Marketing Insights
Think about the last marketing capability you actually built (not planned, built). Where did the key components come from?

Think about the last marketing capability you actually built (not planned, built). Where did the key components come from?
Probably not from a textbook. A contractor you found through a friend. A tool your peer recommended. A partnership that started as a casual conversation at a conference. An advisor who reframed how you thought about the problem entirely. A community that showed you an automation workflow you hadn't imagined.
Your network didn't just help you build the capability. It was the mechanism through which the capability was built. The contractor became your execution layer. The tool became your infrastructure. The partnership became your distribution channel. The advisor's reframe became your strategy. Take any of those network-sourced components away, and the capability you built wouldn't exist.
This isn't a nice-to-have insight. It's the central finding from studying how 13 B2B SaaS marketing leaders actually construct marketing capability under constraint: networks aren't just resources you draw on. They're the bundling mechanism through which capabilities are assembled. And understanding how that mechanism works changes how you invest your limited networking time.
Key Concepts in This Article
Network-mediated capability building: Building on established research linking network ties to capability development (Gliga & Evers, 2023; McEvily & Marcus, 2005), this concept describes the process by which marketing leaders assemble capability not through internal development alone, but through network ties that provide information, resources, credibility, and sensemaking. This research specifies four distinct mechanisms through which that process operates in constrained B2B SaaS contexts.
Information brokerage: A well-established network function (Burt, 2004; Granovetter, 1973) through which ties to disconnected communities provide novel knowledge — tools, methods, approaches, and mental models. In this research, it is the most frequent network mechanism (36% of coded activity), operating through three distinct channels: institutional sources, peer brokerage, and parasocial digital channels.
Direct resource access: The most tangible network mechanism (32% of coded activity). Your network provides the human capital, skills, and operational capacity you can't build internally — contractors, freelancers, agencies, and tool platforms that become your extended execution layer. A core function documented across the entrepreneurial networking literature.
Credibility borrowing: A mechanism recognised in the legitimacy and endorsement literatures, through which leaders leverage established reputations — partnerships, institutional affiliations, or advisory relationships — to amplify the legitimacy of their own marketing output. In this research, it accounts for 19% of coded network activity and is concentrated among leaders operating in trust-dependent markets.
Collective sensemaking: An established construct in organisational theory, describing a network mechanism through which leaders refine their understanding of what to build. Unlike information brokerage (which provides data), sensemaking provides interpretation — shaping how you understand the capability landscape and make bundling decisions. In this research, it accounts for 20% of coded activity and shows distinct cohort patterns.
Algorithmic closure: Building on the filter bubble and algorithmic curation literatures, this concept describes how platform algorithms create information homogeneity even in structurally diverse networks, suppressing the novelty that weak ties are supposed to deliver. This research applies the concept to capability building: a contemporary form of structural hole where the gap isn't between disconnected people but between disconnected categories of knowledge that your curated information environment filters out.
The research identified 63 coded passages describing network-mediated capability building across all 13 participants. Four distinct mechanisms emerged, each serving a different function in how leaders assemble marketing capabilities.
Mechanism 1: Information brokerage (36% of coded network activity). Your network teaches you what's possible. This was the most frequent mechanism: 21 of 63 coded passages. It operates on a simple principle: the people you're connected to know things you don't. Those things change what you build.
The data revealed three distinct information channels. First, institutional knowledge sources: research firms, head office intelligence, benchmark reports, published case studies. One corporate-transplant leader applied a Cisco content marketing article from 2010 and a New Balance case study as cross-industry models for their current approach. Second, peer and colleague brokerage: colleagues providing domain knowledge, sales peers aggregating market intelligence, and prior employer experience. One corporate-transplant leader drew extensively on colleague networks for domain-specific knowledge that reshaped their marketing approach. Third, a contemporary addition: parasocial digital channels (LinkedIn influencers, paid content subscriptions, industry thought leaders consumed at a distance). One startup-native leader invested €700–800 per year in paid guru subscriptions and conferences specifically as deliberate information access for capability refinement.
Information brokerage produces capability bundle innovation. You discover tools, methods, and approaches you wouldn't have found through your own experience alone. But it carries a hidden risk that the data surfaced repeatedly: algorithmic closure.
Mechanism 2: Direct resource access (32% of coded network activity). Your network provides the human capital, skills, and operational capacity you can't build internally. This is the most tangible mechanism (19 of 63 passages), and it's how most constrained leaders actually get things done.
The data showed three sub-patterns. Specialist outsourcing: one startup-native leader hired a backlink contractor for $1,000 and a web developer. Another startup-native leader engaged four freelance video editors from gig platforms. A corporate-transplant leader built an outsourced team of 10–12 people in India. These are uniformly weak, calculative ties formed to fill specific capability gaps.
Tool-mediated access: one startup-native leader's platform subscription, another's Motion Array subscription, a third's constrained Ahrefs and Semrush packages. These aren't interpersonal ties at all. They're platform and ecosystem ties that function as structural intermediaries providing capabilities the firm can't develop internally. This is a form of network-equivalent resource access that traditional interpersonal network theory has not fully integrated: tool ecosystems as capability channels.
And a striking sub-pattern: investor-mediated access. One startup-native leader's investors connected them with a marketing agency that subsequently became a shareholder in the company. The fact that this initially transactional relationship deepened to the point of equity participation suggests a tie that moved from calculative to identity-based. This reverses the usual trajectory that network theory predicts, though this leader describes the outcome rather than the relational evolution in detail.
Not every resource access attempt succeeds. One startup-native leader's experience illustrates what happens when network-mediated resource access breaks down. The company's website sat on WordPress, and every change required an external agency: landing pages, tracking scripts, design elements. The leader described being "absolutely limited" by the arrangement. A SaaS company that couldn't control its own website. When the leader proposed migrating to Webflow, the founders resisted. They'd been burned by a previous platform migration that consumed seven years of investment and failed. So the leader did something characteristic of constrained startup natives: taught themselves Webflow in their personal time, driven by genuine curiosity about tooling. When the founders later needed a landing page for a new product, the leader had a template ready. The capability the agency was supposed to provide had been internalised entirely.
This pattern recurred across the data. When network-mediated resource access fails, the typical response under constraint isn't to find a better provider. It's to internalise the function entirely. The consequence is a capability built from personal means rather than network means. Narrower in scope, but entirely within the leader's control.
Mechanism 3: Credibility borrowing (19% of coded network activity). Your network lends you legitimacy. Eleven of 63 passages described this mechanism, and while it's less frequent than information or resource access, it's concentrated among specific participants who operate in trust-dependent markets.
The patterns are diverse. Partnership-based credibility: one corporate-transplant leader's trade show co-marketing alliances, another's technology partnership. But the advisory participant's experience provides the most instructive contrast in the entire dataset.
The venture was a startup hub with a purpose-led brand: entrepreneurship as a democratic right, rooted in the founder's experience of becoming stateless after leaving Belarus. The marketing challenge was building awareness across the EU and US with zero media spend. The advisory leader pursued two parallel strategies. First, they built on pre-existing personal relationships (particularly with one established partner) to co-create content and push out what they described as "a big zero spend media push" across the EU. Second, they made cold approaches to NGOs defending stateless people across Europe, organisations whose purpose aligned precisely with the startup hub's mission.
The contrast was stark. The warm relationships produced results. Content partnerships, network access, a coordinated media campaign replicated across the US. The cold approaches, despite perfect mission alignment, lacked the relational depth to convert interest into action. You can't borrow credibility from ties that lack relational foundation. No amount of purpose alignment substitutes for embeddedness. This illustrates Ozdemir et al.'s (2016) reaching-acquiring distinction: the leader could reach purpose-aligned organisations through cold outreach but could not acquire their credibility without the relational infrastructure that makes borrowing possible.
Academic and institutional credibility: one corporate-transplant leader invoked Stanford professor references and employed in-house neuroscientists as thought leaders. This borrowed institutional prestige to legitimise marketing messaging. This works specifically because the target audience (enterprise decision-makers) recognises academic institutional authority.
Acquisition-based credibility: one startup-native leader faced post-acquisition brand identity decisions. Whether to affiliate with the acquiring parent's established brand or maintain independence. This represented credibility borrowing at the organisational rather than interpersonal level.
The cohort pattern is suggestive, though based on a small number of coded passages. Credibility borrowing was more explicitly articulated as a deliberate strategy by corporate transplants and the advisory participant than by startup natives. Where startup natives did describe credibility-adjacent activity, it tended toward platform-mediated mechanisms (affiliate platforms, marketplace participation) rather than relationship-mediated credibility. This observation rests on limited cases and should be treated as a directional pattern rather than a firm cohort distinction.
Mechanism 4: Collective sensemaking (20% of coded network activity). Your network helps you understand what to build. Twelve of 63 passages described this mechanism. It's qualitatively different from information brokerage. Information brokerage provides data about what's possible. Collective sensemaking provides interpretation. It shapes how you understand what capabilities to build and what bundling decisions to make.
Two structural sub-patterns emerged
Intra-organisational sensemaking: geo-marketing teams, vertical teams, cross-functional collaboration, sales peer consultations. These operate through strong internal ties.
Extra-organisational sensemaking: co-founder ideation sessions, entrepreneur friends comparing notes, AI marketing roundtables, peer leaders and open-source communities.
The cohort difference is telling. Corporate transplants access collective sensemaking primarily through intra-organisational strong ties. Teams, departments, cross-functional groups. Startup natives access it through extra-organisational weak ties. Communities, roundtables, peer groups. This aligns with Stam et al.'s (2014) bonding/bridging distinction: corporate transplants bond internally for sensemaking, startup natives bridge externally. The pattern connects directly to the experience paradox. Prior professional context shapes not just what leaders know, but which network mechanisms they activate. It also connects to cognitive heterogeneity that produces different search modes across cohorts.
The breadth of sensemaking inputs appears to correlate with the sophistication of the marketing approach. One startup-native leader demonstrated the broadest sensemaking diversity: peers, an N8N automation community, and conference attendees. This same leader described the most innovative automation-first approach to capability building in the entire dataseT. In contrast, the narrowest sensemaking (internal sales team only) corresponded to more conventional approaches.
Here's something the traditional network literature doesn't address, but the data insists on it: increasingly, entrepreneurs build capabilities through tool networks rather than human networks. Zapier, Make.com, API ecosystems, SaaS platforms. These function identically to human networks across all four mechanisms.
Information bundling: documentation and community forums teach you what's possible, just as peers do. Resource bundling: platform features extend your capability, just as contractors do. Credibility bundling: integrations with recognised platforms signal legitimacy, just as partnerships with established firms do. Constraint-easing: the ecosystem solves technical problems, just as mentors solve strategic ones.
Consider what one fractional CMO did for a cash-strapped startup client. From two 45-minute conversations with the founders (covering target market, persona, pain points, and competitive positioning), the leader built an entire go-to-market campaign using nothing but AI tools. Landing page copy written with ChatGPT. Logo and brand colours generated through Lovable. A fully functional landing page connected to the client's CRM and analytics stack. Banner concepts ideated and produced A-to-Z with AI image generation, finished in Canva, then fed back to ChatGPT for ad copy. The campaign launched on Meta and generated qualified leads at roughly $6 each. No designer. No developer. No agency. The "network" that produced this capability wasn't a network of people. It was a network of tools, with the leader as the orchestrating node.
The same leader later replicated Clay's data enrichment process in N8N for $300 instead of $2,000. A waterfall enrichment workflow that gave a bootstrapped client several additional months of runway. This is capability building through tool-ecosystem ties. It's territory that digital ecosystem research has begun to theorise (Bejjani, Göcke & Menter, 2023) but that traditional interpersonal network theory has not fully addressed.
Platform algorithms create information homogeneity even in structurally diverse networks. Your network might include people from different industries, different company stages, different functional backgrounds. But the information you receive from that network is algorithmically narrowed.
One startup-native leader explicitly recognised this: the danger is you live in a bubble, so you only see the insides of your bubble and the reflections of it. The LinkedIn feed doesn't show you what your diverse connections know. It shows you what its algorithm predicts you'll engage with. And engagement-optimised content tends toward confirmation of existing perspectives, not introduction of novel ones.
This matters for capability building because it suppresses the value of weak ties. The entire theoretical premise of weak ties (Granovetter, 1973) is that they provide novel information. Information you couldn't get from your existing close network. But when algorithmic curation narrows what weak ties deliver, the novelty premium disappears. Your structurally diverse network functions as if it were homogeneous.
The practical consequence: reduced bundling opportunities and reinforced activation dependency (see activation trap). If your information inputs consistently confirm your current approach, you never discover the alternative bundling configurations that might break you out of that dependency. This is also a metacognitive problem: knowing about algorithmic closure doesn't help you escape it. The algorithm shapes what you see before you have the chance to recognise what's missing. The echo chamber isn't just a social media problem. It's a capability development constraint.
Here's the counter-intuitive finding that complicates the usual "networks help with constraint" narrative: extreme resource constraint can suppress network activation entirely.
Two startup-native leaders demonstrated deliberate non-activation of resource access networks, relying instead on DIY internalisation. One described the approach as "a lot of DIY: we had to look for other options". Another noted "we built it internally ourselves" regarding their marketing website.
The mechanism is straightforward. It's structurally caused, not a personal failure. When time spent networking equals time not generating revenue, leaders go DIY. Every hour at a conference, every call with an advisor, every message to a potential collaborator is an hour not spent on direct revenue generation. Under severe constraint, the opportunity cost of network activation becomes prohibitive. This holds true even when the network would provide capabilities that improve long-term outcomes.
This inverts the standard narrative. Networks are supposed to be especially valuable under constraint, because they provide access to resources you can't afford to develop internally. But when constraint is severe enough, the time investment required to activate network ties becomes unaffordable itself. The leaders most in need of network-mediated capability building are precisely the ones least able to invest in maintaining and activating their networks.
The phrase "network-mediated capability building" might sound like a fancy way of saying "networking." It isn't. The differences matter, because confusing them leads to the wrong investments.
It's not relationship-building. Traditional networking advice says "build your network before you need it" and "always be connecting." This treats relationships as the end product. Network-mediated capability building treats relationships as the mechanism through which capability components are sourced. The question isn't "how large is my network?" It's "does my network provide information, resources, credibility, and sensemaking that I can't access otherwise?" A leader with 5,000 LinkedIn connections and no capability-relevant ties has a large network and a weak capability engine.
It's not business development. Business development uses networks to find customers and partners. Network-mediated capability building uses networks to build the ability to serve customers and partners. The contractor who becomes your execution layer. The peer who reshapes your understanding of what's possible. The tool ecosystem that extends your operational capacity. These aren't revenue relationships. They're capability relationships. The distinction matters because leaders who conflate the two systematically under-invest in the ties that build capability and over-invest in the ties that generate immediate pipeline. This reinforces the activation trap.
It's not "who you know." The social capital frame treats your network as an asset you accumulate and spend. This misses the mechanism. Network-mediated capability building is about what flows through your ties, not who's in your address book. Information brokerage requires ties that bridge disconnected knowledge domains. Resource access requires ties with specific operational capacity. Credibility borrowing requires ties with established legitimacy in your target market. Generic social capital doesn't produce any of these.
It's not outsourcing. Outsourcing delegates a defined function to an external provider. Network-mediated resource access is broader. It includes outsourcing, but also tool ecosystems that extend your capability, advisory relationships that reshape your strategy, and platform ties that substitute for human networks entirely. More fundamentally, outsourcing assumes you know what function to delegate. Several leaders in the data didn't know what they needed until network ties revealed it. The network didn't execute a pre-defined plan. It shaped what the plan became.
The network-mediated bundling typology integrates four theoretical streams that, taken together, explain how network structure produces marketing capability.
Granovetter's (1973) strength of weak ties provides the foundational insight for information brokerage. Novel information (the kind that produces capability bundle innovation) flows through weak ties that bridge disconnected professional communities, not through the strong ties that characterise close networks. The research data confirms this for institutional and parasocial channels but reveals a contemporary complication: algorithmic curation of weak-tie information streams erodes the novelty premium that makes weak ties valuable.
Burt's (2004) structural holes theory explains why brokerage positions in a network produce information advantages. Leaders whose networks span disconnected communities (who bridge structural holes) access a broader capability palette. The data identifies a contemporary form of structural hole: algorithmic closure. In the contemporary B2B SaaS context, structural holes exist not only between disconnected clusters of people but between disconnected categories of knowledge that the participant's curated information environment systematically filters out.
Stam et al.'s (2014) work on entrepreneurial network composition grounds the cohort-level differences. The data shows that startup natives develop peer and customer networks (emphasising bridging social capital), while corporate transplants maintain firm and professional networks (emphasising bonding social capital). These aren't random preferences. They reflect structural adaptation to different professional environments that persists when leaders change contexts.
Hite and Hesterly's (2001) network evolution framework predicts a shift from identity-based to calculative ties as ventures mature. The research data largely confirms this but reveals one suggestive reversal: the investor-agency-to-shareholder evolution (P\_12). A marketing agency initially engaged through investors became an equity participant. This is consistent with a tie that moved from calculative to identity-based as value was demonstrated. P\_12 describes the outcome rather than the relational trajectory in detail, but the structural evolution suggests that under constraint, ties that prove their worth can deepen rather than commoditise.
The network re-coding produced 63 passages across all 13 participants, with four mechanisms empirically distributed as follows: information brokerage (21 passages, 36%), direct resource access (19, 32%), collective sensemaking (12, 20%), and credibility borrowing (11, 19%). Some passages are dual-coded, so percentages exceed 100% when summed.
Cohort patterns in network repertoire. Startup natives rely more heavily on gig-economy and platform-mediated resource access, parasocial digital information channels, and extra-organisational sensemaking. Corporate transplants rely more on institutional information sources, organisational resource channels (agencies, head offices, offshore teams), and intra-organisational sensemaking. The advisory participant (P\_8) demonstrates the most deliberate and balanced network configuration, with conscious deployment of all four mechanisms. This likely reflects the advisory role's inherent requirement to orchestrate diverse network resources on behalf of clients.
Five refinements extending network theory into the early-stage B2B SaaS context. The data generates five contributions that extend existing network theory into the early-stage B2B SaaS context.
First, tool ecosystems as network-equivalent resource channels. Platform subscriptions and SaaS ecosystems function identically to interpersonal network ties across all four bundling mechanisms. This extends network theory beyond human relationships to include human-technology-tool configurations. A related refinement emerges in direct resource access: digital labour platforms (Fiverr, gig marketplaces) create what the data suggests are algorithmic trust substitutes. Ratings, reviews, and portfolio evidence that replace the relational embeddedness Ozdemir et al. (2016) identify as necessary for resource acquisition. Several participants successfully engaged contractors through purely transactional, non-embedded platform ties (P\_2, P\_5), suggesting that the reaching-acquiring distinction holds primarily for complex, ambiguous capability needs where quality is harder to evaluate upfront. As P\_1's failed agency engagement illustrates.
Second, algorithmic closure as a contemporary structural hole. Echo chamber risk arises not from a lack of bridging ties between people but from algorithmic curation of information flows that homogenises what those ties deliver. This represents a contemporary form of structural hole relevant to any digitally mediated professional network.
Third, constraint-driven internalisation. Extreme resource constraint suppresses network activation entirely, pushing leaders toward DIY capability building even when network-mediated access would be more efficient. This inverts the standard prediction that networks are most valuable under constraint.
Fourth, reversed tie evolution. Under certain conditions, ties evolve from calculative to identity-based as value is demonstrated, contrary to the Hite and Hesterly (2001) prediction that ties commoditise as ventures mature.
Fifth, cohort-determined network repertoire. Professional background (startup-native vs. corporate-transplant) systematically shapes which network mechanisms leaders activate and how they configure their network investments. Network configuration is not freely chosen but structurally shaped by prior professional experience.
In practice, the four mechanisms rarely operate in isolation. A typical capability-building episode proceeds as a sequence. You encounter a new approach through a weak tie at a conference (information brokerage). You discuss it with trusted peers, refining your understanding of how it might work in your context (collective sensemaking). You engage a contractor recommended by a peer to implement it (direct resource access). You amplify the output's impact by securing endorsement from an industry figure (credibility borrowing).
The research documents several multi-mechanism sequences. One corporate-transplant leader's marketing capability was constructed through prior employer experience providing foundational information, AI roundtables providing collective sensemaking about emerging practices, an outsourced team providing execution capacity, and in-house neuroscientists plus Stanford references providing credibility amplification (P\_9). All four mechanisms operated simultaneously, each addressing a different dimension of the capability challenge.
Another startup-native leader illustrates network evolution driving bundling mechanism evolution: investors' agency connection provided initial resource access, low-cost experimentation generated performance data, the agency evolved into a shareholder transforming the tie structure, and post-acquisition by a larger organisation opened new credibility and sensemaking channels. The capability bundle and the network that produced it co-evolved.
Network-mediated bundling is the social infrastructure of the bundling phase in the Effectual Orchestration framework. The means audit (Phase 1) identifies what the leader has, including their network position. Structuring (Phase 2) configures means into explorable possibilities, including network-accessible means. Bundling (Phase 3) assembles capability configurations. The data shows that network ties are the primary mechanism through which bundling occurs. Leveraging (Phase 4) routinises successful bundles, including the network ties that produced them.
The network mechanisms also connect to the legitimacy transitions described in this programme's analysis (see Legitimacy Transitions in B2B SaaS). Credibility borrowing is a specific mechanism of legitimacy construction. The data confirms it amplifies all three legitimacy types: pragmatic (demonstrated customer value through affiliates), cognitive (domain authority through institutional references), and moral (values alignment through purposeful partnerships). Network position doesn't just produce capability. It produces the legitimacy that makes capability effective.
The constraint paradox has direct implications for the activation trap. Under severe constraint, leaders suppress network activation and retreat to DIY capability building. But DIY limits them to what they already know and can already do. This tends toward activation (short-term, familiar approaches) rather than brand-building (long-term, novel approaches). Network suppression under constraint thus reinforces the activation trap: the leaders most trapped are also the most network-isolated, which prevents them from discovering the alternative approaches that might release them.
Network-mediated capability building sits within the programme's critical realist ontology (Bhaskar, 1975) and process philosophy (Whitehead, 1929; Tsoukas & Chia, 2002). Networks are not static structures that leaders "have." They are ongoing relational processes that leaders enact. A tie that isn't activated isn't a dormant asset. It's a relationship that has ceased to function as a capability mechanism.
This matters because it reframes network investment from asset accumulation to process maintenance. In critical realist terms, network position operates in the real domain (it's a generative mechanism that produces capability outcomes). Tie activation operates in the actual domain (it's the event through which the mechanism fires). And the observable capability (the marketing output, the partnership result, the resource acquired) sits in the empirical domain. The four bundling mechanisms (information brokerage, resource access, credibility borrowing, collective sensemaking) are specifications of how the generative mechanism of network position translates into actual capability events. Algorithmic closure, constraint-driven internalisation, and reversed tie evolution are all disruptions or modifications to this translation process. They're conditions under which the mechanism fires differently than existing theory predicts.
If your network is your capability engine rather than your address book, then how you invest your networking time is a capability investment decision.
The four-mechanism framework suggests four questions to ask about your current network. First, where is your information coming from? If your primary information channels are parasocial (LinkedIn feeds, industry newsletters, paid thought-leader content), you may be getting high volume but low novelty. The weak ties that produce capability innovation are the ones that bridge disconnected communities, not the ones that confirm your current approach. One leader's explicit recognition of living in a LinkedIn bubble is a diagnostic every marketing leader should run on their own information inputs.
Second, who constitutes your execution layer? Under constraint, your marketing capability extends far beyond your team. It includes every contractor, freelancer, agency, and tool platform that executes part of your marketing system. Understanding this extended execution network, including its vulnerabilities, is essential for managing capability fragility.
Third, whose credibility are you borrowing? If you're in a trust-dependent market, your own credibility has limits. Identifying whose endorsement, partnership, or association would amplify your marketing output is a strategic network investment with direct legitimacy returns.
Fourth, who helps you think? The sensemaking mechanism is the least tangible but potentially the most valuable. The leaders with the broadest sensemaking diversity (peers from different industries, communities exploring adjacent technologies, advisors from different backgrounds) described the most innovative approaches. If everyone you discuss strategy with shares your background and perspective, your sensemaking is structurally constrained.
And one meta-question: can you afford to invest in your network at all? If constraint has pushed you into full DIY mode, recognise this as a capability development risk, not a virtue. The time you're "saving" by not networking is time you're spending reinforcing existing approaches rather than discovering new ones. Finding even modest ways to maintain network activation (a monthly peer call, an occasional conference, an active community membership) may be the most valuable investment a severely constrained marketing leader can make.
Next in this series: Cognitive and Experiential Search in Entrepreneurial Marketing.
References
Bhaskar, R. (1975) A Realist Theory of Science. Leeds: Leeds Books.
Burt, R.S. (2004) 'Structural Holes and Good Ideas', American Journal of Sociology, 110(2), pp. 349–399.
Elfring, T. and Hulsink, W. (2007) 'Networking by Entrepreneurs: Patterns of Tie-Formation in Emerging Organizations', Organization Studies, 28(12), pp. 1849–1872.
Granovetter, M.S. (1973) 'The Strength of Weak Ties', American Journal of Sociology, 78(6), pp. 1360–1380.
Hite, J.M. and Hesterly, W.S. (2001) 'The Evolution of Firm Networks: From Emergence to Early Growth of the Firm', Strategic Management Journal, 22(3), pp. 275–286.
Ozdemir, S.Z., Moran, P., Zhong, X. and Bliemel, M.J. (2016) 'Reaching and Acquiring Valuable Resources: The Entrepreneur's Use of Brokerage, Cohesion, and Embeddedness', Entrepreneurship Theory and Practice, 40(1), pp. 49–79.
Stam, W., Arzlanian, S. and Elfring, T. (2014) 'Social Capital of Entrepreneurs and Small Firm Performance: A Meta-Analysis of Contextual and Methodological Moderators', Journal of Business Venturing, 29(1), pp. 152–173.
Tsoukas, H. and Chia, R. (2002) 'On Organizational Becoming: Rethinking Organizational Change', Organization Science, 13(5), pp. 567–582.
Whitehead, A.N. (1929) Process and Reality: An Essay in Cosmology. New York: Macmillan.
This post is part of a 10-part foundation series exploring how marketing capabilities emerge under constraint. The concepts draw on an ongoing research programme involving 13 in-depth interviews with B2B SaaS marketing leaders, analysed through the lens of effectuation theory, resource orchestration, and cognitive micro-foundations. Browse all pillars.