INTRODUCTION
Two principles in network theory, often discussed as principles of brokerage and closure, are that achievement is more likely from people with large, open networks and that trust and reputation are more likely in closed networks. We discuss evidence for each principle below, but our introductory point is that the extensive evidence on the two principles from studies of business in North America and Europe warrants attention when thinking about China, where a critical role is advocated for social networks in the rise of entrepreneurial business and China's emergence as a global economic power (Nee & Opper, Reference Nee and Opper2012). Our purpose in this paper is to present unprecedented evidence of the two network principles operating in the networks around Chinese entrepreneurs. Much of what we report supports the thesis in Nee and Opper (Reference Nee and Opper2012) that China's emergence was a ‘bottom up’ process. In the absence of institutional support, Chinese entrepreneurs constructed in their social networks personal institutions to support their businesses. More, our results are relevant to generalizations about the role social networks play in Chinese business, some arguing that Chinese networks, often discussed as guanxi, are fundamentally different from networks in the West. Our results support the claim in certain ways, but also show that much of trust and achievement in China has the same network correlations associated with trust and achievement in the West.
The paper is in four parts. We introduce the network data, then turn to construct validity. Our network data have construct validity to the extent that network measures computed from the data have correlates established in theory and prior research. We report on two of the most basic correlates: success and trust. Construct validity is twice valuable here. First, it establishes that the Chinese data measure what they purport to measure. Second, and more to our purpose in this paper, it highlights similarities and differences in the way that basic network mechanisms operate in China versus the West. We close with four conclusions and suggestive beginnings for future research.
SOCIAL NETWORKS AND CHINESE ENTREPRENEURS
Collecting network data from a large random sample of entrepreneurs drawn from a heterogeneous area population is a challenge – all the more so in the context of China's economy where entrepreneurs are keen to protect the identity of their personal and professional contacts. Information on personal networks and appreciated business contacts is understood in China to be a key determinant of success. Information shared on even the identity of key suppliers or customers requires a certain level of trust.
Fortunately, much was learned from the research strategy used to initially gather network data on a national probability sample of Americans for the 1984 General Social Survey (Burt, Reference Burt1984; Marsden, Reference Marsden1987). The strategy is to ask the survey respondent for the names of people with whom he or she has particularly strong relations, then ask about the nature of relationships with and among the cited contacts. The former kinds of questions are ‘name generators’, the latter ‘name interpreters’. Name generators and interpreters have become routine in network survey research (Marsden, Reference Marsden, Scott and Carrington2011), in network surveys of management populations in particular (Burt, Reference Burt2010: 281ff.), and have precedent in China (Batjargal, Reference Batjargal2007a; Batjargal, Hitt, Tsui, Arregle, Webb, & Miller Reference Batjargal, Hitt, Tsui, Arregle, Webb and Miller2013; Bian & Li, Reference Bian and Li2012; Ruan, Reference Ruan1998; Xiao & Tsui, Reference Xiao and Tsui2007; the 2003 Chinese General Social Survey). This paper is the first report on the strategy used with a large random sample of Chinese entrepreneurs in diverse areas, building their businesses in the shadow of a suspicious government.
Name generators and interpreters were adapted from management research to extend the usual research design into the history of the networks around a large area probability sample of Chinese entrepreneurs. The exceptional data we have on the Chinese networks is foundational to the substantive significance of the results we present, but research design is of less general interest than our substantive results, so we put the design discussion in an appendix for readers interested in replicating the results to be reported. Suffice it here to say that we have data on the social networks of around 700 Chinese entrepreneurs whose businesses are a stratified random sample of private enterprises in three provinces surrounding the Yangtze River Delta: China's financial center, Shanghai, with Nanjing the capital of Jiangsu Province to the north, and Hangzhou the capital of Zhejiang Province to the south. The three provinces account in 2013 for 20.2% of China's gross domestic product, and 31.9% of China's imports and exports.Footnote [1] The sampled entrepreneurs are a 2012 continuation of the samples surveyed in 2006 and 2009 by Nee and Opper (Reference Nee and Opper2012).
Two example networks from the data are displayed in Figures 1 and 2. The displays provide a quick introduction to the data, and will be helpful in later discussion. Name generator items elicited the names of key contacts and name interpreter items elicited information on the nature and strength of relations with and among the cited contacts. Networks are visualized in the figures using a spring-embedding algorithm that locates people close together as a function of their connection with each other and through others (Borgatti, Reference Borgatti2002). A square dot indicates the survey respondent. Line thickness indicates emotional closeness. The absence of a line indicates a ‘distant’ relationship. Frequently used metrics summarizing network structure are displayed to the left in each figure.
Figure 1 displays one of the smaller, less open networks in the data. The business was founded 15 years ago by the survey respondent, and has grown to employ 105 people. The respondent cites five key contacts, four of whom are interconnected as a core to the network, two of whom are members of the respondent's family. The two family contacts have been known for over 20 years, and are the only contacts in whom the entrepreneur has high trust. The respondent feels distant from the person who has been his greatest source of difficulty this year, and feels that the other members of his core network share his distance from the difficult person.
At the other end of the data distribution, Figure 2 displays one of the larger, more open networks. There are 10 key contacts, none of whom are family (versus five contacts in Figure 1, two of whom are family), and the average strength of connections between contacts is 0.27 on a scale of zero to one (versus 0.55 density in Figure 1). The respondent generating the network in Figure 2 founded the business 27 years ago, and has grown the business to 81 employees.
The larger, more open network in Figure 2 implies that the entrepreneur in Figure 2 operates in a way different from the entrepreneur in Figure 1, but there is a feature to the network data that makes the difference more obvious: the data extend back into the history of a business. Contacts in Figure 1 are all the same color because they were all named on standard name generators that elicit the current network around a business leader. Contacts in Figure 2 are in two colors. The dark dots are contacts cited on the standard name generators as current contacts. The gold dots are contacts cited only as valuable during significant events in the history of the business.
Given a time line from the year of the survey, 2012, back to the year in which the business was founded, each respondent was asked to identify up to five significant events for the business, the year in which the event happened, and a person who was most valued during the event (see Figure A2 in the Appendix). Everyone was asked for the contact most valued in founding the business, then the contacts most valued in dealing with subsequent significant events. Almost all of the entrepreneurs identified five significant events after the business was founded (675 five, 13 four, 12 three). We discuss as ‘event’ contacts the people named as most valued during the founding or the subsequent events.
Event contacts reveal a profound difference in behavior by the entrepreneurs. The entrepreneur in Figure 1 turns to the same people again and again during significant events. Contact 1 (southeast in Figure 1) is a member of the entrepreneur's family who was most valued in founding the business, most valued during two later significant events, and he is one of the entrepreneur's most valued current contacts. Contact 2 (northeast in Figure 1) is another member of the entrepreneur's family who was the most valued contact during three other significant events in the history of the business, and he too is one of the entrepreneur's most valued current contacts. In short, the closed network in Figure 1 is a fortress anchored on the entrepreneur's family, within which the entrepreneur searches for needed support. In contrast, the entrepreneur in Figure 2 names a different person as most valued in each of the significant events in his firm's history, and none of his event contacts is currently a most-valued contact. The network changed over time, in response to significant events.
NETWORK BROKERAGE AND BUSINESS SUCCESS
Network theory predicts that achievement is associated with large, open networks. The more disconnected a person's contacts, the more likely the contacts are in separate groups creating opportunities to broker information flow between groups. The separations between groups are holes in the surrounding social structure, or more simply ‘structural holes’, and a person whose network spans the holes, a ‘network broker’, has information advantages of breadth, timing, and arbitrage such that the broker can more successfully move ideas and practice from groups, where the ideas and practice are familiar, to new groups where the ideas and practice would be new and valuable. Differences in understanding between groups make it difficult for information to move directly between groups. Brokers translate what is known here into what can be understood and seen as valuable over there. In a phrase, information is ‘sticky’ within groups, and network brokers are the mechanism that clears the sticky-information market. Network brokers are rewarded for their detection and development of good ideas with accolades, compensation, and elevation to leadership positions. Images of sticky information within groups and network brokers between groups are rooted in the golden age of social psychology (Festinger, Schachter, & Back, Reference Festinger, Schachter and Back1950; Leavitt, Reference Leavitt1951), made precise in subsequent network theory (Burt, Reference Burt1982, Reference Burt1992; Cook, Emerson, Gillmore, & Yamagishi, Reference Cook, Emerson, Gillmore and Yamagishi1983; Freeman, Reference Freeman1977; Granovetter, Reference Granovetter1973; Lin, Reference Lin2001; Lin, Ensel, & Vaughn, Reference Lin, Ensel and Vaughn1981). Argument and evidence are reviewed elsewhere (Burt, Reference Burt2005; Burt, Kilduff, & Tasselli, Reference Burt, Kilduff and Tasselli2013), but reviews fall quickly out of date as this is a vibrant area of research that expands every year with significant contributions.
Brokerage and Success in the West
Figure 3A contains results on the success associated with networks in the West. The graph is illustrative evidence used in a recent review of network advantage (Burt, Kilduff, & Tasselli, Reference Burt, Kilduff and Tasselli2013: 535). The data describe success and networks for two thousand analysts, bankers, and managers in six large American or European companies. Success is measured on the vertical axis within each company by annual evaluations, compensation, or promotion expressed as a z-score adjusted for relevant background differences between senior employees. Positive scores indicate a person ahead of peers within his or her company. Zero indicates a person just keeping up with peers. Negative scores indicate a person fallen behind peers.
The horizontal axes in Figure 3 distinguish people by network constraint – the extent to which a person's network is closed, providing no access to structural holes. Intuitively, network constraint is the percent of person's network time and energy consumed by one group. Constraint decreases with the extent to which the person has many contacts (size), increases with the extent to which the person's network is closed by strong connections among contacts (density), and increases with the extent to which the person's network is closed by a partner strongly connected with all contacts (hierarchy). As discussed in the reviews cited above, network constraint is closely correlated with two other network metrics often used to measure access to structural holes – effective size (Burt, Reference Burt1992), and network betweenness (Freeman, Reference Freeman1977), which measures a person's monopoly access to structural holes.Footnote [2] Within each of the six companies from which data are drawn for Figure 3A, individual scores on the vertical axis are averaged within five-point intervals on the horizontal axis. The graph shows a familiar nonlinear, downward sloping association in which network brokers (relative to their peers) receive more positive evaluations and recognition, are paid more, and get promoted more quickly to senior positions.
Brokerage and Success for the Chinese Entrepreneurs
Popular belief distinguishes Asia for its emphasis on the collective over the individual, and success contingent on connections aligned with the formal chain of command. For example, business in Asia can be distinguished by (page references are to the review by Morris, Podolny, & Ariel, Reference Morris, Podolny, Ariel, Earley and Singh2000): competition being undesirable within work groups (71), friends being a more likely source of advice and exchange more likely with friends (75), acknowledged friends being more likely to occupy higher statuses (77), and dense networks being more likely to increase felt obligation to help a peer (82). Such claims raise questions about network brokerage, which involves individuals distinguishing themselves from peers to build bridges across groups and chains of command. Thus, brokerage could clash with collectivist local social norms such that returns to brokerage are non-existent or even negative.
Evidence is mixed on the issue. In support of the idea that Chinese culture inhibits brokerage, Yang and Zhang (Reference Yang and Zhang2015) had difficulty finding structural holes in entrepreneur networks and quote one of their entrepreneurs on fear of failure: ‘I try to avoid any potential risks in my way. A vice-president in our company is even more conservative. He stops when he foresees a potential problem. He collects as much information as possible before making any major decisions, and he also tends to exaggerate risks and losses’. Consistent with the quoted sentiment, Batjargal (Reference Batjargal2010b) reports that networks around Chinese entrepreneurs are smaller and more dense than the networks around Russian entrepreneurs. Ma, Huang, and Shenkar (Reference Ma, Huang and Shenkar2011) report that networks rich in structural holes around Taiwanese managers weakened manager ability to identify opportunities, and Xiao and Tsui (Reference Xiao and Tsui2007) do not find achievement higher for Chinese employees with larger, more open networks (but see Burt, Reference Burt2010: 61n).
On the other hand, there is evidence that business practice in China supports brokerage. Batjargal offers a portfolio of studies reporting greater success for Chinese entrepreneurs who have larger networks richer in structural holes (Batjargal, Reference Batjargal2007a, Reference Batjargal2007b, Reference Batjargal2010a; Batjargal et al., Reference Batjargal, Hitt, Tsui, Arregle, Webb and Miller2013; and see Vissa & Chacar, Reference Vissa and Chacar2009, for higher performance from Indian entrepreneurs with large, open networks). Merluzzi (Reference Merluzzi2013) reports similar results on Chinese and other Asian managers in a large software company, and Bian and Wang (Reference Bian, Wang, Wang and Hsung2016) report cross-sector relations being helpful for raising start-up capital by self-employed respondents in an area probability survey of eight large cities in China. Concluding that returns to brokerage are exceptionally high in China, Batjargal et al. (Reference Batjargal, Hitt, Tsui, Arregle, Webb and Miller2013: 1040) summarize as follows their analysis in China and Russia as adverse and uncertain environments (relative to France and the United States): ‘entrepreneurs benefit from their network's structural holes. However, those entrepreneurs who operate in settings where the entire institutional order is adverse and uncertain benefit more from their networks’ structural holes’.
Summary Evidence
As predicted by network theory, as found in the West, and as reported across countries by Batjargal et al. (Reference Batjargal, Hitt, Tsui, Arregle, Webb and Miller2013), our large-sample evidence shows business success higher in China for entrepreneurs with networks richer in structural holes. Figure 3B shows success higher for entrepreneurs with larger, more open networks (low constraint, to the left in the graph) relative to the success of entrepreneurs with smaller, more closed networks (high constraint, to the right in the graph).
Table 1 contains regression results supporting our conclusion, with correlations in Table 2. We measure business success on multiple dimensions, as we believe an entrepreneur experiences it. We look at sales, jobs, and patents. The idea is that a self-made man is a success to the extent that his business lets him be a big man to the people around him – making it so that (1) a lot of money passes through his hands, (2) jobs can be found for deserving friends, new contacts, or members of their families, and (3) there is some feeling of security from patent protection for the business. We do not assume that the three variables measure the same condition, or that they capture all dimensions to success; only that they are correlated measures of an entrepreneur's success. Each measure is predicted separately in a column of Table 1, then predicted jointly as a z-score composite variable in the fourth column, which is the vertical axis in Figure 3B.
Notes: Regression results predict each column variable from the row variables for 700 Chinese entrepreneurs. Employees and sales are measured as logs. Business patents vary from zero to 5 or more, and are predicted by a Poisson model. Business success (vertical axis in Figure 3B) is the first principal component combining employees, sales, and patents (describes 65% of variance in the three indicators). Firm age is 2012 minus the year in which the business was founded. Network constraint is measured as the log of 100 times constraint (horizontal axes in Figure 3). Unstandardized coefficients are presented with standard error and test statistic in parentheses.
Beyond the controls for industry differences and the age of a business, the primary predictors of success in Table 1 are whether the founder is still running the business (strong negative association with success), whether the business has a research and development (R&D) department (strong positive association with success), and the extent to which there is a small, closed network around the person running the business (strong negative association with high-constraint networks). It is standard practice to replace founders with managers as a business matures (Wasserman, Reference Wasserman2012), so it is not surprising to see that businesses still run by founders are not yet as successful as businesses run by someone other than the founder.
The substantive significance of the R&D department is not obvious. The success associated with an R&D department is independent of industry, and the number of years for which the business has been operating, both of which matter but are held constant in Table 1. We thought that a large, open network let an entrepreneur get more success out of having an R&D department, however, there is negligible difference between the success-network association for businesses that have an R&D department versus businesses that do not (0.88 t-test for difference when a slope adjustment is added to the fourth column of Table 1, P ~ 0.38). And although businesses that have an R&D department are on average larger with higher sales, there are many successful businesses that do not claim R&D, and many small businesses that do.
We suspect that the difference between businesses with and without an R&D department is less a difference between businesses than it is a difference between respondents in their perspective on their business. Having an R&D department is a yes-no response to the following question: ‘Does your firm currently conduct its own R&D activities or have an R&D department’? Answers ‘yes’ include a wide variety of situations, from businesses with multiple people conducting research, down to businesses such as the one in which the R&D department consisted of a person at a desk scanning into a computer the image on a designer scarf so the company could make inexpensive copies of the scarf. The search for characteristics distinguishing entrepreneurs who claim they have an R&D department is an intriguing topic. However, the main point for this paper is that, regardless of R&D department, the success associated with large, open networks in theory and prior research on American and European business leaders is similarly associated with large, open networks around the Chinese entrepreneurs.Footnote [3]
Evidence without Event Contacts
Event contacts turn out to be important for predicting business success. Of all 4,464 contacts cited by the entrepreneurs, about a third are named only as event contacts (1,341). The other contacts are current, of whom about half were also named as event contacts (1,564 of 3,123 current contacts).
Limiting networks to current contacts underestimates the size of the networks around the entrepreneurs. The average number of current contacts is 4.46, which is well below the full number of contacts named (95% confidence interval of 6.27 to 6.49 around the 6.38 average in Table A2).
Limiting networks to current contacts underestimates access to structural holes. Networks appear more closed than they actually are. The average entrepreneur cites 2.69 nonredundant current contacts, which is well below the full number cited (95% confidence interval of 3.56 to 3.77 around the 3.66 average in Table A2). Average network constraint computed from current contacts is 0.70, which is well above the average when all contacts are included in the network (95% confidence interval of 0.56 to 0.58 around the 0.57 average in Table A2).
It is not surprising that networks appear more closed when limited to a subset of contacts, and it would not be a problem if the bias were consistent. Open networks would appear a little more closed when limited to current contacts. Closed networks would appear still more closed. Mean network scores would be affected, but regression models using the network scores to predict success need not be affected.
However, the bias is not consistent. Event contacts are included among current contacts in some networks (Figure 1), but not others (Figure 2). The number of current contacts an entrepreneur cites is correlated only 0.16 with the total number of contacts cited. Log network constraint for all contacts, the network variable predicting business success in Table 1, is correlated 0.57 with log network constraint limited to current contacts.
Table 3 confirms the problem possible: Limiting an entrepreneur's network to current contacts significantly underestimates the network association with business success. The variables in Table 3 are the same as in Table 1, except here network constraint is limited to current contacts. The first row of Table 3 shows consistently negligible associations between success and network. Replacing network constraint with effective size yields the same conclusion. Patents have a nonzero association with effective size, 2.11 t-test, but the other three success measures are independent of effective size. More, the results in Table 3 are a conservative test of the importance of event contacts. Respondents were asked the event name generators before they were asked about current contacts, so respondents in the China survey were primed to think about the business in broader historical context than is usually the case when a respondent answers only current contact name generators. About half of the people cited as current contacts were also cited as event contacts, in some measure a reflection of respondents being primed to think about people who have been helpful during significant events. Fortunately, the evidence in Table 3 is clear despite the conservative test: Event contacts are critical to measuring the advantage provided by networks around the Chinese entrepreneurs.
Notes: Regression results predict each column variable from the row variables for 700 Chinese entrepreneurs. These are the same variables used in Table 1, except that the network index here is limited to current contacts (which includes any event contacts who were also cited as current contacts). Unstandardized coefficients are presented with standard error and test statistic in parentheses.
The importance of event contacts replicates a well-known phenomenon in network analysis: relationships gone into remission can be reanimated to advantage. A widely-cited example is Granovetter's (Reference Granovetter1973) evidence on job search and weak ties. His evidence is about relations gone into remission – out of touch friends from the old neighborhood, out of touch coworkers from previous employers, out of touch classmates. Job seekers found new jobs by contacting people they used to know well, but with whom they had lost touch. The relationship reanimated with a friendly call became a bridge across the structural hole between the group containing the job seeker and the group containing the contact. Lee (Reference Lee1969) shows a similar positive result for women searching for an abortionist when abortion was illegal. Levin, Walter, and Murnighan (Reference Levin, Walter and Murnighan2011) show a similar positive result for executive MBA students asked to reanimate contact with colleagues not seen for years.
In this light, event contacts beyond an entrepreneur's current contacts are bridges to a past more diverse than the present, making the entrepreneur's network a broader, more reliable source of support in dealing with diverse future events. Our next task is to look inside the relationships.Footnote [4]
NETWORK CLOSURE AND TRUST
Closure's association with trust and reputation is another principle that traces back to the golden age of social psychology (Asch, Reference Asch and Guetzkow1951; Festinger et al., Reference Festinger, Schachter and Back1950). The principle was revitalized with the popularity of network metaphors (Coleman, Reference Coleman1988; Granovetter, Reference Granovetter1985, Reference Granovetter, Nohria and Eccles1992), and enriched with research applications to organizations and markets (Barker, Reference Barker1993; Bernstein, Reference Bernstein1992, Reference Bernstein2001; Burt, Reference Burt2005; Greif, Reference Greif1989; Uzzi, Reference Uzzi1997). The gist of the story is as follows: the more connected the people in a network, the higher the reputation cost for bad behavior, the more likely bad behavior will be detected, so the less likely bad behavior will occur, which lowers the risk of trust, which thereby increases the probability of trust. Applied to the Chinese entrepreneurs, the trust association with closure predicts that entrepreneurs will have more trust in contacts with whom they are embedded in a closed network of mutual contacts. Figure 4 shows the prediction well supported. To avoid confusion between mutual contacts and the contact being evaluated for trust, we discuss mutual contacts as third parties to a relationship.
Closure and Trust in the West
The graph to the left in Figure 4 illustrates what we know about the association between closure and trust using data on American and European analysts and bankers (adapted from Burt, Reference Burt2010: 174–175; cf. Burt, Reference Burt2005: 197–199, for the same association in reverse showing closure inhibiting relationship decay). The network data in Figure 4A are annual evaluations of colleagues in which the evaluator chooses colleagues to evaluate. The vertical axis indicates the probability that the evaluator chooses to work with a colleague again next year and gives him or her a top evaluation. The horizontal axis varies from left to right with increasing closure this year. To the left, the sociogram beneath the axis shows evaluator and colleague with no mutual contacts (low closure). To the right, evaluator and colleague have many contacts in common (high closure).
Two associations are displayed. Across 46,231 relationships, the bold regression line in Figure 4A describes a strong tendency for the most positive colleague evaluations to occur next year within closed networks this year (logit z-score test statistic of 14.88, P << 0.001, including controls for network size and autocorrelation between evaluations made by the same evaluator). Second, the thin line in Figure 4A shows that once evaluator and evaluated know one another well, closure is irrelevant. The dots at the top of the graph show the association between closure this year and positive evaluation next year – just for the relationships in which the evaluator has been working with the colleague for at least two years. The flat, thin regression line through those dots shows a high probability of positive evaluation, independent of closure embedding the evaluator and colleague (logit test statistic of 0.81).
The difference between the bold and thin regression lines in Figure 4A illustrates the difference between what Granovetter (Reference Granovetter, Nohria and Eccles1992) distinguished as ‘relational’ versus ‘structural’ embedding. Structural embedding refers to a closed network of mutual contacts, as measured on the horizontal axes in Figure 4. Relational embedding refers to the strength of existing connection between two people when trust is required, which is measured for the bankers and analysts by the years for which evaluator and colleague have worked together; more years, more relational embedding. Structural embedding facilitates trust on average (and persistent reputation, Burt, Reference Burt2005, Reference Burt2010), but can be irrelevant to trust when two people know each other well, as is the case for the analysts and bankers in Figure 4 after they work with a colleague for two years.
Closure and Trust for the Chinese Entrepreneurs
The graph to the right in Figure 4 shows a pattern for the Chinese entrepreneurs very similar to the pattern for the Western analysts and bankers. Trust is more likely within relationships structurally embedded in a closed network, but the highest levels of trust come from relational embedding relatively independent of closure – in relations with event contacts. More precisely, Table 4 contains regression results predicting trust measured on a scale from one to five (name interpreter item, Figure A3 in the Appendix) from closure around respondent and contact, controlling for network size and the nature of the respondent's relationship with the contact.Footnote [5]
Notes: OLS regression results predict trust on a five-point scale (name generator item, Figure A3 in Appendix, N = 4,464 relationships, 2.449 intercept, R2 = 0.60). ‘Event Contacts’ are people cited as most valued during one or more of the significant events in the business (N = 2,905 relations). ‘NonEvent contacts’ are anyone else (N = 1,559 relations). Contacts could be cited for multiple roles (name generator item, Figure A3 in Appendix, e.g., contact could be ‘neighbor’ and ‘classmate’). Number of third parties is increased by one and logged to capture the nonlinear association in Figure 4 (but means are counts of third parties). Categories of contact frequency are entered in days (1 for ‘daily’, 7 for ‘weekly’, 30 for ‘monthly’, and 90 for ‘less often’). ‘None of the Above’ is 1 if contact is none of the seven kinds of contacts listed above. Standard errors are adjusted down for autocorrelation between relations described by the same respondent (Stata ‘cluster’ option).
Summary Evidence
We note three broad results in Table 4. First, illustrated by the bold line in Figure 4B, there is a strong, positive association between trust and the number of third parties in which a relationship is embedded (14.96 t-test). This result corresponds to the bold line in Figure 4A through analyst and banker relations. The result holds across the five industries,Footnote [6] across the three geographic regions,Footnote [7] if the closure measure in Figure 4B is replaced with a continuous measure of connection strength,Footnote [8] or if the five response levels of trust are treated as ordinal rather than interval.Footnote [9] Entrepreneurs vary significantly in their average level of trust, but have in common their tendency to trust more within more embedded relationships.
Evidence Distinguishing Event Contacts
The example networks in Figures 1 and 2 put the closure-trust association in broader perspective. Consistent with closure facilitating trust, the entrepreneur in Figure 1 has high trust in two people: contacts 1 and 2. The two contacts are members of the entrepreneur's family, and are well connected to others in the core network around the entrepreneur. The entrepreneur in Figure 2 is more complicated. He expresses high trust in eight of his ten contacts, none of whom are family. Trust in the neighbor who helped him found the business (contact 1) makes sense in terms of closure because he has known the neighbor for 35 years and their relationship is embedded in mutual connections with four other people in the network. But the entrepreneur also expresses high trust in contact 6, a relationship embedded in only two third parties, to a person the entrepreneur has only known for a few years.
What the two trusted contacts have in common is that they are event contacts, which is the second result we note in Table 4: trust in event contacts is relatively independent of closure. Event contacts are trusted regardless of how long the entrepreneur and contact have known each other – almost two points higher on a five-point scale (coefficient of 1.742, yielding a 22.75 t-test) – and the 0.694 trust-closure association for nonevent contacts almost disappears for event contacts (−0.616 decrease, −11.86 t-test, second row of Table 4).Footnote [10] The change in association is illustrated in Figure 4B by the thin lines through the solid dots at the top of the graph being flatter than the thin line through the hollow dots low in the graph. The two thin lines in Figure 4B describing high trust in event contacts correspond to the thin line in Figure 4A describing high trust in colleagues with whom an analyst or banker has worked for more than two years.Footnote [11]
Table 5 connects our focus on event contacts with our prior focus on current contacts when predicting business success in Table 3. Rows in Table 5 distinguish contacts named on event name generators (name generator items one and two in Table A1 in the Appendix). Columns distinguish contacts named on the current name generators (name generator items three through six in Table A1). We focused on the column contrast for predicting business success in Table 3 because we wanted to know what was gained by adding event name generators to the items usually used to define a business leader's current network. However, mean trust scores in the cells of Table 5 show that trust in event contacts is high with or without also being cited as current contacts. Therefore, we shift in this section to the row contrast when predicting trust. In fact, a dummy variable distinguishing current contacts (the column contrast in Table 5) is a negligible addition to the trust prediction in Table 4 (1.68 t-test, P ~ 0.09).
Notes: Cells contain average trust score on a five-point scale (name generator item, Figure A3 in Appendix, N = 4,464) with number of relations averaged in parentheses. Current contacts are people cited on one or more of the name generators three to six in Table A1 in the Appendix. Event contacts are people cited on either of the two event name generators, one or two in Table A1.
Trust in Contacts Beyond Traditional Sources
The remaining predictors in Table 4 are controls for the substance of relationships. The most consequential are frequency (how frequently a contact is met) and duration (how long the contact has been known). Trust is lower in people rarely met and higher in people long known (−18.68 and 9.43 t-tests respectively). Frequency is the more consequential in practice. Trust drops one point on the five-point scale for slightly more than a two-month delay between meetings with a contact (1.0 divided by −0.014 coefficient is 71 days). To get the same increase in trust through years known, the entrepreneur would have to know someone for a lifetime (1.0 divided by 0.016 coefficient is 63 years).
Note how few of the cited contacts come from traditional sources. This is the third result we highlight in Table 4. Perhaps reflecting the lack of institutional support for private enterprise when entrepreneurial business began blossoming in the region, entrepreneurs are unlikely to cite contacts in the military and contacts in the Communist Party (−2.94 and −2.70 t-tests respectively with trust). Of 4,464 contacts, only 69, or 1.6%, are affiliated with the military or party. Entrepreneurs are more likely to turn to traditional sources during a significant event (e.g., 12.2% of event contacts are family versus 1.1% of nonevent contacts), but people from traditional sources are no more likely to be trusted than other contacts once embedding and events are held constant (e.g., 0.64 t-test for trust in family contacts).
Far and away, the most likely source of contacts is somewhere beyond the usual seven listed in Table 4. Seventy five percent of event contacts are from a source unknown. The percentage is 93.1% for nonevent contacts. A source unknown means the contact is not a childhood friend, not a classmate, not family, not a person met in the military, not a neighbor, and not a member of the party – which is a lot of things the contact is not. All together, 81.7% of the contacts are people from sources unknown.Footnote [12]
The prevalence of contacts from unknown sources reinforces the point that events are critical to trust. On average, the contacts we cannot assign to a source are neither trusted nor distrusted (−1.66 t-test in Table 4). However, they are the most likely source for help during a significant event, and their help during the event results in an entrepreneur's trust. This is again affirmation of Nee and Opper's (Reference Nee and Opper2012) argument about the rise of capitalism from below. Formal institutions were not available to help the entrepreneurs build their businesses. The entrepreneurs built their own support institutions, along-side their businesses; in the form of a network of people they knew they could trust – often people outside the usual sources for trusted contacts.
CONCLUSIONS AND GUANXI
We believe the results clear space for rigorous integrative research bridging theory and research on the roles social networks play in Chinese and Western business. In service of that belief, we highlight four broad conclusions from the results.
Network Brokerage and Success
Our first conclusion is that access to structural holes is a competitive advantage in China as in the West. Of course, there are contingencies for the association between brokerage and success, as there are in the West, and there might be contingencies unique to China. That is a subject for future research, as it has been for the last twenty years in the West. Our conclusion remains, illustrated in Figure 3, that the success associated with large, open networks in theory and prior research on American and European business leaders is similarly associated with large, open networks around Chinese entrepreneurs.
We also learned that much of an entrepreneur's brokerage potential lies beyond his or her current network – in strong, trusting connections with people who helped the entrepreneur through a significant business event. At least half of the ‘event’ contacts are beyond the current network. The results in Table 3 show that ignoring event contacts beyond the current network eliminates the evidence of success higher with large, open networks. This has implications for standard research practice, which is to gather data on the current network around a business leader. It could be that the importance of event contacts for the Chinese entrepreneurs also occurs in the West, whereupon returns to brokerage in the West have been significantly underestimated. Or, the importance of event contacts is unique to China because of the more intimate role that history plays in Chinese culture. Either way, event contacts are a promising subject for future research.
Network Closure and Trust
Our second conclusion is that trust is facilitated within closed networks in China as in the West. The similarity is clear in Figure 4, with trust reaching higher levels as a relationship is more structurally embedded, then breaking free of the embedding when a relationship is well established. Trust is a familiar topic in studies of Chinese business, but it is a welcome sight to see such a familiar pattern to the network correlates of trust. Here again, Table 4 provides contingency factors regarding contact frequency and years known, but the most interesting trust result that warrants future research is the high trust in event contacts drawn from sources unknown – which leads to our third conclusion.
Guanxi Ties
Our third conclusion is a caution on the second, concerning overlap between East and West on the subject of guanxi. Business networks in China are often discussed as guanxi, referring to the kinds of relations believed to be less prevalent in the West. Guanxi is a colloquial term that has immediate face validity, and provides grounds for rich discussion (Hwang, Reference Hwang1987). The gist of the image is that guanxi relations involve three qualities: (1) familiarity, intimacy, (2) trust, and (3) mutual obligation (Bian, Reference Bian1997; see Bian, forthcoming, for analytical review of the literature; see Luo, Huang, & Wang, Reference Luo, Huang and Wang2011, for meta-analysis; and Chen, Chen, & Huang, Reference Chen, Chen and Huang2013, for broader review). Luo (Reference Luo2011, Reference Luo, Wang and Hsung2016; Luo & Cheng, Reference Luo and Cheng2015; Luo, Cheng, & Zhang, Reference Luo, Cheng and Zhang2016) adapts the imagery to discuss ‘guanxi circles’ in Chinese management. Guanxi circles are in some ways akin to familiar center-periphery images of networks – layers in the ‘social atom’ around a person (Moreno, Reference Moreno1947), or an ‘inner circle’ of business elites (Useem, Reference Useem1984) – but the concept of a guanxi circle is more precise with respect to the role of trust and obligation for network advantage, so we adopt it here to discuss the Chinese entrepreneurs (see Guo & Miller, Reference Guo and Miller2010: 285, for an image of entrepreneur networks related to Luo's image of a guanxi circle). At the center of Luo's guanxi circle is an inner ring of real and pseudo family members. This ring of guanxi applies ‘need rules’ in which family ties are used to more or less satisfy each other's needs without asking for return. Luo's guanxi circle then expands from inner ring to a middle ring composed of good friends connected by long-term favor exchanges, where both parties combine expressive and instrumental exchanges and carefully maintain trustworthiness under the principle of reciprocity. Beyond the middle ring are acquaintances on the periphery, where instant return and bargaining in social exchanges are allowed. The ‘equity rule’ is that trust comes from fair exchanges following generally accepted norms. Beyond the periphery boundary there are no rules. Trust would be perilous. Our data on the Chinese entrepreneurs focus us primarily on relations toward the center of the guanxi circle, but it is clear that a relationship can be more or less guanxi depending on the level of trust and obligation within the relationship.
The critical issue for empirical research is defining guanxi. Colloquial terms, such as guanxi, are often fraught with multiple meanings so they can be difficult to use with sufficient precision for research. One way to move forward is to agree on the wording to be accepted as a definition of guanxi. This facilitates communication among researchers, but does little to connect that communication to empirical research, or to new scholars entering the area. Another way to move forward is to identify construct validity criteria for a relationship that is guanxi. Here is a network definition of guanxi based on construct validity characteristics in Table 4: A relationship is a guanxi tie to the extent that trust is high and relatively independent of social structure around the relationship. For the analysts and bankers in Figure 4, such guanxi ties are with colleagues with whom they have worked for two or more years (cf., Bian & Zhang, Reference Bian and Zhang2014: 428–429, comparing guanxi to strong ties inside ‘old-boy networks’ in the West). For the Chinese entrepreneurs in Figure 4, such guanxi ties are with personal contacts who provided valued support through a significant event for the entrepreneur's business.
The analysts, bankers, and Chinese entrepreneurs in Figure 4 all have guanxi ties by the above network definition, but they differ in the extent to which they have guanxi ties. For the analysts and bankers, less than a tenth of their colleague relationships qualify as guanxi (1,233 colleagues with whom they have worked for the last two years in a population of 13,780 colleagues in the third-year panel who could have been cited as two-year colleagues). For the Chinese entrepreneurs, two thirds of their key contacts qualify as guanxi (2,905 event contacts in a population of 4,464 cited contacts).
Of course, people working in a large financial organization within a supportive business environment are fundamentally different from the Chinese entrepreneurs who built their businesses when such activity was viewed with suspicion. And of course, network data were collected in different ways in the two populations. The analysts and bankers were asked about their current contacts, some of whom are colleagues and are long standing. The Chinese entrepreneurs were asked explicitly to look back over the history of their business to name event contacts in that history.
However, some event contacts named by the Chinese entrepreneurs are relatively new acquaintances, the trust results in Table 1 exist with years known held constant, and the prevalence of guanxi ties is so different in the two populations that it warrants note. The actual difference is an empirical question, but suppose there is some truth to the dramatic difference we observe. With guanxi ties a larger presence in the Chinese networks, it is understandable that scholars would talk about Chinese networks being fundamentally different from the networks around managers in the West. Still, it is productive to acknowledge the similar trust correlates of network structure in the two business environments: the network closure provided by structural embedding facilitates trust on average, presumably through reputation costs, and certain relationships emerge as guanxi ties within which trust is high and relatively independent of structural embedding. The proposed perspective on guanxi ties allows that networks in China operate in ways different from networks in the West, not because they are different in theory, but because they are different in composition. Within component kinds of relationships – bridges, embedded bonds, or guanxi – network mechanisms work the same way in East and West. The proposed network image of guanxi ties seems a productive vantage point for identifying network mechanisms in China that are well understood in the West, and identifying network characteristics in the West that are more abundantly available for study in China.
Guanxi Events, Places, and People
Continuing with the network definition of guanxi, kinds of events can be distinguished by the extent to which they generate guanxi ties. For example, a contact who helped replace a failed critical supplier could be seen as more of a guanxi tie than a person who helped find a new accountant. We have not studied the content of the events cited by the Chinese entrepreneurs, but we do know which contacts were cited for their help in founding the business (versus contacts who helped in subsequent events).
Table 6 contains trust prediction results distinguishing founding from the other events. Contacts cited for help during the business founding are more trusted (2.077 versus 1.680 coefficients), and trust in them is less dependent on closure (0.711 - 0.636 leaves a 0.075 coefficient for trust increasing with closure for a founding contact, versus a stronger 0.120 coefficient describing trust more dependent on closure for other event contacts). These results are illustrated in Figure 4B by the thin line for founding contacts being higher and flatter than the thin line for other event contacts. In other words, founding is an example guanxi event.
Notes: OLS regression results predict trust on a five-point scale (name generator item, Figure A3 in Appendix, N = 4,464 relationships, 2.340 intercept, R2 = 0.61). The regression model includes all of the controls in Table 4. Standard errors are adjusted down for autocorrelation between relations described by the same respondent (Stata “cluster” option).
In the same way that events can be distinguished for the extent to which they generate guanxi ties, any category of people or relationships can be distinguished for the extent to which business in the category is characterized by guanxi. Nanjing is an example. We report, in footnote 7, no regional differences in the average level of trust or closure's association with trust. That is true, but only when we hold Nanjing constant. The other two sample cities in Jiangsu province look like cities in the other two provinces, but Nanjing stands apart. Contacts are more trusted by entrepreneurs in Nanjing (2.47 t-test for higher trust in Nanjing) and that trust is less dependent on structural embedding (−2.08 t-test for the Table 5 slope adjustment in Nanjing). A positive level adjustment and negative slope adjustment are the two network criteria for guanxi ties, which makes Nanjing the sample city in which guanxi is most characteristic of entrepreneur relationships.
Kinds of people can be more prone to guanxi ties. For example, we checked for gender differences in trust by adding three dummy variables to Table 4: respondent is female, contact is female, and both respondent and contact are female (homophily). Women are slightly more likely to trust, be trusted, and trust one another, but all three associations are statistically negligible (F(3,699) = 2.15, P ~ 0.09). The slope adjustment for women trusting women is negligible (0.95 t-test, P ~ 0.34), but there is a significant decrease in the trust facilitated by closed networks: trust from female entrepreneurs is less associated with structural embedding, and trust in female contacts is less associated with structural embedding (F(2,699) = 4.02, P ~ 0.02). In other words, women are more prone to guanxi ties. Trust is slightly higher with women, and significantly less dependent on structural embedding – perhaps because they do not, or cannot, rely as much on reputation costs to lower uncertainty in their relations with men. The gender associations are weak relative to our main findings, but it is an interesting note for future research.
Guanxi Over Time
In a suggestive piece of work, Guo and Miller (Reference Guo and Miller2010) study six entrepreneurial ventures in China to draw inferences about how networks around Chinese ventures change as a business develops. At the heart of their inferences is an assumption that the network expands from a stable core (Guo & Miller, Reference Guo and Miller2010: 284): ‘the guanxi ties in the core circle remain highly stable over the venturing process, and it is the periphery circle that experiences constant change and continuous expansion’. The assumption is consistent with other discussions of guanxi expanding from a central core (e.g., Chen & Chen, Reference Chen and Chen2004), and the imagery is at least implicit in any discussion that draws analogy between guanxi and family (such as Luo on guanxi circles), since family ties continue through time regardless of how members of the family feel about each other. Nevertheless, family ties between individuals vary in strength over time, and recent research shows that certain kinds of change in management networks are common, and can be productive. Productive relations can show high decay or churn (Burt, Reference Burt2005: 196ff.; Quintane & Carnabuci, Reference Quintane and Carnabuci2017), relations allowed to fall into remission can be productively reanimated (Levin, Walter, & Murnighan, Reference Levin, Walter and Murnighan2011), and advantage can depend on networks oscillating between closed and open (Burt & Merluzzi, Reference Burt and Merluzzi2016).
Is the presumed stability of core guanxi a characteristic of the networks around Chinese entrepreneurs, or is it an unexamined functionalist assumption (as was common in early network analysis, see Burt & Merluzzi, Reference Burt and Merluzzi2016)? Results in Table 7 support the image of a stable core. We know from the results in Tables 4 and 6 that event contacts qualify as guanxi ties, especially contacts helpful in founding the business. The three panels in Table 7 distinguish contacts involved in founding the business (core guanxi), from event contacts not involved in the founding (guanxi), from nonevent contacts (mixture of guanxi and other relationships). Columns in Table 7 distinguish kinds of respondents citing the row contacts. Founders are distinguished from respondents who later rose to run the business. The former actually knew the contact cited as valued in founding the business, while the latter could be operating on stories they heard about the founding. Then, respondents in older businesses are distinguished from respondents in newer businesses, since the former have had more opportunities to replace old contacts as the business evolved. Our inference from the means in Table 7 is that trust moves up the rows toward the core of an entrepreneur's guanxi (as already established in Table 6), but founding contacts continue to be in frequent contact with the founder and other respondents (few days between contacts), and it is the founding contacts with whom respondents have their oldest relations, and it is the founding contacts who are most likely to be members of the respondent's family. In short, the results in Table 7 support the image of a stable inner core to the networks, anchored on family and founding the business – though clearly not for every entrepreneur since only a third of founding contacts in Table 7 are family.Footnote [13]
Notes: These are means on the five variables (from Table 4) for column respondents citing the row contacts. Founders are respondents responsible for creating the business. ‘Not Founders’ are respondents who entered later, including many who currently own all or part of the business. Older and newer businesses are distinguished at the median age of 11 years (after 2000). ‘Other Event Contacts’ are contacts cited as most valued for any events other than the business founding. ‘NonEvent Contacts’ are current contacts who are not cited on any event name generators.
High-Quality Network Data Are a Practical Reality
Pursuing the above research ideas requires data of a quality similar to, or higher than, the data we have on the Chinese entrepreneurs – which makes our data themselves noteworthy. On a scale of cost and analyses made possible, we have what can be termed ‘level-three’ network data in that they measure connection strength with and among named contacts. This is the usual level of network data used for research on brokerage and closure because one needs to know connections between contacts to distinguish brokerage bridge relations from relations embedded in a closed network. Higher, ‘level-four’ data, would be continuous-time behavioral data on connection strength with and among contacts (e.g., the sociometer data in Ingram & Morris, Reference Ingram and Morris2007, or the email networks in Kleinbaum & Stuart, Reference Kleinbaum and Stuart2014; Goldberg, Srivastava, Manian, Monroe, & Potts, Reference Goldberg, Srivastava, Manian, Monroe and Potts2016), but level-four data are still rare today.
A common strategy in area probability surveys is to gather network data of a more limited kind at lower cost than the level-three data analyzed in this paper. What can be termed ‘level-two’ network data measure connection strength with named contacts, but ignore connections between contacts. Level-two data alone cannot be used to study brokerage and closure because the inter-contact relations need to be known to distinguish bridges from embedded ties. The limitation can be overcome when level-two data are combined with network structure from outside the survey. Examples are analyses of relations across occupational and other stratification categories using Lin's popular ‘positional’ network data (e.g., Lin, Ensel, & Vaughn, Reference Lin, Ensel and Vaughn1981; Lin & Erickson, Reference Lin and Erickson2008), or the tradition in management research of analyzing the strength of social relations across boundaries between groups in the formal organization of a company (e.g., Allen & Cohen, Reference Allen and Cohen1969; Tortoriello & Krackhardt, Reference Tortoriello and Krackhardt2010).
At lower cost, ‘level-one’ network data are measures of average connections with unnamed contacts in broad categories of kinds of contacts. These data offer a quick, inexpensive sense of how the respondent views his or her network. There are many, many examples. On a rating scale of low to high, respondents are asked how much they agree with statements such as: ‘My network is as effective as any at my level within the company’ (Burt, Reference Burt1998: 34); ‘Please circle the number best describing the extent to which top managers at your firm have utilized personal ties, networks, and connections during the past three years with top managers at supplier firms’ (Peng & Luo, Reference Peng and Luo2000: 501); ‘I am good at the art of networking’ (Batjargal, Reference Batjargal2010a: 145); ‘I play a bridging role in the exchange of information and resources among my network ties’ (Yang & Zhang, Reference Yang and Zhang2015), or the four-point General Social Survey ersatz density item: ‘Some people have friends who know one another. Other people have friends who don't know one another. Would you say that all your friends know one another, most of your friends know one another, only a few of your friends know one another, or none of your friends know one another’? (Burt, Reference Burt1987: 76).
Ease and cost are the virtues of level-one data. Low validity is the disadvantage. Level-one data are more precisely data on respondent opinions about their network. Absent concrete people and relationships, it is difficult to know how respondents differ in aggregating people and relations to make a summary network evaluation. Cost and validity issues were at the center of the debate in the mid-1980s about whether to gather level-three network data in the General Social Survey (GSS). Adding network items would mean that the GSS could provide network data on a national probability sample of Americans, but with unknown validity, at considerable cost, and unknown respondent fatigue. The most compelling precedent at the time was Fischer's (Reference Fischer1982) use of network items with a heterogeneous area probability sample of the San Francisco Bay area, but no one had implemented network items with a national probability sample such as the GSS. Experienced survey researchers preferred to begin with level-one data – ask respondents to evaluate, on a scale of 1 to 4, how connected their friends were to one another (the ersatz density item quoted above). After much back and forth, the final decision was to include items to gather level-one and level-three network data so the cost-benefit question could be answered in an authoritative way. As it turned out, respondent perceptions of the density of their network had no correlation with the actual density (Burt, Reference Burt1987). Later work replicated the point that manager opinions about their network advantage have no correlation with their actual network, or the advantage their network provides (Burt, Reference Burt1998: 32).
Similarly, respondent opinion about using guanxi has no correlation with the actual networks around the Chinese entrepreneurs. Figure 5 illustrates the point. The horizontal axis in the Figure 5 graph is the network constraint index used in Table 1 and Figure 3 to distinguish Chinese entrepreneurs in open (left) versus closed (right) networks. The vertical axis is a popular measure included on the survey of the Chinese entrepreneurs asking for the extent to which the respondent's people network with contacts in business and government. Specifically, following Peng and Luo (Reference Peng and Luo2000), respondents were asked to pick a number from 1 to 7 for ‘very little’ to ‘very much’ describing ‘the extent to which top managers at your firm have utilized personal ties, networks, and connections during the past three years with top managers at’ supplier firms, customer firms, and competitors (three items) and transactions with political government, industrial authorities, and other government authorities (three items). The vertical axis in the graph is the first principal component of all six items (capturing 50% of item variance). The graph shows no association between respondent opinion about network use and the actual network around the respondent. The table to the right in Figure 5 shows the same lack of association with popular network measures, in addition to the lack of correlation with contact frequency, years known, or trust. One could say that the guanxi measures are about network use rather than network structure, but it is odd to see that people with larger, more open connections make no more or less use of those connections than the people limited to small, closed networks. It seems odd to see people with more trusted contacts making no more or less use of contacts than people with little trust in their contacts. It seems odd that respondent opinion about using business and government guanxi is a negligible addition to predicting business success in Table 1 (F(2,689) = 1.86 for fourth column, P ~ 0.16). We interpret the negligible correlations as replications of earlier findings that respondent opinion about the structure or value of their network says little or nothing about the actual structure or advantage of the network around them. Scholars interested in understanding the role that networks play in business would do well to upgrade from level-one network data to level-two, or ideally, level-three data. Fortunately, the characteristics and construct validity of the data gathered on the Chinese entrepreneurs make it clear that scholars interested in Chinese network data can obtain it at high quality.
APPENDIX: RESEARCH DESIGN
The design provides data on the strength of relations with, and among, key contacts for each survey respondent in a representative sample of Chinese entrepreneurs.
Population and Sample
The target population is private businesses in the Yangtze River Delta region, the region from which entrepreneurial activity blossomed in the 1990s for the Chinese economy. The region was distinguished in 1982 by the Chinese national government as the Shanghai Economic Area to provide more local government autonomy for economic development. The initial area included Shanghai, plus four cities in Jiangsu Province (two of which are included in the network survey, Changzhou and Nantong), and five cities in Zhejiang Province (two of which are included in the network survey, Hangzhou and Ningbo). The ten cities expanded over time to include 22 in 2016, members of the Yangtze River Delta Economic Coordination Association. The region is dominated by China's financial center, Shanghai, with Nanjing the capital of Jiangsu Province to the north, and Hangzhou, the capital of Zhejiang Province, to the south.
The survey respondents are a stratified random sample of entrepreneurs founding businesses in the region. As described by Nee and Opper (Reference Nee and Opper2012: Chp. 3), the sample is stratified within the seven cities listed in Figure A1 by industry (electronics, machinery, pharmaceuticals, textiles, and transportation equipment), and size of company (following China's national classification system of small [10-100 salaried employees], medium [101-300], and large [> 300]). All of the sample firms are entrepreneurial ventures, but 79% of them are in 2012 mature ventures in the sense that they had survived more than eight years. The means in Figure A1 show that the average respondent in 2012 was 45 years old, running a business founded eleven years earlier. Most of the respondents founded the business for which they were sampled (80%); another 8% were owners, with the remaining 12% senior managers of the business. Founders and owners were more likely to be the respondent for small businesses (91%), but a substantial 73% of the respondents for large businesses were also founders and owners. One hundred entrepreneurs were interviewed from each city. The bar charts in Figure A1 show that each city provided entrepreneurs leading small and large companies, with small firms more likely in Nanjing and Changzhou, less likely in Nantong (large shipping port) and Shanghai (financial hub). Wenzhou was not part of the Yangtze River Delta Economic Coordination Association at the time of the initial 2006 survey, nor the 2012 survey including the network module. Wenzhou was included in the sampling frame because it is so often mentioned as the ‘epicenter’, protected by its geographic isolation, from which entrepreneurial practice took hold and spread north to the larger cities (Nee & Opper, Reference Nee and Opper2012: 41ff.).
As explained by Nee and Opper (2010: Chp. 3), participants were recruited for the initial survey in 2006 using a roster of private companies registered with China's Bureau of Industry. The registry excluded from the population small-scale household companies and fly-by-night businesses – illegitimate informal economy firms that have a short life span. Nee and Opper further narrowed the population by excluding companies in business for less than 3 years and small companies (less than 10 salaried workers). To strengthen the focus on viable businesses and capitalist firms, Nee and Opper over-sampled medium (100- 300 employees) and large-scale firms (more than 300 employees). Randomly selected firms were contacted by mail and phone to arrange for interview appointments with their CEOs. To maintain the original sample size, lost respondents were selected for the subsequent two survey waves (2009 and 2012), following the same random sampling procedure described above.Footnote [14] The 700 survey respondents do not provide a representative sample of private firms in China given sampling strata defined by affluent cities in a prosperous region, but neither are their stories peculiar. Opper, Nee, and Holm (Forthcoming: 21) summarize as follows the contrast between sample and national: ‘Specifically, the sample firms are slightly larger (with an average 130 compared to 117 employees) and more profitable (with a mean annual profit of 3.9 million CNY compared to 3.4 million nationally)’.
There are several advantages to the research design. The high proportion of owners and founders in the sample who have been with the company from the very beginning of its operation provides excellent conditions for the collection of network data also incorporating historical entries covering the earlier life-course of the company. Another important advantage of our sample is the remarkably high re-survey rate accomplished in 2012: 83 percent of the respondents in our 2012 survey also participated in 2009. This provides opportunities to control for earlier economic records to separate network effects observed today from mere signaling effects that might occur if today's network-structure were simply be reflection of past success (breeding today's success). A final advantage of earlier rounds of data is the rich data-base allowing us to check for logical breaks and detection of potentially false entries in the 2012 survey, which could be detected and corrected before the fieldwork ended.
As implied by the previous sentence, the survey fieldwork was carefully controlled to ensure quality data. All data were collected in face-to-face interviews conducted by teams of two professional local interviewers, who typically conducted the interview at the company's premises. The great majority of interviews were conducted in the manager's office, without additional persons present. All interviewers had previously undergone intense multi-day training workshops, received detailed manuals, and instructions that were taken to the field providing quick answers for trouble-shooting and specifying the code-of-conduct during the interview process. Focus groups discussed the survey instrument for accuracy and the feasibility. Before taking the survey to the field, the instrument was subjected to an extended pre-test with a group of 70 entrepreneurs randomly sampled for this purpose from the same cities and industrial sectors as the main survey. The pretests were used to check on the effectiveness of the questionnaire design, as well as ensure the consistent quality of interviews and interviewers. These precautions resulted in two significant changes to the initial network module, one to protect network confidentiality, and a second to define trust in a way meaningful to the respondents.
Name Generator Items
The six name generator questions are listed in Table A1, in the order in which questions were asked in the interview. The survey instrument and materials used with the entrepreneurs are available to download in the original English (see acknowledgement note). Questions 3, 4, and 5 are generic questions in management research describing a business leader's current network. Question 3 asks for the names of people who the respondent feels are most valuable in his or her business activities. Question 4 is included to ensure that difficult people are included in the network inventory, and question 5 is to ensure that externally focused entrepreneurs include at least one valuable employee in the business.
Event Name Generator Items
To stretch the network data back into the history of a respondent's business, event name generators were used. The idea is to create a time line of concrete events back in time, then ask for the names of contacts who were especially valuable to the respondent during the event. The item is illustrated in Figure A2. The interviewer guides the respondent through the example at the top of Figure A2 as the respondent completes the time line below for his or her business. The year of the survey is to the right, 2012. To the left, the respondent enters the year his or her business was founded, marks the mid-point between the dates, and the midpoints at the quarter periods. The respondent is then asked to indicate the year and nature of significant events in the business. Here are the instructions to the respondent after the four dates had been written on the time line:
Use the four dates as a frame of reference to write in each year during which you experienced a significant event for your business. Please limit yourself to five or fewer significant events. We rely on your judgment to determine what events are significant, but examples could include events like the ones that happened to the example firm at the top of your worksheet. After the firm was founded in 1992, the owner secured a relationship with a key technology partner in 1993. The business prospered. To expand faster, a bank loan was obtained in 1999. In 2000, the firm had to deal with the problem that a critical supplier was purchased so it was no longer available. A new supplier was arranged and the business grew into its first export contract in 2004. Four years later, in 2008, a contract was secured with the current primary export customer.
Different firms have different histories. In the space at the bottom of your worksheet, please indicate up to five significant events in the history of your firm. Please be sure to include the year in which each event took place. You have a lot of space; so don't worry about scratching things out.
Upon finishing the time line, the respondent was asked the first name generator in Table A1: ‘Who was the one person most valuable to you in founding the firm’? A similar question was posed for each of the significant events listed. Table A1 shows that all 700 respondents named a contact most valuable when the firm was founded, then named an average of 3.86 contacts most valuable during subsequent events. For each of these ‘event’ contacts, we know the event year and the kind of event in which the respondent valued the contact. Of course, the same person could be named on multiple events and multiple name generators.
The final name generator in Table A1 is a ‘not elsewhere classified’ generator used to ensure that a critical contact had not yet been missed. Only 16 respondents had another name to add to the ones already listed. In total, respondents named an average of 6.38 contacts, varying from a minimum of three up to a maximum of 12.
Name Interpreter Items
Given a roster of key contacts, the name interpreters in Figure A3 were used to elicit data on contact gender, the substance of the respondent's connection with each contact (emotional closeness, duration, frequency, trust), the variety of roles in which respondent and contact have been linked (family, neighbor, party, childhood, classmate, military, co-worker, co-member business association), and the strength of connections between contacts. With specific relevance to scaling relations, respondents were asked whether their relationship with each contact was ‘especially close’, ‘close’, ‘less close’, or ‘distant’. They were also asked to describe whether the connection between each person named was ‘especially close’, ‘distant’, or something in between (‘neither distant nor especially close’).
The items listed in Figure A3 are generic to survey network data, with the exception of the trust item. Two versions of the trust item were pre-tested, the one in Figure A3 based on full disclosure, and an alternative based on reciprocity: ‘For example, suppose one of the listed people asked for your help. The help is not extreme, but it is substantial. It is a level of help you cannot offer to many people. To what extent would you trust each person to do the right thing in returning a comparable favor in the future, either by helping you is a similarly significant way, or providing suitable compensation for your help’? Respondents in the pre-test had no difficulty with the idea of reciprocity, but the ‘right thing’ to do varied across respondents and kinds of contacts. The full disclosure version in Figure A3 had consistent meaning for the respondents, so it became the version used in the survey.
The usual name generator/interpreter format was modified slightly to ensure respondent comfort talking about network contacts. First, as was learned with the network items in the General Social Survey, respondents often stopped at three names in response to multi-name questions, so interviewers prompted with ‘Anybody else’? Second, the pre-test revealed discomfort in naming contacts, even though the respondents were encouraged to use nicknames and it would have been prohibitively expensive to track down a contact with the limited information elicited. The discomfort could have been something about the way the name generators were asked because Batjargal et al. (Reference Batjargal, Hitt, Tsui, Arregle, Webb and Miller2013:1034n) found it sufficient to limit contacts to surnames for name generators posed in telephone interviews with Chinese entrepreneurs in Beijing, as did Zhang and Wong (Reference Zhang and Wong2008:418), who relied on surnames because they found: ‘it is difficult to find businessman willing to talk openly about their network utilization. In particular, in recent years, using personal ties for venture fundraising from government agency or banks may be considered improper behavior’. Whatever the reason, comfort was secured in this study by using worksheets. Assisted by the interviewer, the respondent wrote his or her responses in the interview booklet using his or her own words. For the name generators, however, the respondent wrote contact names on a worksheet separate from the booklet. When the name generator items were complete, a sequential, non-redundant roster of contact names was created on a second worksheet for reference when answering the subsequent name interpreter items. The respondent kept both worksheets in his or her possession after the interview. When the roster was complete, the interviewer used it to transcribe to the interview booklet, from the respondent's worksheet, the sequential ID number of contacts named for each name generator. In the interview booklet sent to data entry, contacts were referenced only by ID number. The interviewer took away no names of contacts cited in the interview. The network data are complete on almost every respondent, a commendable achievement considering the nature and complexity of the questions, and the business leaders being interviewed.
Scaling the Data
It is not uncommon to see categorical network data scaled in an ad hoc way to compute network metrics. Relations can be dichotomized into present versus absent (strong response category is a 1, else 0), or assigned a level of strength from the number of response categories (e.g., 1 for ‘especially close’ in the Chinese network module, .75 for ‘close’, .50 for ‘less close’, and .25 for ‘distant’).
An alternative is to infer relation strength from the way respondents use response categories. The general idea, based on balance theory (Doreian, Kapuscinski, Krackhardt, & Szczypula, Reference Doreian, Kapuscinski, Krackhardt and Szczypula1996; Heider, Reference Heider1958), is that the respondent's relationship with a contact should be proportional in strength to the strength of relations that respondent and contact have with other contacts. If I feel close to Jie, I expect the other people close to me to feel close to Jie. The people from whom I feel distant I expect to feel distant from Jie. For probability samples of disconnected networks, such as the General Social Survey, Burt and Guillarte (Reference Burt and Guilarte1986) proposed that an ‘anchor’ contact be identified as the contact most strongly connected to the respondent. By balance theory, the strength of the respondent's relationship with his anchor contact should be proportional to the strength of his perceived relationship between anchor and each other contact named. Associations between categories of relationship can be used to scale the categories relative to one another.
Figure A4 shows the results for the Chinese entrepreneurs (cf. Burt, Reference Burt2010: 290–292, for similar results within a management population). The anchor contact for each respondent is a person with whom the respondent has the strongest direct and indirect connection. Rows in the Figure A4 table distinguish categories of relation strength between respondents and their anchor contact. The 700 respondents cited a total of 4,464 contacts of whom one per respondent is an anchor contact. The other cited contacts are distributed across the columns in the Figure A4 table according to their connection with the respondent's anchor contact. The graphic in Figure A4 shows the results of fitting a one-dimensional loglinear association model to the frequencies in the table (Goodman, Reference Goodman1981). There are three broad levels of connection: At the top of the scale, ‘especially close’ relations are strong, whether they are respondent to contact, or contact to contact. In the middle are ‘close’, ‘less close’, and something ‘neither distant nor especially close’. ‘Distant’ relations are together at the bottom of the scale. When scaled to vary from zero to one, the scores in Figure A4 define the following category scores: especially close (1.0 with contacts, 0.99 between contacts), close (0.57), neither close nor distant between contacts (0.44), less close (0.29), and distant (0.06 with contacts, 0.00 between contacts). From left to right in Figure A4, the loglinear scores are −0.677, −0.599, −0.270, −0.058, 0.127, 0.734, and 0.743. Scaled category scores are computed as a loglinear score plus 0.677, quantity divided by (0.743 + 0.677).
The final result is a symmetric, square matrix of variables measuring the strength of connections between respondent and his or her cited contacts, and between each pair of cited contacts. Table A2 contains descriptive statistics on network indices computed from the matrix for each respondent. The listed indices are often used to measure the advantage provided by a network: size, structural embedding, density, constraint, effective size, and betweenness. These measures are widely available in network analysis software packages (Burt, Reference Burt2010: 293–300; Reference Burt2015). The 0.47 mean density and 0.57 mean network constraint for the Chinese entrepreneurs are close to the respective means of 0.42 and 0.51 reported by Batjargal et al. (Reference Batjargal, Hitt, Tsui, Arregle, Webb and Miller2013: 1036) for sample entrepreneurs in China, France, Russia, and the United States.
There are no network data on Western entrepreneurs comparable to what we have on the Chinese entrepreneurs, so we include in Table A2 mean network scores for managers in two American firms as a frame of reference. Firm A is 455 managers in the supply-chain organization of a large American electronics firm (Burt, Reference Burt2004, Reference Burt2010). Firm B is 257 sales, service and operations managers involved in the Asia-Pacific launch of a new product from a large American software company (Burt, Reference Burt2010). The managers completed network surveys, but with name generator and interpreter items more limited than the items to which the Chinese entrepreneurs responded. The American data are merely provided as a frame of reference. Our sense is that the Chinese networks are not wildly different from the American networks. The Chinese networks are smaller and more dense than the networks in either American firm, but relatively similar to networks around the Asia-Pacific managers in the software company (average across rows of absolute difference in American and Chinese means divided by Chinese mean).