Skip to main content Accessibility help
×
Hostname: page-component-76fb5796d-22dnz Total loading time: 0 Render date: 2024-04-28T18:05:32.149Z Has data issue: false hasContentIssue false

8 - Social networks and organizational wrongdoing in context

Published online by Cambridge University Press:  05 July 2016

Donald Palmer
Affiliation:
University of California, Davis
Celia Moore
Affiliation:
Bocconi University
Donald Palmer
Affiliation:
University of California, Davis
Kristin Smith-Crowe
Affiliation:
University of Utah
Royston Greenwood
Affiliation:
University of Alberta
Get access

Summary

This chapter critically reviews extant social network theory and research on misconduct in and by organizations, focusing primarily on the individual level of analysis and considering the role that social networks play in the initiation, diffusion, effectiveness, and demise of wrongdoing. We conclude that a more comprehensive understanding of the role of social networks in wrongdoing in and by organizations hinges on four contextual factors: (1) the predispositions of the actors involved, (2) the nature of the wrongdoing in question, (3) the institutional environment in which the wrongdoing is perpetrated, and (4) the temporal dynamics through which the wrongdoing unfolds. We also conclude that a more nuanced understanding of the role of social networks in organizational wrongdoing requires greater attention to the quality and type of relationship that a given social tie represents, more extensive utilization of qualitative research methods, learning from emerging social network theory and research in other disciplines, particularly criminology, and further incorporation of the organizational level of analysis.

Introduction

Theory and research on social networks has a long tradition in sociology, social psychology, and anthropology and an increasing presence in organizational studies. In this chapter, we critically review the embryonic but growing body of social network theory and research on misconduct in and by organizations. We structure our review around the three main areas of prior research: the role of social networks in the initiation, evolution, and consequences of wrongdoing. We use Brass, Butterfield, and Skaggs’ (1998) seminal theoretical analysis of the role that social networks play in unethical behavior as the starting point for our review, which reaffirms, extends, and in some cases suggests modifications to their arguments. We tap a range of empirical studies on social networks and organizational misconduct, most importantly a series of investigations by Baker, Faulkner, and associates (Baker and Faulkner 1993, 2003, 2004; Faulkner and Cheney 2014; Faulkner et al. 2003) to flesh out our discussion. We conclude that a comprehensive understanding of the role of social networks in wrongdoing in and by organizations hinges on several contextual factors that social network analyses sometimes overlook in the drive to use the patterns of relationships among wrongdoers and their victims as the dominant explanatory device. We end by suggesting several lines of inquiry that social network analysts might explore in connection with organizational wrongdoing in the future.

Type
Chapter
Information
Organizational Wrongdoing
Key Perspectives and New Directions
, pp. 203 - 234
Publisher: Cambridge University Press
Print publication year: 2016

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Ahern, K. R. 2015. “Information networks: Evidence from illegal insider trading tips,” Working paper, Marshall School of Business, University of Southern California.
Ashforth, B. E. and Anand, V. 2003. “The normalization of corruption in organizations,” Research in Organizational Behavior 25: 1–52.Google Scholar
Aven, B. L. 2015. “The paradox of corrupt networks: An analysis of organizational crime at Enron,” Organization Science 26: 980–996.Google Scholar
Baccara, M. and Bar-Isaac, H. 2008. “How to organize crime,” Review of Economic Studies 75: 1039–1067.Google Scholar
Baker, W. E. and Faulkner, R. R. 1993. “The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry,” American Sociological Review 58: 837–860.Google Scholar
Baker, W. E. and Faulkner, R. R. 2003. “Diffusion of fraud: Intermediate economic crime and investor dynamics,” Criminology 41: 1173–1206.Google Scholar
Baker, W. E. and Faulkner, R. R. 2004. “Social networks and loss of capital,” Social Networks 26: 91–111.Google Scholar
Braithwaite, J. 2005. Markets in Vice, Markets in Virtue. New York: Oxford University Press.
Brass, D. J., Butterfield, K. D., and Skaggs, B. C. 1998. “Relationships and unethical behavior: A social network perspective,” Academy of Management Review 23: 14–31.Google Scholar
Burt, R. S. 1992. Structural Holes: The Social Structure of Competition. Cambridge: Harvard University Press.
Campana, P. and Varese, F. 2013. “Cooperation in criminal organizations: Kinship and violence as credible commitments,” Rationality and Society 25: 263–289.Google Scholar
Caravita, S. C., Sijtsema, J. J., Rambaran, J. A., and Gini, G. 2014. “Peer influences on moral disengagement in late childhood and early adolescence,” Journal of Youth and Adolescence 43: 193–207.Google Scholar
Clinard, M. B. and Quinney, R. 1973. Criminal Behavior Systems: A Typology. New York: Holt, Rinehart and Winston.
DiMaggio, P. and Louch, H. 1998. “Socially embedded consumer transactions: For what kinds of purchases do people most often use networks? American Sociological Review 63: 619–637.Google Scholar
Domanick, J. 1991. Faking It in America: Barry Minkow and the Great ZZZZ Best Scam. New York: Knightsbridge Publishing Company.
Everton, S. F. 2012. Disrupting Dark Networks. New York: Cambridge University Press.
Faulkner, R. R. and Cheney, E. R. 2014. “Breakdown of brokerage: Crisis and collapse in the Watergate conspiracy,” in Morselli, Carlo (ed.), Crime and Networks: 263–284. New York: Routledge.
Faulkner, R. R., Cheney, E. R., Fisher, G. A., and Baker, W. E. 2003. “Crime by committee: Conspirators and company men in the illegal electrical industry cartel, 1954–1959,” Criminology 41: 511–554.Google Scholar
Finney, H. C. and Lesieur, H. R. 1982. “A contingency theory of organizational crime,” in Bacharach, S. B. (ed.), Research in the Sociology of Organizations: 255–299. Greenwich, CT: JAI Press.
Fisman, R. and Miguel, E. 2007. “Corruption, norms, and legal enforcement: Evidence from diplomatic parking tickets,” Journal of Political Economy 115: 1020–1048.Google Scholar
Gino, F., Ayal, S., and Ariely, D. 2009. “Contagion and differentiation in unethical behavior: The effect of one bad apple on the barrel,” Psychological Science 20: 393–398.Google Scholar
Gino, F., Gu, J., and Zhong, C.-B. 2009. “Contagion or restitution? When bad apples can motivate ethical behavior,” Journal of Experimental Social Psychology 45: 1299–1302.Google Scholar
Granovetter, M. 1985. “Economic action and social structure: The problem of embeddedness,” American Journal of Sociology 91: 481–510.Google Scholar
Granovetter, M. S. 1973. “The strength of weak ties,” American Journal of Sociology 78: 1360–1380.Google Scholar
Henriques, D. B. 2011. The Wizard of Lies: Bernie Madoff and the Death of Trust. New York: Henry Holt.
Iowa Securities Bureau. 2001. “Affinity Fraud.” Iowa Insurance Division. Available from www.iid.state.ia.us/division/securities/InvestorEd/.
Jancsics, D. 2015. “‘A friend gave me a phone number’ – Brokerage in low-level corruption,” International Journal of Law, Crime and Justice 43: 68–87.Google Scholar
Janis, I. L. 1983. Groupthink: Psychological Studies of Policy Decisions and Fiascoes. Boston: Houghton Mifflin.
Kappen, J., Papachristos, A., Faulkner, R., and Cheney, E. 2010. “In the Den: The evolution of illegal networks,” Working paper, Isenberg School of Management, University of Massachusetts, Amherst.
Keltner, D., Gruenfeld, D. H., and Anderson, C. 2003. “Power, approach, and inhibition,” Psychological Review 110: 265–284.Google Scholar
Kirby, J. A. and Hanna, J. 1994. “Broker beckons clients, restauranteurs prime targets,” Chicago Tribune, June 19.
Lehman, D. W. and Ramanujam, R. 2009. “Selectivity in organizational rule violations,” Academy of Management Review 34: 643–657.Google Scholar
Lowry, T. 1998. “Broker's pyramid falls on friends, neighbors,” USA Today, October 21.
MacLean, T. 2001. “Thick as thieves: A socially embedded model of rule breaking in organizations,” Business and Society 40: 167–196.Google Scholar
Manz, C. C. and Sims, H. P. 1981. “Vicarious learning: The influence of modeling on organizational behavior,” Academy of Management Review 6: 105–113.Google Scholar
Mars, G. 1973. “Hotel pilferage: A case study in occupational theft,” in Warner, Malcolm (ed.), The Sociology of the Workplace: An Interdisciplinary Approach: 200–210. London: George Allen and Unwin.
Mars, G. 1974. “Dock pilferage: A case study in occupational theft,” in Rock, P. and McIntosh, M. (eds.), Deviance and Social Control: 209–228. London: Tavistock Institute.
Mohliver, A. C. 2012. “The legitimacy of corrupt practices: Geography of auditors advice and backdating of stock option grants,” Paper presented at the Academy of Management Annual Meeting, Boston.
Morselli, C. 2010. “Assessing vulnerable and strategic positions in a criminal network,” Journal of Contemporary Criminal Justice 26: 382–392.Google Scholar
Morselli, C., Giguère, C., and Petit, K. 2007. “The efficiency/security trade-off in criminal networks,” Social Networks 29: 143–153.Google Scholar
Morselli, C. and Roy, J. 2008. “Brokerage qualifications in ringing operations,” Criminology 46: 71–98.Google Scholar
Nadler, D. A. and Lawler, E. E. 1977. “Motivation: A diagnostic approach,” in Hackman, J. R., Lawler, Edward E., and Porter, Lyman W. (eds.), Perspectives on Behavior in Organizations: 26–38. New York: McGraw-Hill.
Nash, R., Bouchard, M., and Malm, A. 2013. “Investing in people: The role of social networks in the diffusion of a large scale fraud,” Social Networks 35: 686–698.Google Scholar
Natarajan, M. 2006. “Understanding the structure of a large heroin distribution network: A quantitative analysis of qualitative data,” Journal of Quantitative Criminology 22: 171–192.Google Scholar
Neu, D., Everett, J., Rahaman, A. S., and Martinez, D. 2013. “Accounting and networks of corruption,” Accounting, Organizations and Society 38: 505–524.Google Scholar
O'Fallon, M. J. and Butterfield, K. D. 2012. “The influence of unethical peer behavior on observers’ unethical behavior: A social cognitive perspective,” Journal of Business Ethics 109: 117–131.Google Scholar
Orru, M., Biggart, N. W., and Hamilton, G. G. (eds.). 1996. Economic Organization of East Asian Capitalism. Thousand Oaks, CA: Sage.
Palmer, D. and Yenkey, C. 2015. “Drugs, sweat and gears: An organizational analysis of performance enhancing drug use in the 2010 Tour de France,” Social Forces 94(2): 891–922.Google Scholar
Papachristos, A., Braga, A., and Hureau, D. 2012. “Social networks and the risk of gunshot injury,” Journal of Urban Health 89: 992–1003.Google Scholar
Papachristos, A. V. 2009. “Murder by structure: Dominance relations and the social structure of gang homicide,” American Journal of Sociology 115: 74–128.Google Scholar
Papachristos, A. V. 2011. “The coming of a networked criminology,” in MacDonald, J. (ed.), Measuring Crime and Criminality: 101–140. New Brunswick, NJ: Transaction Publishers.
Papachristos, A. V., Hureau, D. M., and Braga, A. A. 2013. “The corner and the crew: The influence of geography and social networks on gang violence,” American Sociological Review 78: 417–447.Google Scholar
Papachristos, A. V., Meares, T. L., and Fagan, J. 2012. “Why do criminals obey the law? The influence of legitimacy and social networks on active gun offenders,” Journal of Criminal Law & Criminology 102: 397.Google Scholar
Perrow, C. 2007. The Next Catastrophe: Reducing Our Vulnerabilities to Natural, Industrial, and Terrorist Disasters. Princeton: Princeton University Press.
Pinto, J., Leana, C. R., and Pil, F. K. 2008. “Corrupt organizations of organizations of corrupt individuals? Two types of organization-level corruption,” Academy of Management Review 33: 685–709.Google Scholar
Pozner, J. E. 2008. “Stigma and settling up: An integrated approach to the consequences of organizational misconduct for organizational elites,” Journal of Business Ethics 80: 141–150.Google Scholar
Raab, J. R. and Milward, H. B. 2003. “Dark networks as problems,” Journal of Public Administration Research and Theory 13: 413–439.Google Scholar
Raven, B. H. 1974. “The Nixon group,” Journal of Social Issues 30: 297–320.Google Scholar
Robinson, S. L., Wang, W., and Kiewitz, C. 2014. “Coworkers behaving badly: The impact of coworker deviant behavior upon individual employees,” Organizational Psychology and Organizational Behavior 1: 123–143.Google Scholar
Simmel, G. 1950. The Sociology of Georg Simmel. New York: Free Press.
Stuart, C. and Moore, C. 2015. “Shady characters: The implications of illicit organizational roles for resilient team performance,” Working paper, The Johns Hopkins Carey Business School.
Sullivan, B. N., Haunschild, P., and Page, K. 2007. “Organizations non gratae? The impact of unethical corporate acts on interorganizational networks,” Organization Science 18: 55–70.Google Scholar
Sutherland, E. H. 1949/1983. White Collar Crime: The Uncut Version. New Haven: Yale University Press.
Sykes, G. M. and Matza, D. 1957. “Techniques of neutralization: A theory of delinquency,” American Sociological Review 22: 664–670.Google Scholar
Varese, F. 2013. “The structure and the content of criminal connections: The Russian mafia in Italy,” European Sociological Review 29: 899–909.Google Scholar
Waytz, A. and Epley, N. 2012. “Social connection enables dehumanization,” Journal of Experimental Social Psychology 48: 70–76.Google Scholar
Westphal, J. D. and Zajac, E. J. 2001. “Decoupling policy from practice: The case of stock repurchase programs,” Administrative Science Quarterly 46: 202–228.Google Scholar
Wurthmann, K. A. 2014. “Service on a stigmatized board, social capital, and change in number of directorships,” Journal of Management Studies 51: 814–841.Google Scholar
Zey-Ferrell, M. and Ferrell, O. C. 1982. “Role-set configuration and opportunity as predictors of unethical behavior in organizations,” Human Relations 35: 587–604.Google Scholar
Zey-Ferrell, M., Weaver, K. M., and Ferrell, O. C. 1979. “Predicting unethical behavior among marketing practitioners,” Human Relations 32: 557–569.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×