{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T13:07:47Z","timestamp":1771852067482,"version":"3.50.1"},"reference-count":64,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2007,4,1]],"date-time":"2007-04-01T00:00:00Z","timestamp":1175385600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Communication Research"],"published-print":{"date-parts":[[2007,4]]},"abstract":"<jats:p> The pre- and postdownsizing information flow and postdownsizing turnover intentions of downsizing survivors were examined in the corporate office of an international hotel company. Using a combination of network analysis and path analysis, the relationship between changes in downsizing survivors' betweenness centrality and perceptions of information adequacy relative to reported turnover intentions were examined across two postdownsizing time periods. Results of the path analyses provided general support for the model as hypothesized, indicating in postdownsizing periods that changes to network members' network centrality positively influenced changes in their perceptions of information adequacy, which then negatively influenced their turnover intentions. The article concludes with a discussion of the support for the hypotheses and the study's limitations and pragmatic implications. <\/jats:p>","DOI":"10.1177\/0093650206298068","type":"journal-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T16:08:00Z","timestamp":1175789280000},"page":"156-184","source":"Crossref","is-referenced-by-count":21,"title":["Downsizing Survivors' Communication Networks and Reactions: A Longitudinal Examination of Information Flow and Turnover Intentions"],"prefix":"10.1177","volume":"34","author":[{"given":"Alex M.","family":"Susskind","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY"}]}],"member":"179","published-online":{"date-parts":[[2007,4,1]]},"reference":[{"key":"atypb1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.72.3.382"},{"key":"atypb2","doi-asserted-by":"publisher","DOI":"10.2307\/2393254"},{"key":"atypb3","doi-asserted-by":"publisher","DOI":"10.2307\/257037"},{"key":"atypb4","volume-title":"UCINET 5 for Windows: Software for Social Network Analysis version 5.3.5","author":"Borgatti, S.P.","year":"1999"},{"key":"atypb5","unstructured":"Brass, D.J.\n\t\t\t\t, & \n\t\t\t\t\tBurkhardt, M.E.\n\t\t\t\t (1992). Centrality and power in organizations. In \n\t\t\t\t\tN. Nohria\n\t\t\t\t & \n\t\t\t\t\tR. G. Eccles\n\t\t\t\t (Eds.), Networks and organizations: Structure, form and action (pp. 191-215). \n\t\t\t\t\tBoston: Harvard Business School Press\n\t\t\t\t."},{"key":"atypb6","doi-asserted-by":"publisher","DOI":"10.2307\/256588"},{"key":"atypb7","first-page":"213","volume":"10","author":"Brockner, J.","year":"1988","journal-title":"Research in Organizational Behavior"},{"key":"atypb8","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(85)90014-7"},{"key":"atypb9","doi-asserted-by":"publisher","DOI":"10.2307\/2392882"},{"key":"atypb10","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.64.2.187"},{"key":"atypb11","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1997.tb00274.x"},{"key":"atypb12","doi-asserted-by":"publisher","DOI":"10.2307\/2393923"},{"key":"atypb13","unstructured":"Burt, R.S.\n\t\t\t\t (2000). Social capital versus structural holes. In \n\t\t\t\t\tN. Lin\n\t\t\t\t, \n\t\t\t\t\tK. Cook\n\t\t\t\t , & \n\t\t\t\t\tR. Burt\n\t\t\t\t (Eds.) Social capital (pp. 31-56). \n\t\t\t\t\tHawthorne, NY: Aldine\n\t\t\t\t De \n\t\t\t\t\tGruyter\n\t\t\t\t."},{"key":"atypb14","volume-title":"Survivors: How to keep your best people on board after downsizing","author":"Caplan, G.","year":"1997"},{"key":"atypb15","doi-asserted-by":"publisher","DOI":"10.1177\/0093650297024006007"},{"key":"atypb16","doi-asserted-by":"publisher","DOI":"10.2307\/20159632"},{"key":"atypb17","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-8733(02)00049-7"},{"key":"atypb18","doi-asserted-by":"publisher","DOI":"10.1016\/0001-8791(91)90032-H"},{"key":"atypb19","first-page":"370","volume":"23","author":"Feeley, T.H.","year":"2000","journal-title":"Journal of Applied Communication Research"},{"key":"atypb20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1997.tb00401.x"},{"key":"atypb21","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(79)90002-9"},{"key":"atypb22","first-page":"26","volume":"7","author":"Gutknecht, J.E.","year":"1993","journal-title":"Academy of Management Executive"},{"key":"atypb23","doi-asserted-by":"publisher","DOI":"10.1037\/h0076546"},{"key":"atypb24","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1989.tb00198.x"},{"key":"atypb25","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(90)90002-Q"},{"key":"atypb26","volume-title":"Structural equation modeling with LISREL: Essentials and advances","author":"Hayduk, L.A.","year":"1987"},{"key":"atypb27","doi-asserted-by":"crossref","DOI":"10.56021\/9780801853364","volume-title":"LISREL: Issues strategies and debates","author":"Hayduk, L.A.","year":"1996"},{"key":"atypb28","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.81.6.1080"},{"key":"atypb29","volume-title":"Pathe: A program in basica. Unpublished manuscript","author":"Hunter, J.E.","year":"1995"},{"key":"atypb30","doi-asserted-by":"publisher","DOI":"10.2307\/2393451"},{"key":"atypb31","doi-asserted-by":"publisher","DOI":"10.2307\/256589"},{"key":"atypb32","doi-asserted-by":"publisher","DOI":"10.2307\/256742"},{"key":"atypb33","doi-asserted-by":"publisher","DOI":"10.2307\/2393414"},{"key":"atypb34","doi-asserted-by":"publisher","DOI":"10.1080\/00909889609365448"},{"key":"atypb35","volume-title":"LISREL for Windows 8.12a","author":"J\u00f6reskog, K.G.","year":"1993"},{"key":"atypb36","unstructured":"Kozlowski, S.W.J.\n\t\t\t\t, \n\t\t\t\t\tChao, G.T.\n\t\t\t\t, \n\t\t\t\t\tSmith, E.\n\t\t\t\t, & \n\t\t\t\t\tHedlund, J.\n\t\t\t\t (1993). Organizational downsizing: Strategies, interventions, and research implications. In \n\t\t\t\t\tC. L. Cooper\n\t\t\t\t & \n\t\t\t\t\tI. T. Robertson\n\t\t\t\t (Eds.), International review of industrial and organizational psychology (pp. 264-322). \n\t\t\t\t\tNew York: John Wiley\n\t\t\t\t."},{"key":"atypb37","unstructured":"Krackhardt, D.\n\t\t\t\t (1992). The strength of strong ties: The importance of philos in organizations. In \n\t\t\t\t\tN. Nohria\n\t\t\t\t & \n\t\t\t\t\tR. G. Eccles\n\t\t\t\t (Eds.), Networks and organizations (pp. 216-239). \n\t\t\t\t\tBoston: Harvard Business School Press\n\t\t\t\t."},{"key":"atypb38","doi-asserted-by":"publisher","DOI":"10.2307\/2393107"},{"key":"atypb39","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.71.1.50"},{"key":"atypb40","doi-asserted-by":"publisher","DOI":"10.1016\/0030-5073(75)90047-1"},{"key":"atypb41","unstructured":"Laumann, E.O.\n\t\t\t\t, \n\t\t\t\t\tMarsden, P.V.\n\t\t\t\t, & \n\t\t\t\t\tPrensky, D.\n\t\t\t\t (1983). The boundary specification problem in network analysis. In \n\t\t\t\t\tR. S. Burt\n\t\t\t\t & \n\t\t\t\t\tM. J. Minor\n\t\t\t\t (Eds.), Applied network analysis: A methodological introduction (pp. 18-34). \n\t\t\t\t\tBeverly Hills, CA: Sage\n\t\t\t\t."},{"key":"atypb42","volume-title":"High-involvement management","author":"Lawler, E.E.","year":"1986"},{"key":"atypb43","volume-title":"Latent variable modeling: An introduction to factor, path, and structural analysis","author":"Loehlin, J.C.","year":"1998","edition":"3"},{"key":"atypb44","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.78.4.538"},{"key":"atypb45","doi-asserted-by":"publisher","DOI":"10.1080\/00909889409365387"},{"key":"atypb46","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1998.926627"},{"key":"atypb47","unstructured":"Monge, P.R.\n\t\t\t\t, & \n\t\t\t\t\tContractor, N.S.\n\t\t\t\t (1987). Communication networks: Measurement techniques In \n\t\t\t\t\tC. H. Tardy\n\t\t\t\t (Ed.), A handbook for the study of human communication (pp. 107-138). \n\t\t\t\t\tNorwood, NJ: Ablex\n\t\t\t\t."},{"key":"atypb48","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2002.tb00805.x"},{"key":"atypb49","doi-asserted-by":"publisher","DOI":"10.1177\/014920630002600101"},{"key":"atypb50","doi-asserted-by":"publisher","DOI":"10.1016\/0378-8733(91)90019-P"},{"key":"atypb51","first-page":"23","volume":"9","author":"O'Neill, H.M.","year":"1995","journal-title":"Academy of Management Executive"},{"key":"atypb52","doi-asserted-by":"publisher","DOI":"10.2307\/2657354"},{"key":"atypb53","unstructured":"Rice, R.E.\n\t\t\t\t (1993). Using network concepts to clarify sources and mechanisms of social influence. In \n\t\t\t\t\tW. D. Richards\n\t\t\t\t & \n\t\t\t\t\tG. A. Barnett\n\t\t\t\t (Eds.), Progress in communication sciences (Vol. 12, pp. 43-67). \n\t\t\t\t\tNorwood, NJ: Ablex\n\t\t\t\t."},{"key":"atypb54","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-050X(199823\/24)37:3\/4<277::AID-HRM9>3.0.CO;2-E"},{"key":"atypb55","doi-asserted-by":"publisher","DOI":"10.2307\/2392563"},{"key":"atypb56","doi-asserted-by":"publisher","DOI":"10.2307\/256906"},{"key":"atypb57","doi-asserted-by":"publisher","DOI":"10.2307\/1556389"},{"key":"atypb58","volume-title":"Locus of control, instrumental action, and the pursuit of social capital. Unpublished doctoral dissertation","author":"Stefanone, M.A.","year":"2004"},{"key":"atypb59","volume-title":"StOCNET 1.7: An open system for the advanced statistical analysis of social networks (SIENA module version 2.4b)","author":"Stokman, F.","year":"2006"},{"key":"atypb60","doi-asserted-by":"publisher","DOI":"10.1177\/009365098025001002"},{"key":"atypb61","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.69.3.461"},{"key":"atypb62","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1111\/j.1744-6570.1993.tb00874.x","volume":"46","author":"R. P.","year":"1993","journal-title":"Personnel Psychology"},{"key":"atypb63","doi-asserted-by":"crossref","unstructured":"Wegner, D.M.\n\t\t\t\t (1987). Transactive memory: A contemporary analysis of the group mind. In \n\t\t\t\t\tB. Mullen\n\t\t\t\t & \n\t\t\t\t\tG. R. Goethals\n\t\t\t\t (Eds.), Theories of group behavior (pp. 185-208). \n\t\t\t\t\tNew York: Springer-Verlag\n\t\t\t\t.","DOI":"10.1007\/978-1-4612-4634-3_9"},{"key":"atypb64","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1999.2553250"}],"container-title":["Communication Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0093650206298068","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0093650206298068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T02:20:35Z","timestamp":1740882035000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0093650206298068"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4]]},"references-count":64,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2007,4]]}},"alternative-id":["10.1177\/0093650206298068"],"URL":"https:\/\/doi.org\/10.1177\/0093650206298068","relation":{},"ISSN":["0093-6502","1552-3810"],"issn-type":[{"value":"0093-6502","type":"print"},{"value":"1552-3810","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,4]]}}}