A network-based model of exploration and exploitation

Pieter den Hamer, Koen Frenken*

*Corresponding author for this work

Research output: Contribution to journalArticleAcademicpeer-review

Abstract

We propose a new model of exploration and exploitation, in which firms rely on local search for exploitation and on imitation for exploration. We assume that firms imitate the knowledge base of successful competitors, with imitation errors taking place depending on the social distance between the imitating firm and imitated firm in the network. The key model outcome, consistent with earlier empirical findings, holds that successful imitation generally occurs at an intermediate level of cognitive proximity because imitation at high cognitive distance is too error-prone, while for imitation at low cognitive distance there are typically no firms to imitate. A second outcome holds that social and cognitive proximity are substitutes. The model further shows that exploration by imitation is more beneficial in highly complex industries than in less complex industries, and that small-world networks yield the highest benefits for collective learning.

Original languageEnglish
Pages (from-to)589-599
Number of pages11
JournalJournal of Business Research
Volume129
Early online date2020
DOIs
Publication statusPublished - May 2021

Bibliographical note

Funding Information:
Koen Frenken received funding from the Netherlands Organisation for Scientific Research (NWO) within the Vici-program (number 453-14-014 ).

Funding Information:
We thank Floor Alkemade (Eindhoven University of Technology) and the anonymous reviewers for useful feedback. The usual caveat applies. Koen Frenken received funding from the Netherlands Organisation for Scientific Research (NWO) within the Vici-program (number 453-14-014).

Publisher Copyright:
© 2019 Elsevier Inc.

Funding

Koen Frenken received funding from the Netherlands Organisation for Scientific Research (NWO) within the Vici-program (number 453-14-014 ).

Keywords

  • Complexity
  • NK-model
  • Proximity
  • Small-world

Fingerprint

Dive into the research topics of 'A network-based model of exploration and exploitation'. Together they form a unique fingerprint.

Cite this