{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T05:05:12Z","timestamp":1774674312436,"version":"3.50.1"},"reference-count":48,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2016,2,1]],"date-time":"2016-02-01T00:00:00Z","timestamp":1454284800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,2,1]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 What makes investors tick? Largely counter-intuitive compared to the findings of most past research, this study explores the possibility that funding investors invest in companies based on social relationships, which could be positive or negative, similar or dissimilar. The purpose of this paper is to build a social network graph using data from CrunchBase, the largest public database with profiles about companies. The authors combine social network analysis with the study of investing behavior in order to explore how similarity between investors and companies affects investing behavior through social network analysis. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 This study crawls and analyzes data from CrunchBase and builds a social network graph which includes people, companies, social links and funding investment links. The problem is then formalized as a link (or relationship) prediction task in a social network to model and predict (across various machine learning methods and evaluation metrics) whether an investor will create a link to a company in the social network. Various link prediction techniques such as common neighbors, shortest path, Jaccard Coefficient and others are integrated to provide a holistic view of a social network and provide useful insights as to how a pair of nodes may be related (i.e., whether the investor will invest in the particular company at a time) within the social network. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 This study finds that funding investors are more likely to invest in a particular company if they have a stronger social relationship in terms of closeness, be it direct or indirect. At the same time, if investors and companies share too many common neighbors, investors are less likely to invest in such companies. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 The author\u2019s study is among the first to use data from the largest public company profile database of CrunchBase as a social network for research purposes. The author\n\t\t\t\t\t'\n\t\t\t\ts also identify certain social relationship factors that can help prescribe the investor funding behavior. Authors prediction strategy based on these factors and modeling it as a link prediction problem generally works well across the most prominent learning algorithms and perform well in terms of aggregate performance as well as individual industries. In other words, this study would like to encourage companies to focus on social relationship factors in addition to other factors when seeking external funding investments.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/intr-09-2014-0231","type":"journal-article","created":{"date-parts":[[2016,1,21]],"date-time":"2016-01-21T07:37:55Z","timestamp":1453361875000},"page":"74-100","source":"Crossref","is-referenced-by-count":41,"title":["Predicting investor funding behavior using crunchbase social network features"],"prefix":"10.1108","volume":"26","author":[{"given":"Yuxian Eugene","family":"Liang","sequence":"first","affiliation":[]},{"given":"Soe-Tsyr Daphne","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020121802013765000_b1","doi-asserted-by":"crossref","unstructured":"Adamic, L.A.\n                and \n                  Adar, E.\n                (2001), \u201cFriends and neighbors on the web\u201d, \n                  Social Networks\n               , Vol. 25 No. 3, pp. 211-230.","DOI":"10.1016\/S0378-8733(03)00009-1"},{"key":"key2020121802013765000_b2","doi-asserted-by":"crossref","unstructured":"Backstrom, L.\n               , \n                  Boldi, P.\n               , \n                  Rosa, M.\n               , \n                  Ugander, J.\n                and \n                  Vigna, S.\n                (2011), \u201c Four degrees of separation\u201d available at: http:\/\/arxiv.org\/abs\/1111.4570v3 (accessed September 2014).","DOI":"10.1145\/2380718.2380723"},{"key":"key2020121802013765000_b4","doi-asserted-by":"crossref","unstructured":"Bakker, L.\n               , \n                  Hare, W.\n               , \n                  Khosravi, H.\n                and \n                  Ramadanovic, B.\n                (2010), \u201cA social network model of investment behavior in the stock market\u201d, \n                  Physica A: Statistical Mechanics and its Applications\n               , Vol. 389 No. 6, pp. 1223-1229.","DOI":"10.1016\/j.physa.2009.11.013"},{"key":"key2020121802013765000_b5","doi-asserted-by":"crossref","unstructured":"Barnea, A.\n               , \n                  Cronqvist, H.\n                and \n                  Siegel, S.\n                (2010), \u201cNature or nurture: what determines investor behavior?\u201d, \n                  Journal of Financial Economics\n               , Vol. 98 No. 3, pp. 583-604.","DOI":"10.1016\/j.jfineco.2010.08.001"},{"key":"key2020121802013765000_b6","doi-asserted-by":"crossref","unstructured":"Bianco, M.\n               , \n                  Bontempi, M.E.\n               , \n                  Golinelli, R.\n                and \n                  Parigi, G.\n                (2013), \u201cFamily firms\u2019 investments, uncertainty and opacity\u201d, \n                  Small Business Economics\n               , Vol. 40 No. 4, pp. 1035-1058.","DOI":"10.1007\/s11187-012-9414-3"},{"key":"key2020121802013765000_b7","doi-asserted-by":"crossref","unstructured":"Bliss, C.A.\n               , \n                  Frank, M.R.\n               , \n                  Danforth, C.M.\n                and \n                  Dodds, P.S.\n                (2014), \u201cAn evolutionary algorithm approach to link prediction in dynamic social networks\u201d, \n                  Journal of Computational Science\n               , Vol. 5 No. 5, pp. 750-764.","DOI":"10.1016\/j.jocs.2014.01.003"},{"key":"key2020121802013765000_b8","unstructured":"Breiman, L.\n               , \n                  Friedman, J.\n               , \n                  Olshen, R.\n                and \n                  Stone, C.\n                (1984), \n                  Classification and Regression Trees\n               , Wadsworth, Belmont, CA."},{"key":"key2020121802013765000_b501","doi-asserted-by":"crossref","unstructured":"Burchardt, J.\n               , \n                  Hommel, U.\n               , \n                  Kamuriwo, D.S.\n                and \n                  Billitteri, C.\n                (2014), \u201cVenture capital contracting in theory and practice: implications for entrepreneurship research\u201d, \n                  Entrepreneurship Theory and Practice\n               .","DOI":"10.1111\/etap.12104"},{"key":"key2020121802013765000_b9","unstructured":"Chang, C.C.\n                and \n                  Lin, C.J.\n                (2012), \n                  LIBSVM: A Library for Support Vector Machines\u201d\n               , Department of Computer Science, National Taiwan University, Taipei."},{"key":"key2020121802013765000_b10","unstructured":"Cortes, C.\n                and \n                  Mohri, M.\n                (2003), \u201cAUC optimization vs. error rate minimization\u201d, Proceedings of the Advances in Neural Information Processing Systems (NIPS\u20192003), British Columbia."},{"key":"key2020121802013765000_b11","doi-asserted-by":"crossref","unstructured":"Doran, J.S.\n               , \n                  Peterson, D.R.\n                and \n                  Wright, C.\n                (2010), \u201cConfidence opinions of market efficiency and investment behavior of finance professors\u201d, \n                  Journal of Financial Markets\n               , Vol. 13 No. 1, pp. 174-195.","DOI":"10.1016\/j.finmar.2009.09.002"},{"key":"key2020121802013765000_b12","unstructured":"Fan, L.\n               , \n                  Wu, W.\n               , \n                  Lu, Z.\n               , \n                  Xu, W.\n                and \n                  Du, D.Z.\n                (2013), \u201cIn\ufb02uence diffusion, cmmunity detection, and link prediction in social network analysis\u201d, \n                  Dynamics of Information Systems: Algorithmic Approaches\n               , Springer, New York, NY, pp. 305-325."},{"key":"key2020121802013765000_b13","doi-asserted-by":"crossref","unstructured":"Fire, M.\n               , \n                  Tenenboim, L.\n               , \n                  Lesser, O.\n               , \n                  Puzis, R.\n               , \n                  Rokach, L.\n                and \n                  Elovici, Y.\n                (2011), \u201cLink prediction in social networks using computationally efficient topological features\u201d, Third IEEE International Conference on Social Computing, SocialCom. MIT, Boston, MA.","DOI":"10.1109\/PASSAT\/SocialCom.2011.20"},{"key":"key2020121802013765000_b502","doi-asserted-by":"crossref","unstructured":"Friedkin, N.\n                (1983), \u201cHorizon of observability and limits of informal control in organizations\u201d, \n                  Social Forces\n               , Vol. 62 No. 1, pp. 54-77.","DOI":"10.2307\/2578347"},{"key":"key2020121802013765000_b15","doi-asserted-by":"crossref","unstructured":"Gallagher, B.\n               , \n                  Tong, H.\n               , \n                  Eliassi-Rad, T.\n                and \n                  Faloutsos, C.\n                (2008), \u201cUsing ghost edges for classification in sparsely labeled networks\u201d, ACM SIGKDD Conference on Knowledge Discovery and Data Mining Conference, Las Vegas, NV.","DOI":"10.1145\/1401890.1401925"},{"key":"key2020121802013765000_b16","doi-asserted-by":"crossref","unstructured":"Giot, P.\n               , \n                  Hege, U.\n                and \n                  Schwienbaher, A.\n                (2012), \u201cExpertise of reputation? The investment behavior of novice and experienced private equity Funds\u201d, 29th International Conference of the French Finance Association (AFFI), March.","DOI":"10.2139\/ssrn.2084269"},{"key":"key2020121802013765000_b503","doi-asserted-by":"crossref","unstructured":"Girvan, M.\n                and \n                  Newman, M.E.J.\n                (2010), \u201cCommunity structure in social and biological networks\u201d, \n                  Proceedings of the National Academy of Sciences\n               , Vol. 99 No. 12, pp. 7821-7826.","DOI":"10.1073\/pnas.122653799"},{"key":"key2020121802013765000_b18","doi-asserted-by":"crossref","unstructured":"Grewal, R.\n               , \n                  Lilien, G.L.\n                and \n                  Mallapragada, G.\n                (2006), \u201cLocation, location, location: how network Embeddedness affects project success in open source systems\u201d, \n                  Management Science\n               , Vol. 52 No. 7, pp. 1043-1056.","DOI":"10.1287\/mnsc.1060.0550"},{"key":"key2020121802013765000_b19","doi-asserted-by":"crossref","unstructured":"Grinblatt, M.\n                and \n                  Keloharju, M.\n                (2000), \u201cThe investment behavior and performance of various investor types: a study of Finland\u2019s unique dataset\u201d, \n                  Journal of Financial Economics\n               , Vol. 55 No. 1, pp. 43-67.","DOI":"10.1016\/S0304-405X(99)00044-6"},{"key":"key2020121802013765000_b20","doi-asserted-by":"crossref","unstructured":"Hamilton, R.H.\n                (2001), \u201cE-commerce new venture performance: how funding impacts culture\u201d, \n                  Internet Research\n               , Vol. 11 No. 4, pp. 277-285.","DOI":"10.1108\/10662240110402731"},{"key":"key2020121802013765000_b22","unstructured":"Kajdanowicz, T.\n               , \n                  Kazienko, P.\n                and \n                  Doskocz, P.\n                (2010), Label-Dependent Feature Extraction in Social Networks for Node Classification, Springer Berlin Heidelberg, pp. 89-102."},{"key":"key2020121802013765000_b23","doi-asserted-by":"crossref","unstructured":"Kalampokis, E.\n               , \n                  Tambouris, E.\n                and \n                  Tarabanis, K.\n                (2013), \u201cUnderstanding the predictive power of social media\u201d, \n                  Internet Research\n               , Vol. 23 No. 5, pp. 544-559.","DOI":"10.1108\/IntR-06-2012-0114"},{"key":"key2020121802013765000_b24","doi-asserted-by":"crossref","unstructured":"Kargar, M.\n                and \n                  An, A.\n                (2011), \u201cDiscovering top-k teams of experts with\/without a leader in social networks\u201d, ACM Conference on Information and Knowledge Management, Glasgow.","DOI":"10.1145\/2063576.2063718"},{"key":"key2020121802013765000_b25","doi-asserted-by":"crossref","unstructured":"Kempe, D.\n               , \n                  Kleinberg, J.\n                and \n                  Tardos, E.\n                (2003), \u201cMaximizing the spread of influence through a social network\u201d, ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC.","DOI":"10.1145\/956750.956769"},{"key":"key2020121802013765000_b26","unstructured":"Kleinberg, J.\n                (1998), \u201cAuthoritative sources in a hyperlinked environment\u201d, Proceedings of the ACM-SIAM Symposium on Discrete Algorithms, San Francisco, CA."},{"key":"key2020121802013765000_b27","doi-asserted-by":"crossref","unstructured":"Kuppuswamy, V.\n                and \n                  Bayus, B.L.\n                (2013), \u201cCrowdfunding creative ideas: the dynamics of project backers in Kickstarter\u201d, UNC Kenan-Flagler Research Paper.","DOI":"10.2139\/ssrn.2234765"},{"key":"key2020121802013765000_b28","doi-asserted-by":"crossref","unstructured":"Lappas, T.\n               , \n                  Liu, K.\n                and \n                  Terzi, E.\n                (2009), \u201cFinding a team of experts in social networks\u201d, Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, pp. 467-476.","DOI":"10.1145\/1557019.1557074"},{"key":"key2020121802013765000_b29","doi-asserted-by":"crossref","unstructured":"Latapy, M.\n               , \n                  Magnien, C.\n                and \n                  Del Vecchio, N.\n                (2008), \u201cBasic notions for the analysis of large two-mode networks\u201d, \n                  Social Networks\n               , Vol. 30 No. 1, pp. 31-48.","DOI":"10.1016\/j.socnet.2007.04.006"},{"key":"key2020121802013765000_b30","doi-asserted-by":"crossref","unstructured":"Leskovec, J.\n               , \n                  Huttenlocher, D.\n                and \n                  Kleinberg, J.\n                (2010a), \u201cPredicting positive and negative lnks in online social networks\u201d, ACM WWW International Conference on World Wide Web (WWW), Raleigh, NC.","DOI":"10.1145\/1772690.1772756"},{"key":"key2020121802013765000_b31","doi-asserted-by":"crossref","unstructured":"Leskovec, J.\n               , \n                  Huttenlocher, D.\n                and \n                  Kleinberg, J.\n                (2010b), \u201cSigned networks in social media\u201d, ACM SIGCHI Conference on Human Factors in Computing Systems (CHI), Atlanta, GA.","DOI":"10.1145\/1753326.1753532"},{"key":"key2020121802013765000_b32","doi-asserted-by":"crossref","unstructured":"Leskovec, J.\n               , \n                  Krause, A.\n               , \n                  Guestrin, C.\n               , \n                  Faloutsos, C.\n               , \n                  Briesen, Jeanne, V.\n                and \n                  Glance, N.\n                (2007), \u201cCost-effective outbreak detection in networks\u201d, ACM SIGKDD Conference on Knowledge Discovery and Data Mining Conference, San Jose, CA.","DOI":"10.1145\/1281192.1281239"},{"key":"key2020121802013765000_b33","unstructured":"Liang, Y.E.\n                and \n                  Yuan, S.T.\n                (2012), \u201cThe social behavior of investors\u201d, 2012 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, Istanbul."},{"key":"key2020121802013765000_b34","doi-asserted-by":"crossref","unstructured":"Liben-Nowell, D.\n                and \n                  Kleinberg, J.\n                (2007), \u201cThe link prediction problem for social networks\u201d, \n                  Journal of the American Society for Information Science and Technology\n               , Vol. 58 No. 7, pp. 1019-1031.","DOI":"10.1002\/asi.20591"},{"key":"key2020121802013765000_b37","doi-asserted-by":"crossref","unstructured":"McPherson, M.\n               , \n                  Smith-Lovin, L.\n                and \n                  Cook, J.M.\n                (2001), \u201cBirds of a feather: homophily in social networks\u201d, \n                  Annual Review of Sociology\n               , Vol. 27, pp. 415-444.","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"key2020121802013765000_b35","doi-asserted-by":"crossref","unstructured":"Manning, C.D.\n               , \n                  Raghavan, P.\n                and \n                  Sch\u00fctze, H.\n                (2008), \n                  Introduction to Information Retrieval\n               , Vol. 1, Cambridge University Press, Cambridge.","DOI":"10.1017\/CBO9780511809071"},{"key":"key2020121802013765000_b36","doi-asserted-by":"crossref","unstructured":"Martens, D.\n               , \n                  Vanhoutte, C.\n               , \n                  De Winne, S.\n               , \n                  Baesens, B.\n               , \n                  Sels, L.\n                and \n                  Mues, C.\n                (2011), \u201cIdentifying financially successful start-up profiles with data mining\u201d, \n                  Expert Systems with Applications\n               , Vol. 38 No. 5, pp. 5794-5800.","DOI":"10.1016\/j.eswa.2010.10.052"},{"key":"key2020121802013765000_b39","doi-asserted-by":"crossref","unstructured":"Newman, M.E.J.\n                (2001a), \u201cClustering and preferential attachment in growing networks\u201d, \n                  Physical Review\n               , Vol. 64 No. 2, pp. 025102-025116.","DOI":"10.1103\/PhysRevE.64.025102"},{"key":"key2020121802013765000_b38","unstructured":"Newman, M.E.J.\n                (2001b), \u201cThe structure of scientific collaborative network,\u201d available at: www.researchgate.net\/publication\/12179403_The_structure_of_scientific_collaboration_networks (accessed September 2014)."},{"key":"key2020121802013765000_b40","doi-asserted-by":"crossref","unstructured":"Newman, M.E.J.\n                (2006), \u201cModularity and community structure in networks\u201d, Proceedings of the National Academy of Sciences, Vol. 103 No. 23, pp. 8577-8582.","DOI":"10.1073\/pnas.0601602103"},{"key":"key2020121802013765000_b41","unstructured":"Page, L.\n                and \n                  Brin, S.\n                (1998), \u201cThe Anatomy of a large-scale hypertextual web search engine\u201d, Proceedings of the Seventh International Conference on World Wide Web, Brisbane."},{"key":"key2020121802013765000_b42","unstructured":"Pahnke, E.\n               , \n                  McDonald, R.\n               , \n                  Wang, D.\n                and \n                  Hallen, B.\n                (2014), \u201cExposed: venture capital, competitor ties, and entrepreneurial innovation\u201d, \n                  Academy of Management Journal, amj-2012\n               ."},{"key":"key2020121802013765000_b43","doi-asserted-by":"crossref","unstructured":"Seaman, C.\n               , \n                  McQuaid, R.\n                and \n                  Pearson, M.\n                (2014), \u201cNetworks in family business: a multi-rational approach\u201d, \n                  International Entrepreneurship and Management Journal\n               , pp. 1-15.","DOI":"10.1007\/s11365-014-0297-4"},{"key":"key2020121802013765000_b44","doi-asserted-by":"crossref","unstructured":"Shane, S.\n                and \n                  Cable, D.\n                (2002), \u201cNetwork ties, reputation, and the financing of new ventures\u201d, \n                  Management Science\n               , Vol. 48 No. 3, pp. 364-381.","DOI":"10.1287\/mnsc.48.3.364.7731"},{"key":"key2020121802013765000_b505","doi-asserted-by":"crossref","unstructured":"Tan, W.K.\n                and \n                  Tan, Y.J.\n                (2012), \u201cAn exploratory investigation of the investment information search behavior of individual domestic investors\u201d, \n                  Telematics and Informatics\n               , Vol. 29 No. 2, pp. 187-203.","DOI":"10.1016\/j.tele.2011.09.002"},{"key":"key2020121802013765000_b47","doi-asserted-by":"crossref","unstructured":"Vir Singh, P.\n               , \n                  Tan, Y.\n                and \n                  Mookerjee, V.\n                (2011), \u201cNetwork effects: the influence of structural social capital on open source project success\u201d, \n                  MIS Quarterly\n               , Vol. 35 No. 4, pp. 813-829.","DOI":"10.2307\/41409962"},{"key":"key2020121802013765000_b48","unstructured":"Xiang, G.\n               , \n                  Zheng, Z.\n               , \n                  Wen, M.\n               , \n                  Hong, J.\n               , \n                  Rose, C.\n                and \n                  Liu, C.\n                (2012), \u201cA supervised approach to predict company acquisition with factual and topic features using profiles and news articles on TechCrunch\u201d, Sixth International AAAI Conference on Weblogs and Social Media, Trinity College, Dublin."},{"key":"key2020121802013765000_b506","doi-asserted-by":"crossref","unstructured":"Uzzi, B.\n                (1996), \u201cThe sources and consequences of embeddedness for the economic performance of organizations: the network effect\u201d, \n                  American Sociological Review\n               , Vol. 61, pp. 674-698.","DOI":"10.2307\/2096399"},{"key":"key2020121802013765000_frd1","doi-asserted-by":"crossref","unstructured":"Backstrom, L.\n                and \n                  Leskovec, J.\n                (2011), \u201cSupervised random walks: predicting and recommending links in social networks\u201d, ACM International Conference on Web Search and Data Mining (WSDM), Hong Kong.","DOI":"10.1145\/1935826.1935914"}],"container-title":["Internet Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/IntR-09-2014-0231","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IntR-09-2014-0231\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IntR-09-2014-0231\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:36:46Z","timestamp":1753393006000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/intr\/article\/26\/1\/74-100\/186425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,1]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,2,1]]}},"alternative-id":["10.1108\/IntR-09-2014-0231"],"URL":"https:\/\/doi.org\/10.1108\/intr-09-2014-0231","relation":{},"ISSN":["1066-2243"],"issn-type":[{"value":"1066-2243","type":"print"}],"subject":[],"published":{"date-parts":[[2016,2,1]]}}}