1,373
Views
72
CrossRef citations to date
0
Altmetric
SYMPOSIUM: THE CONTROL OF LEGAL AND ILLEGAL NETWORKS

The Control of Public Networks

Pages 227-247 | Published online: 11 Jan 2007
 

ABSTRACT

This paper examines the control of networks, an issue that we believe is critical for explaining the overall effectiveness of public networks. We first discuss why it is important to study the issue and why it has been neglected as a topic by public management and organization scholars. We then present the various types of control and how they are utilized in a network context. Finally, we discuss how the mechanisms of control might be related to network effectiveness, drawing heavily on an understanding of how this relationship is addressed by contingency theorists. We close by posing challenges to researchers for developing new insights into the control of networks and why this knowledge is relevant for public managers and policy makers.

Notes

*“Bureaucratic formalized control” includes behavior and output control.

Sources: For the column on organizations: Pugh et al. Citation1968; Blau and Schoenherr Citation1971; Thompson Citation1967; Van de Ven et al. Citation1976; Child Citation1984; Galbraith Citation1973; Lawrence and Lorsch Citation1967; March and Simon Citation1958; Minztberg Citation1983; Burns and Stalker Citation1961; Khandwalla Citation1977; Hage et al. Citation1971.

Some of the major studies on the topic include work by March and Simon (Citation1958), Blau and Scott (Citation1963), Thompson (Citation1967), Lawrence and Lorsch (Citation1967), Child (Citation1973 Citation1984), Galbraith (Citation1973), Ouchi (Citation1977 Citation1979 Citation1980), Mintzberg (Citation1979 Citation1983), Bartlett and Goshal (Citation1989), and Martinez and Jarillo (Citation1991).

In their seminal book, The External Control of Organizations, Pfeffer and Salancik (Citation1978) examined how organizations are constrained by environmental uncertainty and resource dependencies, and how organizations respond to uncertainty through various bridging and buffering strategies. Although we borrow Pfeffer and Salancik's title, we focus not on organizations, but on networks, and on intentional control imposed by external sources (cf. Zald Citation1978).

This is a very interesting conceptual piece. Although the article and the issues Zald addressed are highly relevant from a network governance perspective, the article has rarely been cited over the last 25 years, according to the Social Science Citation Index.

“Hierarchies have a difficult time fighting networks. […] It takes networks to fight networks. Governments…have to adopt organizational designs and strategies like those of their adversaries.[…] Whoever masters the network form first and best will gain major advantages.[…] However, governments tend to be so constrained by hierarchical habits and institutional interests that it may take some sharp reverses…before a willingness to experiment more seriously with networking emerges” (Ronfeldt and Arquilla Citation2001, 20 f.).

This corresponds with the argument of Hennart (Citation1993), who made a significant contribution to transaction cost theory by distinguishing between methods of organizing (the price system and hierarchy) and economic institutions (markets and firms).

This might include: the parliament (via elections, parliamentary committees, parliamentary questions, informal lobbying of ministers by MPs, lobbying by outsiders), a ministry or department (via framework documents and business plans, performance indicators, etc.), a citizen's charter, local authorities (via elections, publicly open meetings and minutes, monitoring officers, competitive tendering regulations, scrutiny committees, etc.), third party mechanisms (ombudsmen, an audit commission, courts, tribunals) mechanisms of property (via registers of interest, codes of conduct, rules for appointments, encouragement of transparency), the market (via consumer choices), horizontal mechanisms (professional accountability from peers, representativeness of board members), press and other media, and many different kinds of stakeholders (see McConnel Citation1996).

Persons, groups, organizations, industries, or as we discuss here, networks.

This could refer to control over almost any objective (see Kenis Citation2001b), but our focus here is primarily goal attainment and negative externalities.

These might include: the degree to which those who control are identifiable to those who are controlled; the degree to which those who are controlled are identifiable to those who control; the degree to which those controlled and the controllers share norms; the degree to which the controlled trust that the controllers abide by shared norms; the degree to which institutions exist that provide settlement of disputes over the interpretation of these norms, and whether the rules have abided them (cf. van Kersbergen and van Waarden Citation2001, 27).

This might include regulation, incentives, payments, infiltration, etc. (cf. Howlett, Citation2001).

This might include power, money, information, etc.

Additional information

Notes on contributors

Patrick Kenis

Patrick Kenis ([email protected]) is a professor of policy and organization studies at the Department of Organizations Studies, Tilburg University. His current research examines the effectiveness of policy and organizational networks.

Keith G. Provan

Keith G. Provan ([email protected]) is the Eller Professor in the School of Public Administration and Policy, University of Arizona. His current research examines organizational networks and interorganizational relationships, especially in a public and nonprofit context.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.