Embeddedness for Control, for Compatibility, or by Constraint? Within-Network Exchange in the Selection of Home Remodelers
نویسندگان
چکیده
This paper advances our understanding of why some transactions are “embedded” in preexisting social relations and some are not. While prior research tends to interpret such relations as instruments that transaction parties use to control one another in situations of vulnerability, this interpretation has difficulty accounting for high rates of embeddedness among the many consumer transactions where there are alternative safeguards (e.g., reputational penalties) against such exploitation. Apparent empirical support for this “embeddedness-as-control” thesis from the 1996 General Social Survey (DiMaggio and Louch 1998) is limited by mixed findings, by recourse to indirect measures of the mechanisms involved, and by an inability to compare the selected seller with those who were rejected. The present study analyzes data from a 2004 national survey of American homeowners concerning recent home remodeling projects, which helps address each of the weaknesses of the 1996 GSS. Results are largely inconsistent with the embeddedness-as-control thesis. Instead, two mechanisms that have not received sufficient attention in past research seem important in leading homeowners to select remodelers from among members of their social networks: (a) consumers often seek sellers who are particularly compatible with their needs and desires and regard strangers as less likely to be compatible; and (b) that buyers often feel constrained or obligated to keep their business “within the family,” and do not even consider alternatives.
منابع مشابه
Optimal Coding Subgraph Selection under Survivability Constraint
Nowadays communication networks have become an essential and inevitable part of human life. Hence, there is an ever-increasing need for expanding bandwidth, decreasing delay and data transfer costs. These needs necessitate the efficient use of network facilities. Network coding is a new paradigm that allows the intermediate nodes in a network to create new packets by combining the packets recei...
متن کاملExplaining Reasons and Factors of Job Embeddedness: Mixed Research
Objectives: The purpose of this study is to identify the reasons and factors that will improve the survival of employees in the organization. In other words, we seek the answer to the question “why don’t people leave their jobs for another destination?” For this purpose, this study uses the concept of job embeddedness to examine the factors affecting the survival of employees. Method: In this ...
متن کاملCliques Role in Organizational Reputational Influence: A Social Network Analysis
Empirical support for the assumption that cliques are major determinants of reputational influence derives largely from the frequent finding that organizations which claimed that their cliques’ connections are influential had an increased likelihood of becoming influential themselves. It is suggested that the strong and consistent connection in cliques is at least partially responsible for the ...
متن کاملQuasi Random Deployment Strategy for Reliable Communication Backbones in Wireless Sensor Networks
Topology construction and topology maintenance are significant sub-problems of topology control. Spanning tree based algorithms for topology control are basically transmission range based type construction algorithms. The construction of an effective backbone, however, is indirectly related to the placement of nodes. Also, the dependence of network reliability on the communication path undertak...
متن کاملEstimation of Software Reliability by Sequential Testing with Simulated Annealing of Mean Field Approximation
Various problems of combinatorial optimization and permutation can be solved with neural network optimization. The problem of estimating the software reliability can be solved with the optimization of failed components to its minimum value. Various solutions of the problem of estimating the software reliability have been given. These solutions are exact and heuristic, but all the exact approach...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008