)
s(1, 2) =
1
,
4
s(1, 3) =
3
, s(1, 4) = 0,
4
s(2, 3) =
s(3, 4) = 0.
1
,
8
s(2, 4) =
1
,
5
Note also the probability for the link set 12, 13 on {1, 2, 3}:
s{1,2,3} (12, 13) =
1 3
1
1
4 4
8
21
128
s{1,2,3} () = 1
1
4
3
4
1
8
21
.
128
(P (ij)) := 1 m1
s ij , ij+1
j=0
min
P(ij) P(i1 i2 ),
(P(ij)).
i1 i2 contained in P(ij)
Consider c1 Ci and c2 C2 . i1 i2 is called a best bridge for c1 and c2
if i1 i2 is contained in a best path between c1 and c2 .
between local and global bridges. The reason will become clear once
we have introduced the triangular inequality.
3. Cooperative game theory
Our paper in using cooperative game theory to map interaction situations and network structures to payoff distributions is
in the tradition of sociological exchange theory (Bienenstock and
Bonacich, 1992, 1993; Braun and Gautschi, 2006; Tutic et al., 2011).
One may ask the question why we use cooperative rather than noncooperative game theory in our reconstruction of Granovetters
network theory. The main reason for this is that noncooperative game theory is [. . .] obsessed with procedural details [. . .]
(Aumann in van Damme, 1998, p. 198) concerning the rules and
structure of the game, the order of decision making, and the specic payoff functions of the players. Solutions to noncooperative
games are very sensitive to slight modications of the setup, which
restricts the applicability and the explanatory power of the models. In contrast, games in cooperative game theory are much more
abstract models of interaction situations the precise rules and
141
(v, E) = Sh(vE ),
A game (in coalition function form) is a pair (N, v) (often abbreviated by v) where N = {1, 2, . . ., n} is a nite set and v a function
2N R such that v() = 0. Elements of 2N are also called coalitions,
N the grand coalition and v a coalition function. The set of all games
on N is denoted by G(N).
The gloves game is one of the most popular market games in
cooperative game theory. It presupposes a player set N = L R where
L and R are disjunct sets of players holding one left or one right
glove, respectively. The coalition function for the gloves game is
given by
Two players i, j N are called symmetric if for all coalitions K obey/ K and j
/ K we have
ing i
R,
1
n!
MC Ki i () (v),
i N.
RO(N)
v(C).
CPE
sK (E)vE (K).
EK (2)
v|T :
vE (K) =
vs (K) =
2N
1
3
1
, s(1, 3) = , and s(2, 3) = .
3
4
4
We have
1 3 1
1 3
1
v(N)
v (N) + 1
3 4 4
3 4
4
1
3
1
1
3 1
+ 1
v(N) + 1
v(N)
3
4 4
3
4
4
1
3
1
+ 1
1
[v({1, 2}) + v({3})]
3
4
4 3
1
1
+ 1
1
[v({1, 3}) + v({2})]
3
4
4
1
1
3
+ 1
1
[v({2, 3}) + v({1})]
3
4 4
1
3
1
+ 1
1
1
[v({1}) + v({2})
3
4
4
+v({3})].
142
While we sympathize with the general idea, Granovetters postulate has two drawbacks:
The triad postulate merely rules out an absent tie between players 2 and 3 in case of strong ties 12 and 13. However, it would
clearly be desirable to make the minimum strength of the tie 23
a monotonic function of the strengths of the ties 12 and 13.
It is unclear how to extend the forbidden triad to quadruples or
more involved networks. Consider Fig. 4 and the top-left network
where the links 12, 13 and 34 are strong. Would it be in the spirit
of the forbidden triad to demand a weak or strong link 24? Granovetters postulate implies links 14 and 23 which could be weak
or strong. If both are weak, the link 24 can be absent (top right);
if one of them or both are strong, the link 24 may not be absent
(middle right).
The following subsection tackles these problems.
4.2. Triangular inequality
We now offer a formalization of Granovetters postulate of forbidden triads. Consider the bottom left network in Fig. 3 with link
strengths s(12), s(13), and s(23). Players 2 and 3 may be linked
directly or indirectly (via player 1). If their direct link is very weak
they will prefer to link up with the help of player 1. Thus, we have a
lower bound on s(23). To put this idea in general terms, we suggest
the following postulates and denitions:
/ k =
/ i, we
Axiom 12 (triangular inequality). For all i, j and k N, j =
postulate s(ij) s(ik) s(jk).
the number of other agents k tied to both i and j over the number
of agents k tied to i or j (including i and j). Therefore, we suggest to
translate the common-friends postulate by the following axiom:
Axiom 19 (common-friends I). For any players i and j, i =
/ j, we have
CFR(ij)
0,
s(ij)
Fig. 4. Is the quad with three strong links forbidden?
where we let
0
0
= 1.
143
s(ij) CFR(ij),
0
0
where we let
= 1.
where
min(cl , cr ) > max(b11 , b12 , b21 , b22 ) and
partition P(s,)
of (s, )-cliques. Granovetters thesis I is said to hold
vs{l
where s cd (s i1 i2 ) is the (possibly unbalanced) network resulting from s if the link strength of cd (of i1 i2 ) is reduced to zero.
2b11 b12 b21 b22 (cl + cr )(b11 b12 b21 + b11 b12 b22
+ b11 b21 b22 + b12 b21 b22 ) 2cl cr (b11 b12 + b11 b21
Note that our denition refers to the worth of the grand coalition. Of course, other denitions are also defendable. For example,
one might compare the payoff increase for players inside a clique
with the payoff increase for players forming a bridge.
Denition 23 (Granovetters thesis II). Assume a player set N, a
coalition function v and a balanced probabilistic graph s. Assume
also a partition P
of (s, )-cliques.
Granovetters thesis II is said
(s,)
dv (N)
dv (N)
<
.
ds(cd)
ds(i1 i2 )
vs{l
144
with the two cliques {l1 , r1 } and {l2 , r2 } and the associated clique
assumptions
min(c1 , c2 ) > max(bl , br , b12 , b21 ) and
min(b11 , b12 , b21 , b22 ) > 0.
In testing Granovetters thesis I, we need two comparisons. If we
remove the strong link l1 r1 , we can remove either the weak link l1 l2
or the weak link l1 r2 .
Proposition 26. Assume the gloves game v and the above probabilistic network s in the special case of b := bl = br = b12 = b21 and c := c1 = c2 .
In case of c := 1, Granovetters thesis I does not hold for the link pair
l1 r1 and l1 l2 . For any c, Granovetters thesis I does not hold for the link
pair l1 r1 and l1 r2 . These results are strictly in disfavor of Granovetters
thesis with the notable exception of equality for the (symmetric!) link
pair l1 r1 and l1 r2 in case of b = c.
Similarly, Granovetters thesis II does not hold for the link pair l1 r1
and l1 l2 , but for the link pair l1 r1 and l1 r2 .
Thus, Granovetters implicit assumptions are vital for the validity of his thesis, if we look at our rst test (thesis I). Surprisingly,
these assumptions seem not to be too important, if we use an alternative test (thesis II). When interpreting this nding, keep in mind
that the alternative test is not as close as the rst test to Granovetters original argumentation.
5.5. Relationship to the empirical literature
Though our analysis primarily aims at a better understanding of the theoretical underpinnings of Granovetters thesis, our
results also connect nicely with some of the most interesting ndings regarding the workings of social capital (cf. Flap and Volker,
2013) in the labor market. As already indicated in the introduction,
empirical research on the use of informal means in job search provides only modest support for Granovetters thesis. While social
contacts are frequently used in getting a job, weak ties do not necessarily trump strong ties in terms of providing access to better
jobs.
Lin (1982, 1999; see also 2001) proposed the probably most
inuential theoretical solution to the puzzle, why there is only
mixed evidence with respect to the benecial effects of using weak
ties in job search. In terms of social capital, Lin argues that (1) the
higher the social status of the contact, the better the job outcome
for the seeker. He adds that (2) weak ties are not valuable per se, but
weak ties have a greater capability of bridging gaps between status groups. That is, especially for low-status actors weak ties might
provide the only connection to high-status actors who in turn could
boost their status attainment. Granovetter (1983) embraces these
ideas and essentially argues that (2) might hold to different degrees
depending on the actors occupational eld and status. This in turn
explains, why some studies nd positive effects of weak-tie connections on status attainment, while other studies nd negative
effects. In the meantime, Lins account has received considerable
empirical support (e.g. Biang and Ang, 1997; Ensel, 1979; Lai et al.,
1998; Lin et al., 1981; Lin and Dumin, 1986; Marsden and Hurlbert,
1988; Volker and Flap, 1999), although part (2) of his argument
appears to be a bit more shaky than part (1).
Our reconstruction backs Lins argument from a formal point
of view. Recall, part (1) of Lins argument states that ties to highstatus actors are valuable to job seekers. Though in a strict sense
status is absent in our model, it is captured indirectly via the productivity and hence the value of ties. Propositions 25 and 26 differ
with respect to the productivity of the dyads connected by weak
ties. That is, if weak ties connect complements as in the premise of
Proposition 25, part (2) of Lins argument is fullled, in the sense
that weak ties are valuable for both parties involved. Backing Lins
argument, we nd favorable conditions for the truthfulness of Granovetters thesis under these conditions. However, in case weak ties
connect substitutes as in the premise of Proposition 26, part (2) of
Lins argument is violated, because weak ties do not provide benets for the connected actors. In line with Lins reasoning, we nd
that Granovetters thesis generally lacks validity in this scenario. In
this sense our reconstruction of Granovetters network theory captures Lins reasoning on network effects on the labor market. Also,
to the extent that empirically networks of the type described by
Proposition 25 are more likely to occur than networks of the type
assumed in Proposition 26, our model predicts overall benecial
effects of weak ties on status attainment.
Generally speaking, the main lesson to learn from the empirical
literature on Granovetters network theory is the fact that weak ties
are not valuable per se but, depending on the application under consideration, under additional assumptions. As demonstrated with
respect to network effects on the labor market, our framework provides a powerful tool to theorize both the strength of ties and the
value of ties by combining probabilistic networks and cooperative
game theory.
145
s(i1 , i2 )s(i2 , i0 )
s(i1 , i2 )[s(i2 , i3 )s(i3 , i0 )]
6. Conclusion
...
While there are some formal models related to Granovetters thesis, this paper provides a formalization not only of his
thesis, but also of its derivation. This is accomplished by combining concepts from graph theory and cooperative game theory.
The usage of game theory allows us to take into account the
major lesson from empirical research on Granovetters thesis:
The analytical distinction between the strength of ties and the
value of ties. We use our model to put Granovetters thesis to a
test of its theoretical validity. It turns out that cum grano salis
Granovetters thesis holds, provided that Granovetters implicit
assumptions concerning homophily and benecial consequences
of bridges between distinct cliques hold. Also by analyzing a situation in which these assumptions are violated and comparing
the results to a situation in which they are satised, we nd support for Lins theory regarding the strength of weak ties in job
search.
In our view, a major drawback of Granovetters argument and
hence also of our reconstruction is the fact that a proper notion
of long run equilibrium is missing. That is, Granovetter starts
with balanced networks and removes links from these in deriving
his thesis. The removal of links from a balanced network typically leads to an unbalanced network, and hence the question
arises how the network restores balance in the long run. We feel
that future work on Granovetters network theory should explore
the question under what circumstances his thesis holds when
long term consequences of balancing tendencies are taken into
account.
Finally, we want to stress that cooperative game theory proved
to be a very powerful tool in our reconstruction of Granovetters network theory. With the very notable exception of Braun
and Gautschi (2006) little work has been put in this direction
recently. To us it seems that cooperative game theory has much
more potential to be useful for formalizing the ideas of sociologists like Granovetter or Emerson than is recognized at the
moment.
s(ij , ij+1 ),
m1
j=1
so that s is also cycle-balanced. The other direction of the proof
obtains for m = 3.
Proof of Proposition 21. The triangular inequality implies that
indirectly connected nodes are directly connected. Therefore, if the
triangular inequality holds and if s(ij) is strictly positive, we nd
|{k N\{i, j} : s(ik) > 0 and s(jk) > 0}|
= 1,
|{k N\{i, j} : s(ik) > 0 or s(jk) > 0}|
so that common-friends II is fullled for any s(ij) [0, 1]. Common
friends II does not imply the triangular inequality which can be seen
from the network consisting of three players 1, 2, and 3 with link
strengths s(12) = s(13) = 1, s(23) = 0.4 which satisfy common-friends
II but not the triangular inequality.
Proof of Proposition 24. The proof consists of straightforward
but very (!) tedious calculations. It is available from the authors
upon request.
Proof of Proposition 25. We rst check on variant I. Eliminating
the link between l1 and l2 leads to the value difference
vs{l
1 l2 )
(N) v(sl
{l ,l },{r
1 2
1 ,r2 }
(N)
= b11 b12 cl + b21 b22 cl cl (b11 b12 b21 + b11 b12 b22 + b11 b21 b22
+ b12 b21 b22 ) 2cl cr (b11 b12 + b11 b21 + b11 b22 + b12 b21 + b12 b22
+ b21 b22 ) + 2b11 b12 b21 b22 cl + cl cr (3b11 b12 b21 + 3b11 b12 b22
+ 3b11 b21 b22 + 3b12 b21 b22 ) 4b11 b12 b21 b22 cl cr
+ cl cr (b11 + b12 + b21 + b22 ),
while the elimination of the link l1 r1 yields
vs{l
1 r1 )
(N) v(sl
{l ,l },{r
1 2
1 ,r2 }
(N)
= b11 b11 (b12 + b21 ) + b11 b12 b21 + b11 b12 b22 + b11 b21 b22
Acknowledgements
+ b11 b12 cl + b11 b21 cr 2b11 b12 b21 b22 (cl + cr )(b11 b12 b21
+ b11 b12 b22 + b11 b21 b22 ) 2cl cr (b11 b12 + b11 b21 + b11 b22 )
+ 2b11 b12 b21 b22 (cl + cr ) + cl cr (3b11 b12 b21 + 3b11 b12 b22
+ 3b11 b21 b22 ) 4b11 b12 b21 b22 cl cr + cl cr b11 .
Granovetters thesis I holds for our simple gloves game if
Appendix
s(13)s(23)
< vs{l
> s(12)
2cl cr (b12 b21 + b12 b22 + b21 b22 ) + cl cr (3b12 b21 b22 )
s(12)s(23)
+ cl cr (b12 + b21 + b22 ) b11 + b11 (b12 + b21 ) b11 b12 b21
b11 b12 b22 b11 b21 b22 b11 b21 cr + 2b11 b12 b21 b22
2b11 b12 b21 b22 cr < 0.
146
dv{l
ds(l1 l2 )
1
2
= b11 b12 + b21 b22 (b11 b12 b21 + b11 b12 b22
and
ds(l1 r1 )
+ b11 b21 b22 + b12 b21 b22 ) 2cr (b11 b12 + b11 b21
+ 3b11 b21 b22 + 3b12 b21 b22 ) 4b11 b12 b21 b22 cr
(s,l1 r1 )
(N)
1 ,l2 },{r1 ,r2 }
+ 2b11 b12 b21 b22 + cr (3b11 b12 b21 + 3b11 b12 b22
dv{l
and
1 r1 )
v(sl
(N) = b21 + c2 + b12 c2 (b12 + b21 ) + b12 b21 c2
{l1 ,l2 },{r1 ,r2 }
dv{l
ds(l1 l2 )
+ bl br (b12 + b21 + c2 )
and
1 r2 )
v(sl
(N) = b21 + c2 + c1 (c1 + c2 )b21 + c1 b21 c2 + b21 c2 bl
{l1 ,l2 },{r1 ,r2 }
and
(s,l1 r1 )
(N)
1 ,l2 },{r1 ,r2 }
dv{l
ds(l1 r1 )
3 2
+ 9b c 4b c + c .
Now, we have Granovetters thesis II, i.e., the inequality
(s,l1 l2 )
(N)
1 ,l2 },{r1 ,r2 }
dv{l
ds(l1 l2 )
(s,l1 r1 )
<
dv
(N)
,
ds(l1 r1 )
if
2
dv{l
(N)
ds (l1 r1 )
= (b 1)
and
2
b(2 b) < 1
and Granovetters thesis II is true
for sufciently small bridge
strengths (more precisely, b < 32 12 5 0.381 97). In the special
case of c = 0.8, however, Granovetters thesis II holds for b < 0.537
or for b > 0.716 (both gures are approximated).
Proof of Proposition 26.
versus l1 l2 . Substituting
cl bl , cr br , b11 c1 , b22 c2
(s,l1 l2 )
(N)
1 ,l2 },{r1 ,r2 }
dv{l
ds(l1 l2 )
(s,l r )
dv{l ,l1 2},{r ,r } (N)
dv 1 1 (N)
1 2
1 2
<
ds(l1 r1 )
ds(l1 l2 )
or
2
by
dv{l
ds(l1 r2 )
= s .
dv
Since
(s,l1 r1 )
(N)
{l1 ,l2 },{r1 ,r2 }
ds(l1 r1 )
(s,l1 r2 )
(N)
{l1 ,l2 },{r1 ,r2 }
ds(l1 r2 )
= 1.
(2)
Stri (ij)(s)
Proof of Proposition 28. We have to show both upper hemicontinuity and lower hemicontinuity of Stri (ij). Note, rst of all,
Stri (ij)(s) = [s , 1] for s := max s(ik) s(jk). We now show upper
/ j,
k=
/ i
k=
hemicontinuity. According to de la Fuente, 2000, p. 112) it sufces to show that Stri (ij) is closed. Consider any sequence (s ) of
probabilistic networks that converges to some probabilistic network s. It gives rise to a sequence S tri (ij) (s ) of allowed sets of link
strengths. Consider the
(s(ij) ) of link strengths obeying
sequence
s(ij) S tri (ij) (s ) = s , 1 that converges to some t (ij). We have
shown the closedness of S tri (ij) if we can show t (ij) S tri (ij) s =
[s , 1].
/ S tri (ij)(s) = [s , 1]. Then there exists an > 0 such
Assume t(ij)
that t(ij) + < s . By s(ij) t(ij) there exists an 0 such that
s(ij) + < s for all 0 . By s s there exists an 1 such
that
j,k1,...,n
For these 1 we nd
s
< s
s + 2 + 2
147
Thus s(ij)
/ S tri (ij) (s ) = s , 1 for all max( 0 , 1 ) which
yields the desired contradiction.
We now turn to lower hemicontinuity. Following de la Fuente
(2000, p. 111) we consider a sequence (s ) of probabilistic networks
with s s. We also consider an arbitrary element t(ij) from
S tri (ij)(s) = [s , 1]. We need to show the existence of
a sequence
(s(ij) ) of link strengths obeying s(ij) S tri (ij) (s ) = s , 1 and
that s(ij) t(ij).
Assume, rst, s = 1. Then t(ij) = 1. Dene s(ij) := 1 so that we
have s(ij) S tri (ij) (s ) and s(ij) t(ij)
Assume, now, s < 1. Let :=
t(ij)s
.
1s
Then 0 1. We dene
s(ij) := s + 1 s .
We have s(ij) S tri (ij) (s ) and, by s s, s s . Hence s(ij)
s + (1 s ) = t(ij). This completes the proof of Stri (ij)s continuity.
We now show that ScfII is not upper-hemicontinuous at
s = (s (12) , (13) , s (23)) = 0, 13 , 23 . Take the sequence (s ) =
1
, 13 ,
N,
2
3
we
which
converges
S cfII
obtain
s = 0, 31 ,
to
(23) (s ) =
= [0, 1] ,
2
3
For
all
while
S (23) 0, 13 ,
1
2
0
1
1
2
2
3
=
at
, 12 , . . .
=
/ 0, upper
References
Biang, Y., Ang, S., 1997. Guanxi networks and job mobility in China and Singapore.
Soc. Forces 75, 9811005.
Bienenstock, E.J., Bonacich, P., 1992. The core as a solution concept to negatively
connected networks. Soc. Netw. 14, 231243.
Bienenstock, E.J., Bonacich, P., 1993. Game-theory models for exchange networks:
experimental results. Sociol. Perspect. 36, 117135.
Bollobas, B., 1998. Modern Graph Theory. Springer, New York.
Boorman, S.A., 1975. A combinatorial optimization model for transmission of job
information through contact networks. Bell J. Econ. 6, 216249.
Braun, N., Gautschi, T., 2006. A nash bargaining model for simple exchange networks.
Soc. Netw. 28, 123.
Bridges, W., Villemez, W., 1986. Informal hiring and income in the labor market. Am.
Sociol. Rev. 51, 574582.
Calvo, E., Lasaga, J., van den Nouweland, A., 1999. Values of games with probabilistic
graphs. Math. Soc. Sci. 37, 7995.
de la Fuente, A., 2000. Mathematical Methods and Models for Economists. Cambridge
University Press, Cambridge.
Easley, D., Kleinberg, J., 2010. Networks, Crowds, and Markets, Reasoning about a
Highly Connected World. Cambridge University Press, Cambridge.
Ensel, W.M., 1979. Sex, Social Ties, and Status Attainment. State University of New
York at Albany Press, Albany.
Fararo, T.J., 1983. Biased networks and the strength of weak ties. Soc. Netw. 5, 111.
Fararo, T.J., Skvoretz, 1987. Unication research programs: integrating two structural theories. Am. J. Sociol. 92, 11831209.
Forse, M., 1997. Capital social et emploi. LAnnee Sociol. 47, 27215.
Flap, H., Volker, B., 2013. Social capital. In: Wittek, R., Snijders, T., Nee, V. (Eds.), Handbook of Rational Choice Social Research. Stanford University Press, Stanford, pp.
220251.
Foster, C., Rapoport, A., Orwant, C., 1963. A study of a large sociogram II: elimination
of free parameters. Behav. Sci. 8, 5665.
Franzen, A., Hangartner, D., 2006. Social networks and labour market outcomes: the
non-monetary benets of social capital. Eur. Sociol. Rev. 22, 353368.
Granovetter, M.S., 1973. The strength of weak ties. Am. J. Sociol. 78, 13601380.
Granovetter, M.S., 1974. Getting a Job: A Study of Contacts and Careers. University
of Chicago Press, Chicago.
148
Granovetter, M.S., 1983. The strength of weak ties: a network theory revisited. Sociol.
Theory 1, 201233.
Granovetter, M.S., 2005. The impact of social structure on economic outcomes. J.
Econ. Perspect. 19, 3350.
Lai, G.W., Lin, N., Leung, S., 1998. Network resources, contact resources, and status
attainment. Soc. Netw. 20, 159178.
Lin, N., 1982. Social resources and instrumental action. In: Marsden, P., Lin,
N. (Eds.), Social Structure and Network Analysis. Sage, Beverly-Hills, pp.
131145.
Lin, N., 1999. Social networks and status attainment. Ann. Rev. Sociol. 25,
467487.
Lin, N., 2001. Social Capital: A Theory of Social Structure and Action. Cambridge
University Press, Cambridge.
Lin, N., Dumin, M., 1986. Access to occupations through social ties. Soc. Netw. 8,
365385.
Lin, N., Ensel, W.M., Vaughn, J.C., 1981. Social resources and strength of ties: structural factors in occupational status attainment. Am. Sociol. Rev. 46, 393405.
Marsden, P., Hurlbert, J., 1988. Social resources and mobility outcomes: a replication
and extension. Soc. Forces 66, 10381059.
Montgomery, J.D., 1992. Job search and network composition: implications of the
strength-of-weak-ties hypothesis. Am. Sociol. Rev. 57, 586596.
Montgomery, J.D., 1994. Weak ties, employment, and inequality: an equilibrium
analysis. Am. J. Sociol. 99, 12121236.
Mortensen, D.T., 1986. Job search and labor market analysis. In: Ashenfelter, O.,
Layard, R. (Eds.), Handbook of Labor Economics II. North-Holland, Amsterdam,
pp. 849919.
Mouw, T., 2003. Social capital and nding a job: do contacts matter? Am. Sociol. Rev.
68, 868898.
Myerson, R.B., 1977. Graphs and cooperation in games. Math. Oper. Res. 2, 225229.
Rapoport, A., 1979. A probabilistic approach to networks. Soc. Netw. 2, 118.
Schmeidler, D., 1969. The nucleolus of a characteristic function game. SIAM J. Appl.
Math. 17, 11631170.
Shapley, L.S., 1953. A value for N-person games. In: Kuhn, H., Tucker, A.W. (Eds.),
Contributions to the Theory of Games. Princeton University Press, Princeton,
pp. 307317.
Shapley, L.S., Shubik, M., 1969. Pure competition, coalitional power, and fair division.
Int. Econ. Rev. 10, 337362.
Sprengers, M., Tazelaar, F., Flap, H., 1988. Social resources, situational constraints,
and reemployment. Neth. J. Sociol. 24, 98116.
Tassier, T., 2006. Labor market implications of weak ties. South. Econ. J. 72, 704719.
A., Pfau, S., Casajus, A., 2011. Experiments on bilateral bargaining in markets.
Tutic,
Theory Decis. 70, 529546.
van Damme, E., 1998. On the state of the art in game theory: an interview with
Robert Aumann. Games Econ. Behav. 24, 181210.
Volker, B., Flap, H., 1999. Getting ahead in the GDR. Social capital and status attainment under communism. Acta Sociol. 42, 1734.