Elsevier

Social Networks

Volume 66, July 2021, Pages 72-90
Social Networks

Collecting experimental network data from interventions on critical links in workplace networks

https://doi.org/10.1016/j.socnet.2021.02.004Get rights and content

Highlights

  • We illustrate the use of a dyadic intervention method within the framework of social network data collection.

  • We report on challenges of getting access and designing participatory network data collection.

  • We discuss opportunities of network alteration methods for identifying causality in social network research.

  • We propose recommendations for gathering data from social network interventions in business settings.

Abstract

This article describes and discusses challenges associated with interventionist network data gathering in organizational settings, with a special focus on dyadic interventions. While pointing out major risks of these approaches, we argue that collecting data in combination with dyadic network alteration methods can enable social network researchers to explore network mechanisms from a new angle and potentially benefit the members of the targeted social networks and the entire collectives, if certain research design and implementation principles are followed. We introduce a facilitated self-disclosure method for strengthening critical dyads in social networks in combination with longitudinal and retrospective network measurement. We assess the participants’ perceptions of the different stages of this process by qualitative interviews. The study illustrates that experimental network data collection includes some extra challenges in addition to the many challenges of observational network data collection but participants also reported practical benefits that would not be gained through observational network surveys alone. The results highlight the importance of early and continuous communication during the data collection process with all research participants, not just the management, and the benefits of sharing more of the preliminary results. The lessons learnt through this study can inform the design of experimental network data collection to prioritize the preferences of the participants and their benefits.

Introduction

Almost every day at work, we organize and are subjected to network interventions. Teams are formed, organizations are merged and restructured, staff members are relocated, meetings are called to introduce staff members to each other, and office spaces are redesigned. We are expected to participate in drinks after work and team building events (Coburn, 2016). These activities are conducted with the explicit or implicit aim of manipulating our networks to improve workplace effectiveness, efficiency, collaboration, and cohesion. Network alteration preoccupies management (even if it is not usually thought about in those terms), and is a part of our everyday work experience.

In contrast to everyday practice, deliberate network alteration is still rarely a part of social network data collection (Valente, 2012). Although the idea of using sociometry for action research “in situ” goes back at least to Moreno (1951), apart from studies of online communication and experiments in virtual settings, academic social network researchers have still relatively little experience with collecting real-world interventionist data. Long after Moreno’s days, deliberate network alternation has been taken up mainly by non-academic consultancy companies promising to improve organisational efficacy and collaboration and to unblock bottlenecks in information flows. The academic community of social network researchers seems to have less knowhow and practice to get access to and maintain trust of partner organizations and, importantly, their employees. While there is no shortage of consultancies that market organizational network services, few network interventions are recorded with scientific rigor. There seem to be no well-documented repeatable protocols and rigorous procedures on how to gather interventionist network data of offline interactions in an ethical and reciprocal way so that the researchers are not the only ones benefitting from the exercise, and the data validly reflects issues that really matter to the participants. To get access and make a valued practical contribution, we need more awareness and understanding on how to conduct real-world network interventions in a style that makes the participants feel like respected professionals whose choices and wellbeing are valued, not like they are being manipulated for someone else’s data needs or motives of the management.

Because we are ill equipped for collecting network data in complex professional settings while the observed networks are being deliberately changed, we do not understand the specific effects of professional networking, team-building, and organizational restructuring activities. While fragmented networks at work can cause distress and wasted productivity, measures taken to reshape workplace social networks are often not backed by research evidence. We do not know whether some well-intentioned initiatives could be counterproductive because we seldom collect data on how networks respond to interventions. We even lack evidence on whether the desired social network structures would lead to desired outcomes. Although managers may implement policies to centralize or decentralize networks in organizations, it is hard to say which structures are more effective without evidence, or with evidence provided only from observational studies. More of networking activities is not always better.

From an academic viewpoint, interventionist network data collection is a means to explore causal network mechanisms that can be only partially inferred from observational studies. Changing certain aspects of networks and observing the change in network outcomes helps us understand network consequences. To test network theories and to provide practical managerial implications, we need data capturing causal processes on networks. However, causality, in its strict sense, is difficult to test in research of real-world social networks without exogenously intervening in their specific aspects. In an even stricter sense, causal effects of exogenous interventions are impossible to establish without controlled trials over a large number of networks (randomized at the level of networks), because interactive and emergent properties mean that the entire network should be considered as “treated” by an intervention to any of its components. To this date, feasible tools and protocols for interventionist network data collection remain largely underexplored and undocumented.

The goal of this article is to enhance the toolbox of experimental social network data gathering methods through examination of what worked and what did not work during a social network intervention aimed at altering specific dyads in a workplace context. To strengthen critical relationships in expressive communication networks in a large organization in Australia, we applied a well-described, well-tested, and repeatable procedure that had been shown to increase interpersonal closeness in studies in other fields; a facilitated personal self-disclosure technique (Aron et al., 1997). The practical aim of this article is to explore the challenges associated with implementation of such method in combination with network research and, based on these lessons, propose recommendations for conducting general and dyad-targeting social network interventions for experimental network data gathering in business settings.

Section snippets

Practical and theoretical rationale for interventionist network data collection

Valente (2012) distinguishes four main network intervention strategies: (1) identification of key individuals for intervention targeting, (2) segmentation of the targeted population into groups, (3) induction; i.e., excitation of the existing network to catalyze contagion, and (4) alteration; i.e., rewiring of the network into a more effective structure. While identification of key individuals appears to be by far the most common network intervention strategy, deliberate alteration of network

What we did: stages of interventionist data collection

In this section, we describe the stages of data collection and implementation of dyadic intervention in a workplace, with a focus on challenges encountered in the process.

Participant responses to the data collection and intervention processes

In this section, we discuss the results of the analysis of the qualitative and quantitative participant feedback on the intervention and the data collection process. This section does not cover assessment of the effectiveness of the self-disclosure method, the substantial outcomes or the managerial implications of the intervention as these are not the subject of this paper.

Our observations regarding opportunities and challenges of collecting network intervention data in a business setting

While network interventions are an everyday reality in most organizations, these initiatives are typically not informed by network data or evidence from network research because rigorous interventionist data collection is complicated and rare in practice. Social network scholars are normally not invited to participate in real world interventions. Reflecting on our experience from implementing the present study, we attempt to propose some general recommendations for interventionist network data

Conclusions

This article tells the behind-the-scenes story of an interventionist network data collection research project. Learning from this experiment may help researchers interested in changing social networks, and measuring the outcomes of that change, to identify some potentially dangerous pitfalls and conduct better interventionist network studies. As we argued in the beginning of this paper, being able to directly alter specific links within a social network potentially allows for more rigorous

References (74)

  • N. Harrigan et al.

    Avoidance in negative ties: inhibiting closure, reciprocity, and homophily

    Soc. Networks

    (2017)
  • N.M. Harrigan et al.

    Negative ties and signed graphs research: stimulating research on dissociative forces in social networks

    Soc. Networks

    (2020)
  • C. Kadushin

    Who benefits from network analysis: ethics of social network research

    Soc. Networks

    (2005)
  • D. Krackhardt et al.

    Structure, culture and Simmelian ties in entrepreneurial firms

    Soc. Networks

    (2002)
  • E. Lazega et al.

    Multiplexity, generalized exchange and cooperation in organizations: a case study

    Soc. Networks

    (1999)
  • P. Matous et al.

    External exposure, boundary-spanning, and opinion leadership in remote communities: a network experiment

    Soc. Networks

    (2019)
  • B. Pauksztat et al.

    Who speaks up to whom? A relational approach to employee voice

    Soc. Networks

    (2011)
  • E. Quintane et al.

    Short- and long-term stability in organizational networks: temporal structures of project teams

    Soc. Networks

    (2013)
  • J. Saint-Charles et al.

    Different relationships for coping with ambiguity and uncertainty in organizations

    Soc. Networks

    (2009)
  • M.L. Small

    Weak ties and the core discussion network: why people regularly discuss important matters with unimportant alters

    Soc. Networks

    (2013)
  • S. Sprecher et al.

    Taking turns: reciprocal self-disclosure promotes liking in initial interactions

    J. Exp. Soc. Psychol.

    (2013)
  • C. Stadtfeld et al.

    The emergence and stability of groups in social networks

    Soc. Networks

    (2020)
  • T. Towles-Schwen et al.

    Automatically activated racial attitudes as predictors of the success of interracial roommate relationships

    J. Exp. Soc. Psychol.

    (2006)
  • T. Vacharkulksemsuk et al.

    Strangers in sync: achieving embodied rapport through shared movements

    J. Exp. Soc. Psychol.

    (2012)
  • M.A.J. van Duijn et al.

    Multilevel analysis of personal networks as dependent variables

    Soc. Networks

    (1999)
  • I. Altman et al.

    Social Penetration: the Development of Interpersonal Relationships

    (1973)
  • B.R. Andersen et al.

    Social ties between team members affect patient satisfaction: a data-driven approach to handling complex network analyses

    Adv. Health Sci. Educ.

    (2019)
  • S. Aral et al.

    Identifying influential and susceptible members of social networks

    Science

    (2012)
  • A. Aron et al.

    The experimental generation of interpersonal closeness: a procedure and some preliminary findings

    Pers. Soc. Psychol. Bull.

    (1997)
  • K. Bijlsma-Frankema et al.

    Distrust in the balance: the emergence and development of intergroup distrust in a court of law

    Organ. Sci.

    (2015)
  • S.P. Borgatti et al.

    Ethical and strategic issues in organizational social network analysis

    J. Appl. Behav. Sci.

    (2003)
  • S.P. Borgatti et al.

    Techniques: dichotomizing a network

    Connections

    (2018)
  • S.P. Borgatti et al.

    UCINET

  • Aa.G.K. Carpenter

    Social penetration theory

  • T. Casciaro et al.

    When competence is irrelevant: the role of interpersonal affect in task-related ties

    Adm. Sci. Q.

    (2008)
  • T. Casciaro et al.

    The contaminating effects of building instrumental ties:how networking can make us feel dirty

    Adm. Sci. Q.

    (2014)
  • D. Centola

    The spread of behavior in an online social network experiment

    Science

    (2010)
  • Cited by (3)

    • Multilevel network interventions: Goals, actions, and outcomes

      2023, Social Networks
      Citation Excerpt :

      In an intervention directed at independent individuals, any one person may withdraw from the intervention, or not participate at all. If the intervention is directed at the social network – at the social system itself – there may not be a satisfactory option for individuals to completely withdraw from all consequences (Matous et al., 2021a). Most social network research raises ethical considerations inherent to the study of potentially sensitive connections between human participants (Kadushin, 2005).

    View full text