Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

Similar documents
Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

Heterogeneity and homogeneity in library and information science research

ENHANCED HUMAN-AGENT INTERACTION: AUGMENTING INTERACTION MODELS WITH EMBODIED AGENTS BY SERAFIN BENTO. MASTER OF SCIENCE in INFORMATION SYSTEMS

GEORGETOWN LAW. Georgetown University Law Center. CIS-No.: 2007-S521-52

From A Brief History of Urban Computing & Locative Media by Anne Galloway. PhD Dissertation. Sociology & Anthropology. Carleton University

Privacy as Impression Management

On Epistemic Effects: A Reply to Castellani, Pontecorvo and Valente Arie Rip, University of Twente

On the Monty Hall Dilemma and Some Related Variations

CHAPTER 8 RESEARCH METHODOLOGY AND DESIGN

BASIC SCIENCES CENTER BIOCHEMICAL ENGINEER

The workspace design concept: A new framework of participatory ergonomics

National Core Arts Standards Grade 8 Creating: VA:Cr a: Document early stages of the creative process visually and/or verbally in traditional

Indiana K-12 Computer Science Standards

Visual Art Standards Grades P-12 VISUAL ART

Grade 6: Creating. Enduring Understandings & Essential Questions

IB Course Syllabus 2015/16 Visual Arts (HL/SL)

Computational Reproducibility in Medical Research:

Architectural CAD. Technology Diffusion Synthesize information, evaluate and make decisions about technologies.

Laboratory 1: Uncertainty Analysis

Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at

CARRA PUBLICATION AND PRESENTATION GUIDELINES Version April 20, 2017

Correlations to NATIONAL SOCIAL STUDIES STANDARDS

How do our ethical codes relate to safeguarding intellectual property?

200 West Baltimore Street Baltimore, MD TTY/TDD marylandpublicschools.org

UHS Intellectual Property Policies and Procedures

Essay No. 1 ~ WHAT CAN YOU DO WITH A NEW IDEA? Discovery, invention, creation: what do these terms mean, and what does it mean to invent something?

REINTERPRETING 56 OF FREGE'S THE FOUNDATIONS OF ARITHMETIC

Office of Science and Technology Policy th Street Washington, DC 20502

Abstract. Justification. Scope. RSC/RelationshipWG/1 8 August 2016 Page 1 of 31. RDA Steering Committee

Creating Robust Top-Down Assemblies in a Collaborative Design Environment

CHAPTER II A BRIEF DESCRIPTION OF CHARACTERIZATION. both first and last names; the countries and cities in which they live are modeled

Science Curriculum Mission Statement

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

Part I. General issues in cultural economics

Maryland Technology Literacy Standards for Students

SSHRC S KNOWLEDGE MOBILIZATION STRATEGY

design research as critical practice.

Happiness, Wellbeing and the Role of Government: the case of the UK

Absolute Block. Uncontrolled When Printed Document to be part superseded by GKRT0055 Iss 1 and GKRT0077 Iss 1 (published on 07/09/2013)

Information Sociology

Written response to the public consultation on the European Commission Green Paper: From

Conceptual Metaphors for Explaining Search Engines

WORKSHOP ON BASIC RESEARCH: POLICY RELEVANT DEFINITIONS AND MEASUREMENT ISSUES PAPER. Holmenkollen Park Hotel, Oslo, Norway October 2001

Awareness and Understanding in Computer Programs A Review of Shadows of the Mind by Roger Penrose

AP Studio Art 2009 Scoring Guidelines

King s Research Portal

Grade 4: Kansas Visual Art Performance Standards

Laboratory PID Tuning Based On Frequency Response Analysis. 2. be able to evaluate system performance for empirical tuning method;

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

AGN 026 Harmonic Voltage Distortion

Citation for published version (APA): Parigi, D. (2013). Performance-Aided Design (PAD). A&D Skriftserie, 78,

Knowledge Representation and Reasoning

2-D Design Portfolio. Advanced Placement Studio Art 18/19

Advanced Players Newsletter

Trust, but Verify : What the Digital and Transparency Revolutions in Social Science Mean for You. Andrew Moravcsik

Chapter 5 Integers. 71 Copyright 2013 Pearson Education, Inc. All rights reserved.

Technology Engineering and Design Education

VCE Art Study Design. Online Implementation Sessions. Tuesday 18 October, 2016 Wednesday 26 October, 2016

Visual Arts What Every Child Should Know

Methodology for Agent-Oriented Software

101 Sources of Spillover: An Analysis of Unclaimed Savings at the Portfolio Level

Building Collaborative Networks for Innovation

POSITIONAL EVALUATION

Computer and Information Ethics

Compendium Overview. By John Hagel and John Seely Brown

Introduction to Computer Science - PLTW #9340

Common Core Structure Final Recommendation to the Chancellor City University of New York Pathways Task Force December 1, 2011

More of the same or something different? Technological originality and novelty in public procurement-related patents

It is easy to get caught up in the excitement surrounding

Unit 1: Technological Inventions and Innovations. Overview

Learning Goals and Related Course Outcomes Applied To 14 Core Requirements

Processing Skills Connections English Language Arts - Social Studies

The Cover Design DYEING FABRICS IN SIXTEENTH-CENTURY VENICE

Chapter 4. Research Objectives and Hypothesis Formulation

Technology Transfer and Climate Change: International Flows, Barriers and Frameworks

Science Impact Enhancing the Use of USGS Science

TITLE V. Excerpt from the July 19, 1995 "White Paper for Streamlined Development of Part 70 Permit Applications" that was issued by U.S. EPA.

Selection and Acquisition of Materials for Digitization in Libraries 1

SOCIAL STUDIES 10-1: Perspectives on Globalization

National Science Education Standards, Content Standard 5-8, Correlation with IPS and FM&E

Greeley-Evans School District 6 High School Ceramics I Curriculum Guide Unit: Hand building (Pinch, Coil, Slab, Extruder) Timeline: 9 weeks

Nano-Arch online. Quantum-dot Cellular Automata (QCA)

Comment: Social Network Theory (book published last year, Alan Dali, editor/sna in educational change) / Filipa has it

KRZYSZTOF MARTENS OPENING LEAD

Pedigree Reconstruction using Identity by Descent

Patterns allow us to see relationships and develop generalizations.

CSTA K- 12 Computer Science Standards: Mapped to STEM, Common Core, and Partnership for the 21 st Century Standards

Emerging Technologies: What Have We Learned About Governing the Risks?

Greeley-Evans School District 6 High School Ceramics II Curriculum Guides

Station of the Cross Colour Drawing

E S P APPLICATION FOR SUPPORT OF AN EXPERIMENTAL INVESTIGATION OF MENDEL S PRINCIPLES OF HEREDITY IN ANIMALS AND PLANTS

2014 New Jersey Core Curriculum Content Standards - Technology

Digital inequalities in children and young people: A technological matter? Josep Maria Mominó Julio Meneses Universitat Oberta de Catalunya

Investigating LIS Curriculum in both Structure and Content: the PILISSE Model

King s Research Portal

Media and Communication (MMC)

Mapping graphic design practice & pedagogy

Preservation Costs Survey. Summary of Findings

A THINK TANK FOR MALICIOUS PRACTICES ONLINE

Transcription:

Point and Line Vulnerability as Bases for Predicting the Distribution of Power in Exchange Networks: Reply to Willer Author(s): Karen S. Cook, Mary R. Gillmore, Toshio Yamagishi Source: The American Journal of Sociology, Vol. 92, No. 2 (Sep., 1986), pp. 445-448 Published by: The University of Chicago Press Stable URL: http://www.jstor.org/stable/2780165 Accessed: 10/12/2010 21:29 Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/page/info/about/policies/terms.jsp. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Please contact the publisher regarding any further use of this work. Publisher contact information may be obtained at http://www.jstor.org/action/showpublisher?publishercode=ucpress. Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org. The University of Chicago Press is collaborating with JSTOR to digitize, preserve and extend access to The American Journal of Sociology. http://www.jstor.org

POINT AND LINE VULNERABILITY AS BASES FOR PREDICTING THE DISTRIBUTION OF POWER IN EXCHANGE NETWORKS: REPLY TO WILLER' Commentary and Debate David Willer's comment on our 1983 AJS article provides us with a useful opportunity to describe the progress that we have made in refining the measure of vulnerability introduced in that article. To place Willer's commentary in perspective, the primary purpose of our article was to present the results of an experiment and of computer simulations on network centrality and its relation to power in exchange networks. Willer's comment does not deal with these findings. At the very end of the article, we proposed-as a preliminary notion-the idea that vulnerability might be a useful theoretical concept (see p. 299), and we suggested point vulnerability as one potential technique or measurementool for determining points of minimum dependence in networks. Such points would thus be the most powerful network locations according to powerdependence theory. Willer's main criticism is that our measure of vulnerability, Reduction in Maximum Flow (RMF), is not generalizable across all types of networks. On this point he is quite correct. In fact, we clearly noted this limitation (see p. 301, n. 21). We introduced the RMF measure merely as an illustration of the theoretical potential of the notion of vulnerability, not as a refined procedure for use in empirical research. We thoughthat we had made this clear. For example, on page 299 we stated, "Ourfirst step toward a theoretical solution... was prompted by the... concept of 'vulnerability' " (emphasis added). Although Willer takes us to task for not developing a better measure, he does not propose an alternative. Subsequent to publication of our experimental results, we continued to work on this measurement problem and to explore the limitations of our preliminary measure. In this work we explored the use of both point and line vulnerability as the basis for a more general measure. The task that we set for ourselves was to develop a more comprehensive measure. We will briefly describe our proposed solution (more details are available from us in a technical report). The simplest network in which our original RMF measure of vulnerability fails to predict the distribution of power is the four-personetwork shown in figure 1. In this network, all points are predicted by the RMF measure to be of equal power. However, simulation result show that A is 1 The authors' names are listed alphabetically. This work was funded by National Science Foundation grant no. Soc 78-25788. We acknowledge our intellectual debt to the late Richard M. Emerson, coauthor of the article that appeared in the American Journal of Sociology in 1983. 445

American Journal of Sociology A1 '12 B1 B2 FIG. 1.-Four-person exchange network more powerful than B (A's average profit was 65% of the total available profit). To overcome this limitation in the original measure, we introduced the notion of the cost of exercising power. The RMF rmeasure proposed in the 1983 article is based on the graph-theoretic notion of point vulnerability, the notion that the complete removal of an actor from a network can result in a certain loss or reduction in the level of resource exchange throughouthe entire network. An actor can impose a resource loss on the network by isolating himself or hersel from the network, but this act is quite costly to the actor. If the actor can produce the same amount of resource loss without isolating himself completely from the network (and thus keeping open opportunities to exchange with some actors), the cost of exercising power is greatly reduced for that actor. This can be accomplished by an actor's closing off some exchange opportunities rather than removing himself from the network. For example, Al in figure 1 can reduce the maximum flow of resources to 24 units simply by closing off the opportunity to exchange with B, while keeping open the opportunity to exchange with A2. In contrast, B, must isolate himself completely from the network in order to reduce the maximum flow of resources to 24 units. This type of reasoning led us to the graph-theoretic notion of line vulnerability (see Cook, Gillmore, and Yamagishi 1984). A network is vulnerable at a line if removal of that line (or exchange relation) reduces resource flow throughouthe network. Point vulnerability determines the absolute maximum power potential for each position in a network, and line vulnerability determines the cost of exercising structural power. The cost may be defined as a reduction in the potential for gaining profit owing to the removal of lines (or exchange opportunities) in order to 446

Commentary and Debate exercise power at its potential. As a first approximation of the cost measure, we devised a measure that we refer to as CRMF: CRMFi No. of lines that need to be removed to exercise power at its potential = lrmf, Total no. of lines connected to point i We know that this is not a very good approximation, since lines that represent exchange opportunities differ in importance. Some exchange opportunities are more important than others and are thus used more often. Ultimately, we would like to weight the lines by their importance in calculating the CRMF measure. However, even this approximation is sufficient to solve the problem raised by Willer. In the network in figure 1, CRMF for A is one-half, and for B it is one. This measure is relevant only when RMF is not zero. Thus we arrived at a new measure of network-wide dependence, DNi, based on the concepts of point and line vulnerability: DNi= RMFi x (1 - CRMFj). This measure of DNi should not be interpreted as an exact formulation of network-wide dependence in exchange networks; rather, it simply indicates the direction in which our work on this issue is heading. According to this measure, B2 in Willer's figure 2 is predicted to be most powerful, followed by BI, and finally by A1, A2, and A3. It will be easy for the reader to apply this measure to derive predictions of differential power among A, B, and C in Willer's figure 3. We examined, through a series of computer simulations, a number of networks in which the original RMF measure was not successful in predicting the distribution of power (some of which are similar to the cases identified by Willer), and the simulation results repeatedly supported the predictions based on the revised measure. Thus it appears to be a measure superior to the one we introduced in 1983. Willer also claims in several places that our measure leads us to "logically impossible" inferences. While we are not defending our preliminary measure, it is importanto understand the underlying theoretical point. Willer claims, for example, that "if A is exercising power over B, then B cannot be exercising power over A" (emphasis added). This is simply wrong from a power-dependence perspective. Emerson first discussed this issue in his 1962 article: "The notion of reciprocity in powerdependence relations raises the question of equality or inequality of power in the relation. If the power of A over B... is confronted by equal opposing power of B over A, is power then neutralized or cancelled out? We suggest that in such a balanced condition, power is in no way removed from the relationship" (1962, pp. 33-34). If ai social relationship 447

American Journal of Sociology exists because each actor is more or less dependent on the other, then each has some power in that relationship no matter how unequal it may be. We hope that this response clears up any misunderstanding about our intentions in presenting the RMF measure in its early and unrefined stage. Clearly more empirical work is needed on this and other measures currently being developed. Bonacich (1985), for example, has recently proposed a measure that appears quite promising. Perhaps our "exchange" with Willer will serve as a stimulus to more work on this question. University of Washington KAREN S. COOK MARY R. GILLMORE TOSHIO YAMAGISHI REFERENCES Bonacich, Phillip. 1985. "Power and Centrality: A Family of Measures." Unpublished manuscript. Cook, Karen S., Mary R. Gillmore, and Toshio Yamagishi. 1984. "Further Theoretical Considerations and Computer Simulation." Technical Report, University of Washington, Seattle, Department of Sociology. Emerson, Richard M. 1962. "Power-Dependence Relations." American Sociological Review 2 7:31-40. 448