44 tools and resources for social scientists

Over the years I’ve gotten great tips from colleagues and students about the tools that have helped them become more productive researchers.  Below is a list of the 44 tools and resources that have changed how I do research. Get teched up Excellent technical skills are the bedrock of a successful research career. Today, publishing […]

Where do networks come from?

The key assumption underlying both the peer effects and structural approaches to network effects assume some degree of exogeneity in the existence and structure of network ties. Exogeneity is both a theoretical claim as well as an empirical assumption. All reasonable theories are built on a set of axioms that assume some primitive or exogenous features of the world […]

Peer effects, knowledge transfer and social influence

The structural approach to social networks is inherently beautiful as a representational approach. I am always in awe of the fact that we can learn so much about how human beings act or their outcomes based merely on the pattern of their social ties. The idea is both simple and profound. The structural approach is built on assumptions regarding […]

Entrepreneurial networks

Who is this? Keep this face in mind, at least for a bit. In the prior lecture we discussed the simple micro-macro-micro process described in Granovetter (1973), the “Strength of Weak Ties.” Recall what we discussed: The forbidden triad is forbidden because in equilibrium it is generally unstable, because it is unbalanced. The unstable structure of the […]

Network Positions and Advantage: Status

  One of the most important things we do on a day-to-day basis is make predictions about the value of individuals or companies, or really, any entity.  Making such predictions is challenging because we have limited information about the qualities of the entity we are attempting to make predictions about. For instance:  A hiring manager […]

Network Positions and Advantage: Structural Holes

Who is this? Keep this face in mind, at least for a bit. In the prior lecture we discussed the simple micro-macro-micro process described in Granovetter (1973), the “Strength of Weak Ties.” Recall what we discussed: The forbidden triad is forbidden because in equilibrium it is generally unstable, because it is unbalanced. The unstable structure of the […]