Government Technology

Social Network Dynamics Key to Understanding Agency Success or Failure


Pamela Mischen
Pamela Mischen

April 19, 2010 By

Photo: To understand why public policies fail or succeed, it's essential to learn how people form networks within an organization, or among groups that collaborate, says Pamela Mischen, associate professor of public administration at Binghamton University. (Jonathan Cohen/Binghamton University)

In each of two cities, a team of local agencies launches a campaign to keep children from joining gangs. The two use similar tactics, combining counseling, tutoring and recreation. One initiative shows great results; the other makes barely a dent. Why the difference?

The research of Pamela Mischen, associate professor of public administration at Binghamton University, demonstrates that one program may have failed because the right people weren't talking.

Traditional scholars of public policy trying to figure out what went wrong with a program might study the legislation behind it, or its funding. But researchers largely have ignored the dynamics inside the agencies that carry out policy, said Mischen.

That's a mistake, she said. "Those turn out to be the most important things."

To understand why policies fail or succeed, it's essential to learn how people form networks within an organization, or among groups that collaborate, Mischen said. The tools she uses to explore those communication pathways come from complexity theory, a discipline that public-policy scientists haven't called upon in the past. Mischen looks at service agencies in the same way that other scholars look at ant colonies, hurricanes or human cells.

Complexity theory examines complex systems -- networks of interconnected agents that depend on one another. The agents might be ants, meteorological events or proteins.

"In an organizational network, those agents are individuals," Mischen said. In a coalition, they're organizations. Members of a public-service network perform different tasks toward a common goal, and the work of each member affects the work of all the others.

Also, agents in a complex system share feedback that helps to shape future activity. When a school nurse notices that fewer second-graders are getting sick after their teachers launch a "wash your hands" campaign, she might urge the principal to expand that program to other grades.

Negative feedback discourages change; positive feedback spurs successful innovation, Mischen said.

"Somebody is saying, 'That really worked. I'm going to make the conditions such that you can continue to do that.'"

To learn how a new organization forms network pathways, Mischen worked with two Binghamton colleagues, Kristina Lambright, assistant professor of public administration, and Craig Laramee, assistant professor of bioengineering.

In 2007, they gave a social networking survey to 37 case workers who gathered in Binghamton for a program on self-injury among adolescents. The researchers chose this group in part because they expected that the case workers, who came from throughout Broome County, N.Y., might one day form a coalition.

The survey focused on trust and information flow. Asking each subject about his or her relationship with every other person at the meeting, it tried to determine who trusted whom and why. It also asked whom the subjects turned to for information about their work.

One surprise was that trust didn't define how the case workers formed information networks.

"We started with the assumption that the people they trust would be some of the most important people they would go to for information," Mischen said.

Instead, the study found that people seek information from: a) the people they communicate with most, regardless of whether they trust them; b) people who have given them information before; and c) people they consider experts, leaders or the most active members of the network, assuming they have access to those people. Trust plays a role only in whether one person considers another an expert.

Among other things, the study suggests that people in an organization


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
Best Practice Guide for Cloud and As-A-Service Procurements
While technology service options for government continue to evolve, procurement processes and policies have remained firmly rooted in practices that are no longer effective. This guide, built upon the collaborative work of state and local government and industry executives, outlines and explains the changes needed for more flexible and agile procurement processes.
View All

Featured Papers