You are on page 1of 27

Q Academy of Management Review

2016, Vol. 41, No. 3, 383–409.


http://dx.doi.org/10.5465/amr.2013.0496

CHANGING WITH THE TIMES: AN INTEGRATED VIEW OF


IDENTITY, LEGITIMACY, AND NEW VENTURE LIFE CYCLES
GREG FISHER
Indiana University

SURESH KOTHA
AMRITA LAHIRI
University of Washington

To acquire resources, new ventures need to be perceived as legitimate. For this to occur,
a venture must meet the expectations of various audiences with differing norms, standards,
and values as the venture evolves and grows. We investigate how the organizational
identity of a technology venture must adapt to meet the expectations of critical resource
providers at each stage of its organizational life cycle. In so doing, we provide a temporal
perspective on the interactions among identity, organizational legitimacy, institutional
environments, and entrepreneurial resource acquisition for technology ventures. The core
assertion from this conceptual analysis is that entrepreneurial ventures confront multiple
legitimacy thresholds as they evolve and grow. We identify and discuss three key insights
related to entrepreneurs’ efforts to cross those thresholds at different organizational life
cycle stages: institutional pluralism, venture-identity embeddedness, and legitimacy
buffering.

New ventures confront “liability of newness” or appropriate within some socially constructed
concerns because the risk of failure for them is system of norms, values, beliefs, and definitions”
much higher than it is for established organizations (Suchman, 1995: 574). Numerous researchers have
(Stinchcombe, 1965: 148). This liability, along with examined how legitimacy and resource acqui-
new ventures’ lack of operating histories, makes it sition are interrelated (Delmar & Shane, 2004;
difficult for them to access needed resources to Garud, Schildt, & Lant, 2014; Martens, Jennings, &
exploit entrepreneurial opportunities. Dermont Jennings, 2007; Navis & Glynn, 2011; Sine, David, &
Berkery, a venture capitalist, aptly described their Mitsuhashi, 2007; Zimmerman & Zeitz, 2002;
challenge: Zott & Huy, 2007). For an entrepreneurial venture
to be perceived as legitimate, its structures, prac-
New companies are guilty until proven innocent.
Most of them fail. Investors know this. Entrepre- tices, and behaviors must align with the prevailing
neurs don’t—or at least choose not to believe this. . . . institutions in the environment in which it operates
[Entrepreneurs believe] their company will be dif- (Tolbert, David, & Sine, 2011).
ferent from all others. . . . Businesses need capital so Research on legitimacy acquisition for entre-
that they can invest in people, physical assets, in- preneurial ventures has predominantly focused
ventory, and so on. But investors are gripped by the
fear of failure and possible loss of precious capital on its attainment through different mechanisms,
(2007: 1). including narratives and stories (Aldrich & Fiol,
1994; Garud et al., 2014; Lounsbury & Glynn, 2001;
Acquiring and managing organizational legiti- Martens et al., 2007), symbolic management
macy are recognized as an antidote to the liability of practices (Aldrich & Fiol, 1994; Zott & Huy, 2007),
newness concerns confronting new ventures. Le- claiming of membership in an emerging or existing
gitimacy is “a generalized perception or assumption category (Kennedy, 2008; Kennedy, Lo, & Lounsbury,
that the actions of an entity are desirable, proper, 2010; Navis & Glynn, 2010, 2011; Wry, Lounsbury, &
Glynn, 2011), and conformance with or manipula-
tion of the institutional environment (Zimmerman &
All three authors contributed equally to this manuscript. We Zeitz, 2002). Firms also attain legitimacy through
are grateful for the insights and thoughtful advice of former
associate editor Peer Fiss and the three anonymous reviewers,
identity claims of “who we are” and “what we do”
as well as our colleagues—Warren Boeker, Donald Kuratko, (Navis & Glynn, 2011). Although legitimacy attain-
Jeff McMullen, Chad Navis, and Theodore Waldron. ment is important for new ventures, organizational
383
Copyright of the Academy of Management, all rights reserved. Contents may not be copied, emailed, posted to a listserv, or otherwise transmitted without the copyright
holder’s express written permission. Users may print, download, or email articles for individual use only.
384 Academy of Management Review July

scholars also emphasize that legitimacy is some- to assert that as a venture progresses through dif-
thing that must be carefully managed so that it is ferent life cycle stages, it seeks resources from
not lost once attained (e.g., Elsbach, 1994; Garud different actors with differing legitimacy evalua-
et al., 2014; Jonsson, Greve, & Fujiwara-Greve, 2009; tion criteria. We posit that a venture’s identity must
Suchman, 1995). Therefore, entrepreneurs need to develop, evolve, and adapt to meet varying expec-
work toward attaining as well as managing orga- tations of its changing audiences. Because a ven-
nizational legitimacy as a venture evolves and ture’s identity is imprinted in its routines and values
grows. (Hannan, Baron, Hsu, & Koçak, 2006) and strongly
Extant research on legitimacy attainment and attached to the individual identity of its founder(s)
management in entrepreneurial settings is pred- (Fauchart & Gruber, 2011), changing a venture’s
icated on a few restrictive assumptions. First, re- identity can be challenging (Gioia & Thomas, 1996;
searchers have assumed that legitimacy is less of Nag, Corley, & Gioia, 2007). Hence, adapting a ven-
a concern once a venture becomes an established ture’s identity to maintain organizational legiti-
organization—an assumption consistent with liabil- macy as it evolves through different life cycle
ity of newness arguments. Accordingly, Zimmerman stages needs to be orchestrated carefully.
and Zeitz (2002) proposed the notion of a “single” le- Integrating insights from different theoretical
gitimacy threshold below which a venture is ex- perspectives, we highlight a core conceptual asser-
pected to fail and above which it is perceived as tion that entrepreneurial ventures confront multiple
legitimate and, thus, able to garner resources needed legitimacy thresholds because of their evolution and
for survival and growth. This assumption has led to growth, as well as their audiences’ differing expec-
limited research attention to scenarios where a new tations of what constitutes a legitimate venture. We
venture’s legitimacy declines or is threatened after then identify and discuss three key insights related
the single threshold is crossed. to entrepreneurs’ efforts to cross those thresholds at
Second, researchers have assumed that resource different organizational life cycle stages. First, we
providers are homogeneous in their assessments of posit that ventures confront periods of institutional
new venture legitimacy. However, entrepreneurial pluralism as they appeal to resource providers with
ventures depend on resources derived from a di- differing perspectives of what constitutes a legiti-
verse range of audiences (Denis, 2004; Hanlon & mate venture. Second, we argue that ventures with
Saunders, 2007), who generally have differing high levels of legitimacy in one organizational life
norms, beliefs, rules, and procedures for assessing cycle stage will confront challenges related to
a venture. Since legitimacy assessments represent venture-identity embeddedness as they transition
a social judgment that resides in the eye of the to the next stage. Third, we propose that high levels
beholder (Ashforth & Gibbs, 1990; Bitektine, 2011; of legitimacy attained in prior life cycle stages
Webb, Tihanyi, Ireland, & Sirmon, 2009), they are may serve as a buffer for meeting legitimacy re-
audience dependent (Suchman, 1995). If the nature quirements for subsequent stages. These theoretical
of the resource provider assessing the legitimacy assertions, individually and in combination, provide
of an entrepreneurial venture changes, then the a novel, unique, and comprehensive perspective on
norms and beliefs by which the venture is assessed legitimacy attainment and management in new
also change. Hence, there is a recognized need for ventures. Together, they suggest that legitimacy
research exploring how assessments of new ven- attainment early in a venture’s life does not nec-
tures “differ across different audience contexts” essarily ensure its continuance over time. They
(Navis & Glynn, 2011: 494). highlight the significant challenges associated with
In an effort to relax these restrictive assumptions, legitimacy attainment and management that occur
we examine the following research question: How over a venture’s life cycle as the venture transforms
do legitimacy criteria change for entrepreneurial into an established public entity. They also high-
ventures as they develop and seek resources from light the mechanisms that entrepreneurs can use to
different audiences over time? To address this re- manage legitimacy to ensure continued access to
search question, we draw on identity theory as it resources.
relates to entrepreneurial endeavors (e.g., Navis & Since the entrepreneurship research domain is
Glynn, 2011), institutional theory related to the le- broad (cf. Schildt, Zahra, & Sillanpää, 2006), we
gitimation of new ventures (e.g., Aldrich & Fiol, limit the scope of our theoretical arguments to le-
1994; Garud et al., 2014; Suchman, 1995), and the life gitimacy assessments made by financial resource
cycle theory of organizations (e.g., Kazanjian, 1988) providers who are focused on technology-based
2016 Fisher, Kotha, and Lahiri 385

ventures. Researchers have distinguished technology- institutions and entrepreneurship (Hiatt, Sine, &
based venturing from mainstream entrepreneur- Tolbert, 2009; Tolbert et al., 2011; Zott & Huy, 2007).
ship by emphasizing its focus on science- and While this literature has focused generally on the
technology-driven innovation as the basis of en- impact of institutional environment on organiza-
trepreneurial opportunity (Beckman, Eisenhardt, tional start-ups, there has been little research on
Kotha, Meyer, & Rajagopalan, 2012).1 Developing how the institutional environment impacts new
arguments for technological ventures enables us ventures’ survival and growth over time, particu-
to provide clarity and consistency in our theorizing. larly as they transition through different de-
We focus on financial resources since these velopmental stages. We provide a longitudinal
represent a fundamental and measurable proxy perspective connecting ventures with the in-
for new venture legitimacy (e.g., Martens et al., stitutional environments in which they operate,
2007; Zott & Huy, 2007). As noted by Hsu (2007), and we pay particular attention to issues of tem-
timely acquisition of financial resources allows porality in neoinstitutional theory (Granovetter,
fledgling ventures to devote greater time and atten- 1992) by considering how institutional pressures
tion to core product-market issues, such as product on an entity change with time. Second, we con-
development, competitive landscape monitoring, and tribute to the legitimacy and entrepreneurship
customer acquisition, as opposed to administrative literature by explicitly linking legitimacy criteria
duties, such as fundraising efforts. Given the resource to systemic changes in the audiences for new
constraints start-ups usually face, having more time ventures, thus building a richer, more nuanced,
for product-market issues can be critical for survival. and comprehensive perspective of new venture
Although our examples and assertions are spe- legitimacy. To this end, we specify that new ven-
cific to financial resource providers evaluating tures confront multiple legitimacy thresholds
technology ventures founded in academic settings, as they move through different life cycle stages,
the overarching concept of new venture legitimacy and we identify three key insights related to
shifts across organizational life cycle stages is entrepreneurs’ efforts to cross those thresholds
generalizable to other entrepreneurial settings.2 at different organizational life cycle stages: in-
Almost all new ventures that seek to grow into stitutional pluralism, venture-identity embedded-
substantive enterprises will need to appeal to ness, and legitimacy buffering, which we discuss
different audiences—with different legitimacy in greater detail later.
criteria—as they develop and evolve. Therefore, We contribute to the identity literature by elab-
although the specific audience categories and as- orating on the process that prompts organizational
sociated legitimacy evaluation criteria may differ actors to modify their identity claims over time as
in other settings (e.g., family ventures, social ven- an organization evolves. Prior research has sug-
tures), the challenges and opportunities associated gested that organizational identity claims may
with multiple legitimacy thresholds, institutional change as an organization’s strategy evolves
pluralism, venture-identity embeddedness, and (Albert & Whetten, 1985; Gioia & Thomas, 1996; Nag
legitimacy buffering over a venture’s life cycle are et al., 2007; Waldron, Navis, & Fisher, 2013). Yet
likely to be present in other settings. these changes have, for the most part, been theo-
We make the following contributions. First, we rized as ad hoc adaptations in response to signifi-
contribute to the literature at the intersection of cant environmental jolts. In contrast, we add more
conceptual clarity to the drivers triggering critical
but systematic adaptations to an organization’s
1
Since technology-based ventures result from unique identity over its early life cycle, and we argue that
technical insight, they generally emerge from settings rich in such adaptations arise in response to changing
technical knowledge, develop through distinct life cycle legitimacy criteria that different audiences employ
stages, and, if successfully commercialized, have the potential
for significant growth and competitiveness (Hsu, 2008).
when providing resources to ventures. Thus, our
2
Focusing on technology ventures started in academic research builds on the work of Whetten (2006) but
settings helps us to contextualize our arguments pertaining to departs from it by shifting identity theory’s core
technology ventures in a consistent and salient setting, frame of reference away from the “who” to the
thereby allowing us to theorize with clarity and impact. Addi- “when,” “how,” and “why.”
tionally, while such ventures are fairly common in the entrepre-
neurial landscape, they often represent promising high-growth We structure the article as follows. First, we
firms, thus making them an appropriate context for theory provide the theoretical background from research
development. on legitimacy, identity, and organizational life
386 Academy of Management Review July

cycles. We apply this theoretical background to that are perceived as legitimate may engage in
issues related to resource acquisition in an entre- activities that prompt audiences to question
preneurial context. We propose a conceptual frame- whether they remain desirable, proper, or appro-
work linking legitimacy, identity, and organizational priate (Elsbach, 1994; Jonsson et al., 2009). For ex-
life cycle stages to discuss the legitimacy challenges ample, Jonsson and colleagues (2009) described
and opportunities for new ventures as they evolve how Skandia AB—a highly legitimate and well-
and grow. We conclude with implications for re- established Swedish insurance firm—lost its le-
search and practice. gitimacy when it announced the sale of its asset
management business. Elsbach (1994) highlighted
how organizations in the California cattle industry
THEORETICAL BACKGROUND lost legitimacy following a television documentary
depicting poor animal care in a western cattle
Legitimacy and Entrepreneurial Ventures
ranch, along with the release of studies linking fat
As noted, Suchman defined legitimacy as “a from beef consumption to heart disease. These
generalized perception or assumption that the ac- examples suggest that legitimacy, once achieved,
tions of an entity are desirable, proper, or appro- cannot be assumed to always be present and
priate within some socially constructed system of must be managed such that it can be maintained
norms, values, beliefs, and definitions” (1995: 574). and repaired when necessary (Garud et al., 2014;
Since most new ventures lack a track record Suchman, 1995).
(i.e., paying customers, a strong financial history)
and are low-power actors (Santos & Eisenhardt,
Identity
2009), they often struggle to garner endorsements
from powerful institutional actors, who often An entity’s identity is its definition of itself
question their raison d’être. Research has sug- (Corley et al., 2006). Identity serves as a mechanism
gested that there exists a legitimacy threshold for for self-definition at both an individual and an or-
new ventures, below which an entity is perceived ganizational level. At the individual level, identity
as illegitimate and is unlikely to attract resources is “a general, if individualized, framework for un-
and above which it becomes a significantly more derstanding oneself that is formed and sustained
desirable recipient for resources (Zimmerman & via social interaction” (Gioia, 1998: 19). At the or-
Zeitz, 2002). ganizational level, identity defines members’
Prior research has also suggested that the re- collective, shared sense of who they are as an or-
lationship between legitimacy and resource ac- ganization (Albert & Whetten, 1985; Corley &
quisition can be nonlinear. Although a minimum Gioia, 2004; Stimpert, Gustafson, & Sarason, 1998;
level of legitimacy begets resources, subsequent Waldron et al., 2013), thus answering critical
increases provide decreasing returns (Pollock & questions of “who we are” and “what we do” (Navis
Rindova, 2003), since further exposure does not & Glynn, 2011).
necessarily increase audience attention (Fiske & An entity’s identity is conveyed to an external
Taylor, 1991; Starbuck & Milliken, 1988). This view is audience through identity claims (e.g., Ashforth &
consistent with Granovetter’s (1978) observation Mael, 1989; Glynn, 2000; Porac, Wade, & Pollock,
that social influence is often a nonlinear process, 1999). Identity claims are self-referential claims
and it is also consistent with Anderson’s (1981) as- that define the essence of an entity, signaling or
sertion that the degree to which information is specifying its core attributes; they may be tacit
used in impression formation depends on its non- or explicit, or they may be taken for granted or
redundancy; redundant information leads to an more consciously available (Corley & Gioia, 2004).
“attention decrement.” Therefore, for an entrepre- These claims serve as triggers for sensemaking
neurial venture, investing in legitimacy may be as individuals both within and outside an entity
essential up to a point, because it enables the attempt to make sense of that entity (Navis &
venture to access much needed resources. Beyond Glynn, 2011; Waldron et al., 2013; Weber & Glynn,
that point, however, further investments in organi- 2006; Weick, 1995). Meaningful identity claims
zational legitimacy do not necessarily yield com- enable individuals to connect with an entity
mensurate benefits. and understand their role and purpose in relation
Researchers also suggest that organizational to that entity (Dutton & Dukerich, 1991; Dutton,
legitimacy can be lost. In some cases organizations Dukerich, & Harquail, 1994; Whetten, 2006).
2016 Fisher, Kotha, and Lahiri 387

Within organizations, identity claims serve entrepreneur’s individual identity. According to


as defining and stabilizing mechanisms for Navis and Glynn (2011), identity claims, at vari-
individuals. ous levels, distinguish an entrepreneurial ven-
This becomes particularly important under un- ture from other organizations to promote its
certain and ambiguous conditions, such as those distinctiveness, while at the same time connect-
confronting entrepreneurial ventures. For entre- ing it with similar entities to enhance its legiti-
preneurial ventures, identity claims can describe macy and understandability in the eyes of an
the nature of the market being pursued, the es- external audience and resource providers.
sence of the organization, and the nature of the
individuals involved (cf. Dutton et al., 1994). An
Organizational Life Cycles
entrepreneurial identity embeds claims related to
all three levels of analysis: the founder (individ- The biological metaphor of a life cycle has been
ual level), the proposed new venture (organiza- central to describing the development and growth
tional level), and the focal institutional sector of organizations over time. Introduced first by
(market level; Navis & Glynn, 2011). Alfred Chandler in 1962, the literature on organi-
Identity claims may serve to distinguish an zational life cycles suggests that organizations
entrepreneurial venture if it highlights what is evolve and change in a predictable manner as
novel and different about the endeavor, thereby they grow.4 This literature conceptualizes orga-
reinforcing its distinctiveness (Albert & Whetten, nizations in four or five broad developmental
1985). Identity claims may also bond an entre- stages. Although such stages are given different
preneurial endeavor with other similar organi- labels across various research studies, the stages
zations by purposely invoking familiar conventions described tend to be similar in nature; therefore,
and symbols (Navis & Glynn, 2011). In this way the selection of a particular life cycle model is
identity claims may serve to establish a collective more semantic than substantive. All life cycle
identity for the firm by claiming membership in models convey similar ideas, yet the context
a market category or by affiliating with an existing within which different models were developed
institutional structure (Glynn, 2008; Navis & Glynn, varies. Recognizing this, we adopt Kazanjian’s
2010, 2011; Wry et al., 2011).3 (1988) organizational life cycle model for technol-
As an entrepreneurial venture transforms into ogy ventures. Its specificity to technology-based
an established organization, it may develop mul- ventures makes it the most relevant to our setting.
tiple identities in multiple contexts with different Kazanjian (1988) outlined four distinctive stages
audiences (Gioia, Schultz, & Corley, 2000). The or- of technology ventures: conception, commercial-
ganizational identity then consists of “constella- ization, growth, and stability. Since our primary
tions of features and labels appropriate for different interest is on legitimacy judgments pertaining to
contexts and interactions” (Gioia et al., 2000: 74). new ventures as opposed to established firms, we
Often, the common core features of the organiza- focus our theoretical arguments on the first three
tion’s identity are retained, yet its identity mutates stages.
and adapts to meet the differing demands of mul- Conception, the first stage, is the period in
tiple contexts and audiences. which the people involved in a technology start-
In sum, identity claims make an entrepre- up focus on developing the technology underlying
neurial venture understandable to an external the product and creating a working prototype.
audience, typically describing the nature of the Organizational structure and formality are non-
opportunity and market being pursued, the es- existent, with the focus being on proving the
sence of what the venture stands for, and the technical merits of the invention (Kazanjian, 1988).
The conception stage of a technology venture is
3
Collective identities operate at a macroorganizational
4
level and, once established, enable internal and external au- Since Chandler’s (1962) introduction of a staged life cycle
diences to distinguish between distinct groups and subgroups model of organizational growth, scholars have conceptually
of organizations, such as industrial versus craft brewers and empirically examined how managerial priorities (Smith,
(Carroll & Swaminathan, 2000), classical versus nouvelle cui- Mitchell, & Summer, 1985) and indicators of organizational ef-
sine restaurants (Rao, Monin, & Durand, 2003), Boston trustees fectiveness (Quinn & Cameron, 1983), as well as organizational
versus New York money managers (Lounsbury, 2007), and lib- pressures, threats, and opportunities, vary with changes in life
eral arts colleges versus large research universities (Kraatz & cycle stages (Anderson & Zeithaml, 1984; Dodge, Fullerton, &
Zajac, 1996). Robbins, 1994; Dodge & Robbins, 1992).
388 Academy of Management Review July

a critically important element of the entrepre- emerge (Kazanjian, 1988). Technology ventures
neurship process (Reynolds & Miller, 1992). This is in the commercialization stage of the venture
the stage in which a new venture’s idea or core life cycle often move away from university
insight about a product or service opportunity is facilities into more commercial facilities and
first conceived and developed; without this stage begin to garner resources from individual
there would be no entrepreneurship. In some in- angel investors and/or from venture capital-
stances, some elements of the conception stage ists (VCs).
may occur before a formal organization is formed Growth, the third stage of a venture life cycle, is
(Katz & Gartner, 1988), but without the actions that characterized by a sequence of functionally lo-
underlie the conception stage, no organization calized problems, as each function works to build
would ever be formed.5 an efficient and effective task system (Kazanjian,
Technology ventures in the conception stage 1988). Typically, at this stage, the technical chal-
often operate within a university setting or affili- lenges associated with product development have
ate themselves with a research institution. The been surmounted and the product has achieved
identity of the venture may therefore be tied to the a modicum of market success. Because ventures in
university in which it is conceptualized and to the this stage of development may require large in-
individual identities of the founders seeking to fusions of capital to expand their operations and
advance their research. Here research is funded fund growth, capital may be sought in the public
by university research budgets or government markets via a listing on a stock exchange (Martens
grants (e.g., the U.S. Small Business Innovation et al., 2007). This stage persists until a venture
Research [SBIR] program or the Small Business reaches a growth rate consistent with market
Technology Transfer [STTR] program administered growth (i.e., the venture reaches maturity).
by participating government agencies, such as Previously, scholars used the life cycle per-
the U.S. Department of Defense, National Science spective to study various phenomena over time,
Foundation, etc.).6 such as power in organizations (Mintzberg, 1984),
Commercialization, the second stage, repre- organizational politics (Gray & Ariss, 1985), human
sents the phase when a venture’s technology resources management (Milliman, Von Glinow, &
turns into a product or service for a market niche. At Nathan, 1991), firm networks (Hite & Hesterly, 2001),
this stage the organization exists (Katz & Gartner, and stakeholder theory (Jawahar & McLaughlin,
1988) and largely resembles a new product devel- 2001). Following the same tradition, we apply the
opment team found in established organizations life cycle perspective to better understand organi-
(Kazanjian, 1988). Entrepreneurs engage in a pro- zational legitimacy and identity challenges over
cess to find a market for a technology and establish time.
product-market fit (Ries, 2011). The focus is on en-
suring that the proposed product concept works as
designed, and initial product prototypes are re- THE PROPOSED CONCEPTUAL FRAMEWORK
fined to meet certain market needs (Blank, 2013;
The theoretical paradigms discussed above
Fisher, 2012; Gaibraith, 1982; Waldron et al., 2013).
provide a foundation for a conceptual frame-
Specific tasks within the organization are defined
work for entrepreneurial resource acquisition
and discrete organizational functions begin to
over time. For a venture to be judged as legiti-
5
mate, its identity claims must align with the
The conception stage can last anywhere from one month institutional conventions—that is, the norms,
to ten years (Reynolds & Miller, 1992), yet for technology
ventures the conception stage tends to be longer than for values, beliefs, and definitions—of the socially
other types of new ventures because of the complexity and constructed system governing the audience
nuance involved in conceptualizing and developing a science- making legitimacy judgments. As Navis and Glynn
or technology-driven innovation as the basis of the entrepre- point out:
neurial opportunity.
6
The SBIR and the STTR are U.S. government programs [Adhering to] conventions in their identity claims
initiated in 1982 and 1992, respectively. The goal of these pro- helps entrepreneurs “identify with other actors,
grams is to facilitate the transfer of technology developed by values, or symbols that are themselves legiti-
a research institution through the entrepreneurship of a small mate” (Ashforth & Gibbs, 1990), thereby enhancing
business concern. Through FY2009 the SBIR program alone the legitimacy of the entrepreneurial endeavor
allocated over 112,500 awards, totaling more than $26.9 billion, (e.g., Aldrich & Fiol, 1994; Glynn & Marquis, 2004;
a significant amount of funding by any measure. Suchman, 1995). Deviation from these conventions,
2016 Fisher, Kotha, and Lahiri 389

however, or not adapting when such conventions Graphics, and Lycos. Table 1 provides a summary
change, can put legitimacy at risk (2011: 485). of the different socially constructed systems gov-
Organizational life cycle theory dictates that erning the legitimacy judgments of resource pro-
the needs and challenges that a new venture faces viders to technology ventures founded in a university
will change over time (Chandler, 1962). Each stage setting. Next we elaborate on the content of the col-
in a venture’s life cycle gives rise to new resource umns presented in Table 1 and outline the legiti-
needs and different resource acquisition chal- macy assessment criteria associated with each life
lenges (Quinn & Cameron, 1983; Reese & Aldrich, cycle stage.
1995). With those shifts, new audiences become
important as the primary resource providers. The Conception Stage
different audiences providing resources to entre-
preneurial ventures operate under different socially During the conception stage, researchers and
entrepreneurial scientists develop or work with
constructed institutional conventions. Therefore,
emerging technological inventions. A majority of
perceptions of venture legitimacy change as a ven-
early-stage technology ventures leveraging aca-
ture develops.
demic research rely on financial grants (e.g., SBIR/
Early resource providers, such as friends and
STTR funding and/or university research grants)
family or administrators of university research
to establish technical viability (Branscomb &
grants, generally operate in socially constructed
Auerswald, 2002; Elston & Audretsch, 2011). There-
systems characterized by social, “identity-based
fore, the audiences making legitimacy judgments at
ties” associated with family relationships or ac-
this stage are often grant administrators and/or
ademic activity. However, later resource pro-
university professors, or scientists with domain
viders, such as VCs or institutional investors,
expertise. Operating within a socially constructed
are characterized by market-based, “calculative
system centered on academic research and sci-
ties” (Hite & Hesterly, 2001). Compared with
entific advancement, grant administrators and
early-stage resource providers, later-stage pro- expert evaluators act as gatekeepers for research
viders generally have clear economic goals, de- grants and are motivated to advance science to
finitive investment mandates, better market benefit society. They are socialized to embrace and
reach, and a superior ability to help a new ven- extend a “logic of science” (Dunn & Jones, 2010;
ture mitigate growth-related challenges (Hite & Sauermann & Stephan, 2013), which emphasizes
Hesterly, 2001; Woolcock, 1998). Thus, as a ven- the pursuit of basic scientific knowledge, the need
ture develops, actors with different motivations for research freedom, and open disclosure of find-
and risk-reward profiles are better equipped to ings (Dunn & Jones, 2010; Fini & Lacetera, 2010;
provide the resources necessary to support its Murray, 2010; Perkmann, King, & Pavelin, 2011;
growth (Berkery, 2007; Hite & Hesterly, 2001). Sauermann & Stephan, 2013). The first column of
To demonstrate how the central ideas proposed Table 1 reflects important institutional conven-
here manifest, we consider the evolution of a ven- tions of the socially constructed system governing
ture founded to exploit a technical breakthrough resource providers in the conception stage of
based on academic research. Such ventures, re- a technology venture.
ferred to as “university spin-offs” or “academic The primary goal of resource providers in the
entrepreneurship,” have been key drivers of in- conception stage is to support long-term techno-
novation in the technology sector. These firms are logical progress that enhances societal welfare
often vehicles to commercialize technology inven- with limited regard for immediate commercial
ted by a university. They are usually highly in- applications and market outcomes (Dosi, 1982).
novative and, in contrast to many other types of Grant administrators having this motivation and
entrepreneurial ventures, often have strong in- operating under academic professional norms
ventive capacity (Libaers, Hicks, & Porter, 2010). emphasize a project’s technological plausibility,
Such ventures have been the focus of prior aca- the technical reputation of team members, the
demic research (e.g., Colyvas & Powell, 2007; status of their affiliated institution, and compliance
Haeussler & Colyvas, 2011; Shane, 2004) and of with scientific practices as part of their legitimacy
popular books on entrepreneurship (e.g., Hughes, assessment. Technological plausibility refers to
2011; Lewis, 1999). Prominent examples of such the perception that the technological challenges
firms include Google, Genentech, Netscape, Silicon associated with the project can be successfully
390 Academy of Management Review July

TABLE 1
Socially Constructed Systems of Technology Venture Audiences

Audience Attributes Conception Stage Commercialization Stage Growth Stage

Audience providing Grant administrators; Venture capitalists; angel Institutional investors


financial resources researchers investors
Audience goals Knowledge advancement; Medium- to long-term Short-term financial returns;
solve societal problems financial returns; exit increase portfolio value
and challenges; support investments in future at year-on-year basis
technological high multiple; participate
advancement in building companies
Audience norms Academic professional Long-term financial Short-term financial
norms self-interest self-interest
Audience values Openness; collaboration; Firm value creation; competition; Portfolio value creation;
learning; knowledge as proprietary knowledge for risk management; risk
a public good competitive advantage diversification
Audience authority and Bureaucracy; legislation Equity percentages; board Shareholder activism;
control mechanisms representation; informal meeting listing requirements;
reporting regular formal financial
reporting and addressing
shareholder concerns publicly
Audience focus of Research progress; Market position; meeting Financial results; share price
attention knowledge advancement; growth milestones; and growth potential; broad
individuals’ academic potential for a successful economic factors; managers’
reputation liquidity event; management reputation as seasoned
team’s entrepreneurial reputation executives

Summary of audience Technology ventures are Technology ventures are Technology ventures are
orientation toward mechanisms to advance mechanisms to generate mechanisms to generate
technology ventures knowledge that benefits private wealth in the short-term financial returns
the society as a whole. medium term and advance and balance an investment
the reputation and career portfolio.
of financial intermediaries.

Legitimacy evaluation • Technological plausibility • Demonstrated technological • Demonstrated exploitation


factors of proposed concept progress of technological concept
• Academic/technical • Team’s entrepreneurial • Managerial reputation (prior
reputation of team experience/reputation roles and organizations)
• Recognition of associated and passion • Recognition (and status) of
institution (e.g., • Source of knowledge associated organizations
university ranking) about new venture (investment banks, auditor,
• Creation of public goods (referral source) strategic alliances)
• Goals focused on • Perceived market potential • Financial performance of
knowledge (size, growth, and the organization
advancement competitive dynamics) • Balancing multiple
and societal gain • Plausibility of proposed stakeholder interests and
• Compliance with business model statisying their concerns
academic norms and • Substantial venture • Goals and strategies focused
standards (citation, accomplishment recognized on revenue and profit growth
disclosure, etc.) by a credible third party • Compliance with formal
(“proofpoints”) listing regulations (Securities
• Protection of private goods and Exchange Commission)
(patents, nondisclosure, etc.) and other regulatory concerns
• Goals focused on
exploitation of private
goods for economic gain
• Compliance with legal
requirements for private entities
2016 Fisher, Kotha, and Lahiri 391

resolved; such an assessment is often based on the Commercialization Stage


project’s “scientific relevance and scientific merit”
As ventures develop their technology, entrepre-
(Maurer & Ebers, 2006: 273), which, in turn, stems
neurs often identify and resolve critical technical
from grasping the current technological paradigm
problems, thus decreasing the associated techno-
and proposed technical trajectories (Dosi, 1982)
logical risks (Kazanjian, 1988). Entrepreneurs then
needed to achieve desired outcomes.
shift their focus to lowering the market risk, which
Uncertainty regarding a venture’s quality is
refers to the “uncertainties attributable to com-
the highest during this stage, given that both the
petitors and consumer responses and by all the
technology and the market segments on which the
other factors that together determine venture out-
venture will focus are evolving. Hence, ventures
comes” (Branscomb et al., 2000: 14).
in the conception stage, lacking tangible perfor-
Typically, government programs such as SBIR
mance metrics (e.g., financial revenues, cash
grants do not fund technology commercializa-
flows, and market share), rely most heavily on
symbolic affiliations and adherence to processes tion proposals at this stage, instead encourag-
that are familiar and understandable to resource ing entrepreneurs to obtain funding from private
providers.7 Accordingly, the team’s academic investors. Thus, angel investors and VCs become
reputation and the status of their affiliated in- attractive funding sources. VCs and angel inves-
stitution act as signals of quality during early tors seek significant medium-term (e.g., seven- to
stages (Stuart, Hoang, & Hybels, 1999). A team ten-year time horizons) financial returns from in-
with a history and reputation of scientific in- vestment exits (e.g., initial public offering [IPO] or
tegrity, creativity, and breakthroughs provides sale) at some uncertain future point in time. They
potential funders with the confidence that tech- participate in building ventures and look for op-
nical challenges will be successfully identified portunities to enhance the value of the firms in
and addressed. Affiliation with a high-status in- which they are invested as they manage their in-
stitution also signals quality and provides a vestments. To find good investments, they use
sense of familiarity that promotes legitimacy. market-related criteria, considering proprietary
Compliance with academic norms includes knowledge and resources, the nature of the com-
knowledge generation through openness (form petition, financial projections, the entrepreneurial
and process) and the advancement of societal reputation of the management team, and the time
goals (outcomes). Resource providers embedded horizons required for successful market commer-
in the academic community favor ventures that cialization of technology (Berkery, 2007; Hall &
have the potential for technological breakthroughs Hofer, 1993; MacMillan, Siegel, & Narasimha, 1986).
or scientific advances that serve the larger public Within the social system governing VCs and
interest. The rationale used for funding a new angel investors, norms are dictated by long-term
technological venture may include meeting na- self-interest (Thornton, Ocasio, & Lounsbury, 2012).
tional security needs, improving the environment, Power and authority stem from equity percent-
or stimulating economic growth through knowl- ages, which are often linked to representation on
edge spillovers or job creation (Branscomb, Morse, the board of directors. The goal is to generate su-
& Roberts, 2000; Dosi, 1982). The criteria that grant perior economic rents, while recognizing the need
administrators use to evaluate legitimacy at this for patience in realizing such gains, since in-
stage include an assessment of whether the ven- vestments can remain illiquid for a relatively long
ture can create public benefits, as defined by period (Gompers, 1995). The key dimensions of the
nonexcludability and nonrivalry (Olson & Olson, socially constructed system governing the legiti-
2009), and can conform to academic norms per- macy judgments of VCs and angel investors who
taining to citation and scientific disclosure in its contribute resources to technology ventures in the
grant proposal (Sauermann & Stephan, 2013). The commercialization stage of development are re-
focal legitimacy criteria for ventures at the con- flected in the second column of Table 1.
ception stage are summarized at the bottom of Since angel investors and VCs focus on medium-
column one in Table 1. to long-term market opportunities, legitimacy
assessments focus primarily on whether, over
time, they can reap above-average market returns
7
We thank an anonymous reviewer for encouraging us to through their investment in the venture. Although
discuss this issue. the level of uncertainty regarding the venture’s
392 Academy of Management Review July

quality in the commercialization stage is lower Growth Stage


compared to the conception stage since most of
A technology venture at the growth stage often
the technological risks have been mitigated, this
requires financial resources to expand its human
stage still requires entrepreneurs and investors to
resource base, cover production costs, and service
bear considerable uncertainty. However, the na-
a growing customer base (Kazanjian, 1988).
ture of the symbolic mechanisms used to make le-
Fischer and Pollock (2004: 464) describe the shift
gitimacy claims often begins to shift from primary
from private to public ownership as a “highly
reliance on the founder’s human capital and pre-
significant and nonrepeatable” transformational
existing ties to the venture’s own history of ac-
event in an organization’s life cycle that in-
complishments (Hallen, 2008).
evitably necessitates a modification of its goals,
Indeed, tangible performance metrics become
boundaries, and/or activity systems. The risks
increasingly relevant in this stage. Hallen and
arising from this event are enough to reset the
Eisenhardt describe how entrepreneurs are able
organization’s liabilities of newness clock and
to effectively signal legitimacy for raising venture
reexpose the organization to the risk of failure
capital by timing the fundraising around de-
as it adapts its existing strategies, internal
monstrable “proofpoints,” which they define as
operational and administrative processes, and
“a positive signal of substantial venture ac-
external ties and relationships to new sets of
complishment of a critical milestone that is
expectations (see also Amburgey, Kelly, & Barnett,
confirmed by key external (not internal) actors”
1990).
(2012: 46). Proofpoints resolve a critical un-
In this stage ventures seek a broader base of
certainty by serving as demonstrable evidence
financial resource providers, primarily institu-
of the venture’s capabilities; their influence is
tional investors, by preparing an IPO.8 Accordingly,
amplified when the achievement is recent. Le-
institutional investors that manage portfolios of in-
gitimacy assessment criteria also include a po-
vestments in publicly traded companies become
tentially large and realizable customer base,
the primary audience for a technology venture—
since this signals the likelihood of generating
at least before the venture’s stock is widely avail-
significant economic value (Bhide, 2000). Thus,
able to the general public (once trading officially
an entrepreneur’s ability to persuade investors
begins on a trading exchange).9
that the team assembled can capture a signifi-
During this stage, technology and market risks
cant portion of a large identified market de-
are significantly reduced. Hence, legitimacy as-
termines the venture’s accorded legitimacy
sessment criteria in this stage shift significantly
(Roberts & Barley, 2004). Here the venture’s
away from merely symbolic mechanisms (although
business model and the financial projections
that stem from it, along with its competitive
strategy, become salient points for consider- 8
Another common strategy is to be acquired. An acquisition
ation, discussion, and debate (Hsu, 2008). often involves erasing the identity of the new venture as
VCs and angel investors give primacy to pro- a stand-alone entity and, hence, falls outside the scope of our
tecting intellectual property (IP) and appropriat- theoretical analysis. Alternatively, a technology venture may
ing rents through the creation of private goods. IP seek to grow organically using internally generated cash flows
is regarded as a source of competitive advan- instead of external capital. In such an instance, growth can be
slower than if external funding is accessed. Additionally, the
tage, and the exploitation of private goods is the primary audience for the venture will not change as dramati-
basis for generating economic rents. VCs and cally; therefore, the issues discussed here may not be as
angel investors perceive a technological venture prevalent for ventures adopting such a strategy.
to be more legitimate if it is strategically posi-
9
At least initially, the “roadshow” that precedes the IPO and
tioned to protect and exploit its IP (generally via the S-1 documents submitted to the Securities and Exchange
Commission (SEC) are geared toward underwriters (invest-
patents). Hence, venture legitimacy assessments ment banks) and informed investors. Market exchanges (e.g.,
hinge on whether the venture has developed NASDAQ, NYSE) may also espouse certain institutional conven-
private goods that may be protected and ex- tions that get intertwined with the conventions of investors in
ploited for pecuniary benefits, along with an as- determining the norms and criteria by which a venture is judged
sessment of the team’s ability to execute. The key in the growth stage. To simplify the scenario for the purpose of
building theory, we make no attempt to disentangle the in-
legitimacy criteria for ventures at the commer- stitutional conventions of investors and the market exchange
cialization stage are summarized at the bottom of where a venture is listed. We thank an anonymous reviewer for
column two in Table 1. bringing this to our attention.
2016 Fisher, Kotha, and Lahiri 393

they still continue to matter, as demonstrated by legitimacy challenges for growing ventures over
Chen, Hambrick, & Pollock, 2008) toward tangible time.
performance metrics, such as evidence of finan-
cial returns using accepted accounting practices
IMPLICATIONS OF CHANGING
(Rajgopal, Venkatachalam, & Kotha, 2003). In-
LEGITIMACY CRITERIA
stitutional investment managers seek short-term
financial returns because their performance is Here we build on the analysis provided above
measured via increases in portfolio value gener- to yield novel conceptual insights central to
ated on a quarterly or annual basis. Therefore, they managing legitimacy in new ventures. The
make resource allocation decisions based on short- principal insight derived from our analysis is
term self-interest and risk mitigation approaches. the notion that new ventures face multiple le-
The information reported in S-1 documents, in- gitimacy thresholds through the course of their
cluding measures of past performance and the fi- life cycle. We then identify three key factors that
nancial and market forecasts for a firm, is central in can inhibit or enable entrepreneurs’ efforts to
institutional investors’ assessments (Loughran & cross those thresholds: (1) institutional plural-
McDonald, 2013; Martens et al., 2007). The key ism, (2) venture-identity embeddedness, and (3)
dimensions of the social system governing in- legitimacy buffering.
stitutional investors are reflected in the third
column of Table 1.
Multiple Legitimacy Thresholds
Firms seeking funds in the public markets are
required by the SEC to make public their financial Zimmerman and Zeitz (2002) proposed that there
accomplishments, management’s discussion of exists a “legitimacy threshold” marking a critical
their competitive environment, and risks associ- milestone in a venture’s chances of survival and
ated with the venture (Loughran & McDonald, 2013). sustenance. At levels below this threshold, ven-
The legitimacy assessment criteria of a venture tures face an existential threat arising from the
during this stage center on past and anticipated lack of legitimacy. However, once the threshold is
future financial performance, communicated pri- crossed, legitimacy and the concomitant flow of
marily via S-1 documents. resources significantly increase a venture’s abil-
Once public, the entity is managed by a board of ity to survive. The notion of a threshold represents
directors who is, in turn, legally required to fol- attaining legitimacy as a single, fixed, and stable
low SEC rules and regulations. The legitimacy point independent of the venture’s stage of de-
of a venture as a public entity is evaluated by velopment. It portrays the legitimacy challenge to
its ability to balance the interests of diverse be noteworthy primarily during a venture’s early
stakeholders, including employees, suppliers, stage. Figure 1a shows a graphical representa-
customers, investors, and society as a whole tion of this view.
(Jawahar & McLaughlin, 2001). A corporation’s We suggest that a more nuanced and complete
continuing success depends on management’s understanding of the legitimacy threshold can
ability to create and satisfy the demands of emerge when the heterogeneity in the audiences
multiple stakeholder groups (Freeman, 2010). making legitimacy judgments is recognized.
As Clarkson argues, “The economic and social Since such audiences change systematically
purpose of the corporation is to create and dis- over time and different audiences have different
tribute increased wealth and value to all its institutional conventions, the criteria used to
primary stakeholder groups” (1995: 112). Simi- assess venture legitimacy should also change
larly, Jones and Wicks state that “the interests systematically. Therefore, ventures face multi-
of all (legitimate) stakeholders have intrinsic ple legitimacy thresholds as new criteria are
value” (1999: 207). Thus, if a firm neglects or dis- used to evaluate them.
regards a stakeholder group, it risks losing the A significant factor influencing whether an au-
group’s normative approval and, as a result, its dience judges an entity to be legitimate or not is the
legitimacy can be called into question. The focal audience’s expectation for what that entity should
legitimacy criteria needed are summarized at the look like (Ridgeway & Berger, 1986). The expecta-
bottom of column three of Table 1. tions placed on a venture become increasingly
The discussion so far provides the foundation complex and challenging as it becomes estab-
to predict and explain systematic organizational lished. Since audiences often compare a venture
394 Academy of Management Review July

FIGURE 1
Comparison of Conceptions of Venture Legitimacy over Time

Growth

Legitimacy
level
Threshold

Failure

Time
(a) Prior conception of venture legitimacy over time (Zimmerman & Zeitz, 2002: 427)

Conception Commercialization Growth


(audience: grant (audience: venture (audience: institutional
providers) capitalists and angel investment managers)
investors)

Transition Transition
phase phase
(institutional (institutional
pluralism) pluralism)

Threshold III
Legitimacy
level

Threshold II

Threshold I

Time
(b) Updated conception of venture legitimacy over time

against a cohort of similar organizations in the adapt and change so as to effectively compete for
same life cycle stage, over time the venture is the resources provided by external audiences.
evaluated against more developed, mature, and Vohora, Wright, and Locket described shifts in
established organizations (Boeker & Wiltbank, expectations for firms that move from the con-
2005; Slevin & Covin, 1997). Therefore, the criteria ceptualization stage in a university setting to the
for legitimacy not only differ compared to ventures commercialization stage, in which VCs evaluate
in earlier stages of development but also may be- them with the prospect of providing resources. As
come more stringent as the venture evolves and one of the VC informants in the Vohora et al. study
grows. Such expectations put pressure on firms to reported:
2016 Fisher, Kotha, and Lahiri 395

The fundamental problem is that what universities venture was featured on the front page of the Fi-
have is not what VCs want to receive. Universities nancial Times, which “raised the level of expecta-
have lots of well-developed technologies but with
tions so high that it made us reluctant to release
little proof of concept, no proof of market, and no
commercial management. In general there isn’t the anything that wasn’t earth-shattering.” Monitor110
commercial expertise or resources within univer- therefore delayed the release of new products and,
sities to overcome these deficiencies and develop in so doing, lost its “intimacy with the customer . . .
an opportunity that is fundable (2004: 156). falling into the classic trap of pursuing a ‘science
These sentiments are also echoed in Fischer project,’ not building a commercially salable
and Pollock’s (2004: 464) description of the differing product,” said Ehrenberg (2008).
expectations placed on firms as they transition This example illustrates that despite attaining
from private to public companies. These authors legitimacy in the conception and commerciali-
noted that when firms transform into public entities, zation stage, Monitor110 faltered in the growth
they require more formal governance procedures, stage as the organization was distracted and
encounter different reporting requirements of the confused by the changing expectations from its
SEC, and are faced with increasing demands new audience (the analysts from Wall Street
from investors for short-term performance and firms). This caused it to lose sight of its cus-
tomers’ needs and to adopt strategies that even-
less tolerance of negative press and perfor-
tually caused it to fail.
mance volatility. Additionally, newly public
The above discussion illustrates how the per-
firms face scrutiny from an even more diverse array
ception of increased audience expectations and
of stakeholder groups with differing demands that,
inability to deliver on those expectations can be
at times, can be conflicting. These divergent (and at
a major contributing factor to a venture’s demise.
times increasing) expectations from multiple audi-
Thus, we conclude that a growing venture must
ences are important drivers that cause a venture’s
meet multiple legitimacy thresholds established
identity to become increasingly complex over time,
by different organizational audiences, each of
eventually consisting of “constellations of features
which places increasing expectations and de-
and labels appropriate for different contexts and mands on the venture. Next we identify three key
interactions” as it grows into a mature organization insights that impact entrepreneurs’ efforts to cross
(Gioia et al., 2000: 74). those thresholds.
We argue that the varying expectations from
different audiences evaluating a venture over its Institutional Pluralism
life translate into multiple legitimacy thresholds
for that venture. Figure 1b illustrates our proposed We have previously argued that, over its life
model of multiple legitimacy thresholds over suc- cycle, a venture often needs to satisfy multiple, un-
cessive stages of a venture’s life cycle. related resource providers in order to successfully
An example demonstrating the existence of evolve and grow (Bhide, 2000; Lewis & Churchill,
multiple legitimacy thresholds comes from the 1983). To meet the evolving expectations of different
case of Monitor110, a company focused on pro- resource providers, the entrepreneurial identity of
viding data and information-gathering services. the venture must appeal to the demands of differing
The venture received early acclaim but failed to audiences. However, changing an organization’s
secure continued funding for its operations and identity is a drawn out, challenging, and complex
was forced to shut its doors in July 2008 (Kafka, process (Brown & Starkey, 2000; Gioia & Thomas,
2008). Following the demise of Monitor110, Roger 1996; Nag et al., 2007). Therefore, for a period of time,
Ehrenberg, a cofounder of the company, high- as a venture makes its transition from appealing to
lighted how audience expectations for the com- one type of audience in one socially constructed
pany seemed to change as the venture grew. system of values, beliefs, and norms to the next, it
On his blog (Ehrenberg, 2008) he reflected that will be subject to institutional pluralism:
within the venture they initially described their Institutional pluralism is the situation faced by an
product development philosophy as “release early/ organization that operates within multiple institutional
release often.” However, they became “scared of spheres. If institutions are broadly understood as ‘the
rules of the game’ that direct and circumscribe orga-
looking like idiots in front of major Wall Street and nizational behavior, then the organization confronting
hedge fund clients,” who they perceived had dif- institutional pluralism plays in two or more games at
ferent expectations for the company as it grew. The the same time (Kraatz & Block, 2008).
396 Academy of Management Review July

Confronting and managing institutional pluralism Powell and Sandholtz (2012) provide several
may create significant challenges for entrepreneurs examples of biotechnology entrepreneurs and ven-
as their ventures traverse multiple legitimacy tures facing institutional pluralism as they cross
thresholds. between academia and industry and encounter
Institutional pluralism in growing ventures re- the contradictory expectations of the scientific and
sults from the persistent influence of vestigial business communities. Tom Maniatis, a professor of
institutional conventions from the previous life molecular biology at Harvard and cofounder of the
cycle stage on the identity of a venture and the Genetics Institute, vivdly described the tortuous na-
gradual adoption of institutional conventions sa- ture of the personal conflicts that emerge when ac-
lient to the new stage. This can lead a venture to ademic norms collide with norms of commerce:
portray disparate identity claims in different
[It’s] fascinating to see the effect on the minds of all
parts of its operating environment so as to meet these scientists—the worry about whether you
the demands of different (old and new) audience should dive into the money pile or whether the pile
expectations (Kraatz & Block, 2008). Accordingly, is dirtying everybody. . . . Over the years the sense
ventures may grapple with having to portray dif- of academic purity is something which developed
ferent organizational narratives (Garud et al., out of necessity . . . since there was no money
a sense of saintlihood was required in the situation.
2014; Lounsbury & Glynn, 2001) and management Now it’s not required (Hilts, 1981: A1, cited in Powell
practices (Zott & Huy, 2007) in an attempt to satisfy & Sandholtz, 2012: 105–106).
the pluralistic demands of multiple audiences.
Figure 1b illustrates how a venture transitions Ventures that inappropriately invoke identity
from one stage to the next and depicts the poten- claims of a prior stage for an audience in the next
tial for institutional pluralism that may arise stage can run into difficulties, since new audiences
during such transitions. can ascribe a different meaning to the language and
Operating under conditions of institutional symbols used to garner legitimacy (Kraatz & Block,
pluralism in periods of transition from one venture 2008; Pratt & Foreman, 2000). For example, during
life cycle stage to the next may be challenging and the conception stage, the publication in a scientific
problematic for new ventures, for three reasons. journal of the key scientific breakthrough underly-
First, institutional pluralism makes it difficult for ing a technology commercialized by a start-up is
the individuals within a venture to definitively and likely to be deemed desirable and appropriate by
unambiguously answer the identity-related ques- early-stage resource providers, such as university
tions of “who we are” and “what we do” (Navis & and governmental grant-making agencies. How-
Glynn, 2011). For example, Ravasi and Schultz ever, the VC community, focused on protecting IP
(2006) described how the radio manufacturer B&O and competitive advantage, actively discourages
was induced by competitive threats and environ- such open disclosure (Powell & Sandholtz, 2012). The
mental changes unfolding over its life cycle to trade-offs involved in publishing in scientific jour-
reexamine its identity and reevaluate beliefs nals, when working in a start-up context, are suc-
about what was core and distinctive about the cinctly described by David Jackson, a tenured
organization—a process that ultimately culmi- molecular biologist at the University of Michigan:
nated in a revision of its formal identity claims. It takes a lot of time to publish stuff, and (at Genex)
Second, as the individuals in an organization we were always under enormous time pressure to
make claims to satisfy members of one audience meet various milestones. And there was a concern
group, members from another audience group may about disclosing stuff prematurely, before we’d
really had a chance to capitalize on it (quoted by
be exposed to such claims and apply different, less Powell & Sandholtz, 2012: 109).
favorable subjective values to such claims (Glynn,
2000; Golden-Biddle & Rao, 1997). In other words, The above arguments and examples suggest
efforts to validate one identity may invalidate an- that entrepreneurs face pluralistic demands during
other. Third, a venture may be perceived as in- a transition phase and therefore are particularly
consistent and unreliable as its identity claims vulnerable to having their identity claims and ac-
shift and change under conditions of institutional tions misconstrued by resource providers operat-
pluralism. Organizational actions that appear to ing with divergent sets of institutional conventions
violate prior commitments can have a powerful in different socially constructed systems. This can
delegitimizing effect on the organization (Kraatz & cause the venture to be perceived as illegitimate,
Block, 2008). adversely impacting its prospects for acquiring
2016 Fisher, Kotha, and Lahiri 397

much needed resources and casting it in a negative also translate into personal identity threats for the
light with those that have provided resources in the founder(s) (Cardon, Wincent, Singh, & Drnovsek,
past. Hence, the legitimacy of a venture can be 2009; Fauchart & Gruber, 2011).
threatened in the drawn-out periods of transition Relational and cognitive lock-in can cause en-
from one venture life cycle stage to the next, in trepreneurs to resist changing their venture’s
which a venture must operate under conditions of identity claims and associated operating practices,
institutional pluralism. During these times, entre- narratives, and symbols during the transition pe-
preneurs need to be highly cognizant of which au- riod from one venture life cycle stage to the next.
diences are paying close attention to their identity This resistance exacerbates the cognitive disso-
claims and actions, and they should carefully nance that arises when a new set of legitimacy
consider how different audience groups will in- criteria is promulgated by future resource providers
terpret their actions given their development stage. during the transition phase. Since organizational
members often form a cognitive attachment to the
prevailing organizational identity and internalize
Venture-Identity Embeddedness
the prevailing organizational logic, cognitive dis-
Addressing institutional pluralism during pe- sonance and confusion among members may re-
riods of transition can be challenging. During sult when inconsistencies arise between the new
transition periods, the ambiguities about appropri- and old standards of behavior (Dutton et al., 1994;
ate identity claims and actions for a growing venture Thornton et al., 2012). The greater the degree of re-
can put that venture in a tenuous position. Miller and lational and cognitive lock-in, the greater the degree
Friesen noted that organizations “appear to be bi- of cognitive dissonance faced by members during the
ased in their direction of evolution so that they transition phase. These conditions can hamper and
generally extrapolate past trends” (1980: 592). This slow down decision making within the organization
resistance to change that arises out of an un- (Albert & Whetten, 1985). Additionally, the resulting
willingness to raise questions about an organiza- appearance of a diffused organizational identity can
tion’s identity has been called “organizational make it difficult for audiences to evaluate the ap-
inertia” (Kelly & Amburgey, 1991). Entrenched re- propriateness of the venture as a desirable tar-
lationships, beliefs, norms, values, and attitudes get for resources (Powell & Sandholtz, 2012).
from vestigial audience expectations can slow down Maurer and Ebers (2006) highlighted how such
and sometimes prevent organizations from adapt- embeddedness impacts biotech firms transitioning
ing to the expectations of the next life cycle stage. from the conception to the commercialization stage.
Maurer and Ebers (2006) identified two forces— They found that firms characterized by teams of
relational lock-in and cognitive lock-in—as key strong academic scientists, who greatly bolstered
mechanisms responsible for this inertia. Rela- the legitimacy of a focal start-up during the con-
tional lock-in, on the one hand, refers to the obli- ception stage, often faced greater difficulty in tran-
gations of an actor to others within a specific sitioning to the demands and expectations placed
community, stemming from strong social ties and on their venture in the commercialization stage,
norms of reciprocity (Maurer & Ebers, 2006). as the scientists’ prevailing identities mili-
Gulati, Nohria, and Zaheer (2000) described its tated against the demands and expectations of
double-edged nature, explaining how embedded business-oriented VC audiences.
network ties can provide firms with unparalleled One can also observe examples of venture-
access to information and resources, while also identity embeddedness during a venture’s transi-
potentially locking them into unproductive re- tion from the commercialization to the growth stage
lationships or precluding them from forging ties in a contemporary start-up’s history. The case of
across network boundaries (Baker & Nelson, 2005). Groupon, Inc. helps illustrate our arguments.10
Cognitive lock-in, on the other hand, refers to
constraints on an actor’s motivation, capacity, 10
We recognize that Groupon was not founded in an aca-
and competence to adopt new cognitive schemes, demic setting; therefore, its transition from conceptualization
stemming from a strong shared identity with others to commercialization does not fit perfectly within our frame-
in a particular domain (Maurer & Ebers, 2006). Be- work. However, its transition from commercialization to
growth, as it moved from a private to a public company, was
cause the identity of an entrepreneurial venture is well documented and provides salient illustrations of the
often attached to the identity of its founder(s), concepts discussed and the generalizable nature of our
pressures to change the identity of a venture may arguments.
398 Academy of Management Review July

Launched in 2008, Groupon quickly attained prom- Making the necessary adaptations is likely to
inent start-up status with a private venture valua- be most difficult for ventures that are perceived as
tion running into billions of dollars for multiple highly legitimate by audiences in the prior stage
rounds of VC funding. But a year after its highly of development. Such ventures garner positive
anticipated IPO in 2011, Groupon faced a reversal of feedback (e.g., funding, support, positive media
fortunes: its stock price declined by half, and it was coverage, and accolades) in that stage, reinforc-
forced to issue an embarrassing and damaging ing the notion that the venture is engaged in the
restatement of its financial statements in its S-1 appropriate activities, practices, and relation-
filings (Duryee, 2011). Andrew Mason, Groupon’s ships to make it successful. Such positive feed-
founder and ex CEO, noted that Groupon failed to back from audiences can prompt the individuals
anticipate the changes in audience perception and at the venture’s helm to escalate their commit-
evaluation criteria that accompanied the shift from ment to the entrepreneurial identity embraced by
private to public ownership. The venture’s new it in that stage (Staw, 1981). This commitment
audience emphasized short-term revenues and fi- stems from a connection with what seems to be
nancial results, in contrast to the longer-term focus a successful course of action. In so doing, the
and emphasis on innovation that characterized its people in the venture can become resistant to
prior stages. According to Mason, “The moment changing their course of action (Brockner, 1992),
a company goes public, the conversation shifts from even though the expectations of the audience
how it’s trying to change the world and the product from whom they get key resources have changed.
it’s building to how it’s making money” (Spiers, Those ventures that are not looked on as favorably
2013). by an audience in a prior stage of development
Groupon’s failure to foresee the change in au- will likely be more open to adapting their identity
dience legitimacy criteria led to major chal- claims and associated practices, symbols, and
lenges. In its S-1 document, rather than following narratives to comply with changed audience
SEC guidelines for financial reporting, it used an expectations as they transition to a new stage
“unconventional accounting” metric, ACSOI (ad- of development. Thus, we conclude that higher
justed consolidated segment operating income), levels of legitimacy in a prior life cycle stage can
which Groupon felt better reflected its business lead to higher venture-identity embeddedness,
model. Using the ACSOI metric suggested a net making it difficult to for a venture to adapt to meet
gain in Groupon’s operating income, whereas the legitimacy requirements of the next stage.
the use of SEC metrics would have resulted in Both institutional pluralism and venture-identity
Groupon’s reporting a loss. The public criticism embeddedness serve as key inhibitors when en-
that followed forced Groupon to restate its earn- trepreneurs attempt to traverse multiple legiti-
ings using standard SEC-mandated GAAP ac- macy thresholds that confront growing ventures.
counting practices. Mason explained the debacle In contrast, legitimacy buffering, which we dis-
as follows: cuss next, may operate as a key enabler for such
entrepreneurs.
At the time we were in a different world. We were
the darlings of the tech world. Everything had gone
our way, and we thought, “We’ll put this metric Legitimacy Buffering
[ACSOI] in here because we think it’s helpful.” And
people were like, “We think you put this metric in Legitimacy not only is a way to garner re-
here because you’re evil.” . . . That was us not re- sources but, when accumulated, also serves as an
alizing what we were . . . going public (Spiers, 2013).
important resource in its own right, because it
These examples illustrate that periods of tran- enables a venture to attract other resources, such
sition can blur an organization’s identity, ad- as stakeholders, employees, and financial capital
versely impacting internal decision making as (Garud et al., 2014; Suchman, 1995; Zimmerman &
well as hampering external evaluation. When en- Zeitz, 2002). Also, as a resource, legitimacy is
trepreneurs and internal decision makers identify fungible and can be transferred to other settings
strongly with the institutionalized conventions of with different audiences making legitimacy
an earlier life cycle period, they may find it diffi- evaluations. Suchman described the fungi-
cult to adapt their venture’s identity when those ble nature of legitimacy by pointing out that
conventions—and their associated audience “organizations may stockpile goodwill and sup-
expectations—change. port” such that, over time, “management can
2016 Fisher, Kotha, and Lahiri 399

occasionally deviate from social norms without direction and prospects, prompting one investor to
seriously upsetting the organization’s standing” remark, “The challenge for Facebook executives is
(Ashforth & Gibbs, 1990: 189, as cited by Suchman, to persuade the market that it is not a fad and that
1995: 596). Applying this to the context of new its managers have a blueprint for making money”
ventures, a university spin-off venture that re- (Sengupta, 2012). While these behaviors caused
ceives prestigious grants and is associated with some large resource providers and influential an-
a well-known academic institution during the alysts to call the company’s legitimacy into ques-
conception stage will likely carry this legitimacy tion (Sengupta, 2012), the company still raised $16
over to the commercialization stage, in which it billion from its IPO, and the stock price closed above
will interact with a new audience governed by the opening price.
different institutional norms. In other words, as- This example illustrates a case where even
sets such as positive media attention, supportive though the entrepreneur (here Mark Zuckerberg)
stakeholder relations, and a reputation for ex- flouted norms and expectations of the focal in-
cellence (i.e., technological prowess) achieved in stitutional context (Wall Street analysts), the
one setting can provide a strong foundation for venture was never perceived as illegitimate,
building legitimacy and relationships in a dif- because in its previous stage it established
ferent setting. Past successes may therefore a high level of legitimacy among key organiza-
benefit a venture as it moves forward, even if tional audiences (angel investors, VCs, and fi-
they relate to different audience expectations nancial institutions). Therefore, we assert that
(Merton, 1968). Thus, we propose that when ven- the higher the legitimacy of a venture in its prior
tures are perceived as highly legitimate in one life cycle stage, the greater the legitimacy buffer
setting, audiences will often grant greater al- it inherits to satisfy the legitimacy threshold and
lowance or a buffer to such ventures to deviate successfully transition to the next stage in its life
from the established norms required in the new cycle.
setting. The legitimacy that serves as a buffer for
Facebook, Inc.’s transition from a private to a new venture as it transitions from one life cycle
public entity illustrates this phenomenon vividly. stage to the next may come from a variety of
As Facebook transitioned to a public company different sources. An entrepreneurial venture
(IPO filed in May 2012) and embarked on a road- may build up stocks of legitimacy because of
show to woo analysts and institutional investors, the positive reputation of the people within
Mark Zuckerberg, founder and CEO, ignored and the venture, prior organizational achievements,
even rejected some of the expectations of these and/or the positive reputation of the venture’s
resource providers and influencers in the public resource providers in a prior stage of develop-
markets. Zuckerberg continued to wear a hoodie ment. Navis and Glynn (2011) described how
sweatshirt to important interviews, violating the the legitimacy of an entrepreneurial endeavor
norms and expectations of Wall Street analysts stems from the attributes of a founding team
and prompting one investor to say: and/or from the attributes of the organization the
team has created.
He’s actually showing investors he doesn’t care
that much. . . . I think that’s a mark of immaturity. I A potent example of how an individual may
think that he has to realize he’s bringing investors create stocks of legitimacy for a new venture is
in as a new constituency right now, and I think he’s captured in Michael Lewis’s book The New New
got to show them the respect that they deserve be- Thing, in which he describes how Jim Clarke, the
cause he’s asking them for their money (Gross, fabled Silicon Valley serial entrepreneur, was
2012).
able to generate legitimacy for his next venture,
Moreover, analysts and institutional investors solely on the basis of his reputation:
expect a publicly listed company’s CEO to describe Sand Hill Road was where the V.C.’s clustered to-
the organization’s revenue model and respond gether for safety, like ducks in a park waiting for
openly to questions about revenue prospects and the breadcrumbs to fall. Each time Clark made this
performance. Zuckerberg defied these expectations trip the ducks came out of it worse than the time
by not adequately describing Facebook’s revenue before—the price of the crumbs rose, and they had
to quack louder for them (1999: 101).
model and failing to actively engage with Wall
Street analysts. This forced resource providers Stocks of legitimacy based on organizational
to draw their own conclusions about Facebook’s achievement may be based on prior product
400 Academy of Management Review July

accomplishments or awards (Hallen, 2008; Hallen regarding this quiet period.11 Under the new
& Eisenhardt, 2012). For example, certification guidelines, firms are now permitted to publicly
contests, such as those described by Rao (1994), update their activities via press releases and in-
which tested the relative reliability and speed terviews with media intermediaries. In this rare
of various cars in the early years of the auto- instance the industry norms that surround firm
mobile industry, provided benefits for car man- communications during the quiet period were
ufacturers into the future. Finally, the reputation changed in the aftermath of an IPO.
of existing investors in a venture may also serve Hence, we propose that when ventures are per-
as a buffer, amplifying a venture’s legitimacy in ceived as highly legitimate in one venture life cycle
subsequent life cycle stages. For example, Lee, stage, audiences in the next life cycle stage will
Pollock, and Jin (2011) found that VC reputation grant a buffer to such ventures to deviate from and
in the early rounds of investment (e.g., Se- adapt to institutional conventions pertaining to the
ries A investment) had a significant impact on next life cycle stage. In rare instances where a ven-
the initial market evaluations of that venture ture has very high stocks of legitimacy in a prior life
at IPO. cycle stage, it may use its legitimacy buffer to
The existence of a legitimacy buffer not only challenge the taken-for-granted expectations and
provides a venture with the time and resources to institutional conventions of the new life cycle stage.
adapt its entrepreneurial identity to the expecta- In summary, the core insight from this concep-
tions of a new audience as it transitions from one tual inquiry is that new ventures confront multiple
life cycle stage to the next but also may create an legitimacy thresholds as they grow and develop.
occasion for sensemaking by enabling otherwise As growing ventures confront those multiple
taken-for-granted expectations to be revisited thresholds, the entrepreneurs at their helm en-
and, perhaps, altered (Weick, 1995). Where a ven- counter challenges related to institutional plu-
ture has high legitimacy with one audience and ralism and venture-identity embeddedness that
those stocks of legitimacy are carried over to an- may inhibit the ventures from successfully tra-
other audience, the freedom the venture enjoys versing these legitimacy thresholds during times
with its new audience may prompt it to do things of transition. Conversely, ventures attempting to
differently, which could serve as a signal to the cross multiple legitimacy thresholds may benefit
audience that there is an alternative way to from legitimacy buffering when high stocks of
achieve desired outcomes. legitimacy from a previous life cycle stage carry
For example, Google’s high level of legitimacy over and provide entrepreneurs the time to adapt
at the time of its IPO, because of its success as and the ability to deviate from the established
a VC-backed academic spin-off, enabled it to norms and institutional conventions of the new
overcome a weak IPO market to generate a solid setting. Next we discuss the contributions, impli-
first-day return and an initial market capitaliza- cations, and opportunities that stem from this
tion of $27 billion (Levy, 2014). It did so despite an inquiry.
unproven offering model (a modified “Dutch
auction”) and an ill-timed interview with its
founders in Playboy magazine during the so- DISCUSSION, CONTRIBUTIONS,
called quiet period prior to its IPO. However, its AND IMPLICATIONS
unconventional IPO strategy drew enormous
Discussion and Contributions
criticism at the time (Weinberg, 2004), and its ill-
timed interview drew the attention of financial Based on our synthesis of multiple bodies of
industry regulators. Industry experts concur that literature, we have proposed a more nuanced and
it is highly unlikely a firm lacking Google’s
brand recognition and consumer appeal would 11
Section 5 of the United States Securities Act of 1933 limits
have succeeded under similar circumstances what information a company and related parties can release to
(Hensel, 2005; Levy, 2014). Most interestingly, the general public from the time a company files a registration
Google’s interview with the editors of Playboy statement with the SEC until the agency declares the regis-
triggered a discussion about the norms of company tration statement effective. This statute was enacted to protect
uninformed investors. Previously, because SEC’s guidelines
communications with potential investors during pertaining to IPO regulations were vague, some firms exploited
the quiet period prior to an IPO. In a short time this lack of clarity to market their IPOs excessively, while others
following this interview, the SEC updated the rules did little to share company-related information.
2016 Fisher, Kotha, and Lahiri 401

comprehensive framework of how new ventures of a single threshold put forth by Zimmerman
gain and sustain legitimacy and thereby acquire and Zeitz (2002). Our theoretical logic for multiple
resources. Our central assertion is that the criteria thresholds was relatively straightforward: the
for assessing new venture legitimacy vary across heterogeneity of resource providers making new
different life cycle stages as ventures appeal venture legitimacy judgments at different stages
to resource providers with distinctly different of the organizational life cycle means that differ-
expectations. By relaxing two important as- ent institutional conventions are invoked in as-
sumptions embedded in prior research—(1) that sessing the legitimacy of a venture at different
legitimacy is less of a concern once a new venture stages of its life cycle. Because the criteria used to
becomes established and (2) that resource pro- assess venture legitimacy change systematically
viders are homogeneous in their assessments of with changes in audience, new ventures face
legitimacy—we offer novel insights about how multiple legitimacy thresholds over time. This
new ventures can attain and manage (or lose) le- insight contributes to the literature on new ven-
gitimacy over time as they transition through ture legitimacy by providing a more complex
different life cycle stages. and complete perspective of the legitimacy chal-
The framework proposed enhances our under- lenges confronting entrepreneurial ventures. It
standing of legitimacy, entrepreneurship, and draws particular attention to issues of temporality
organizational identity. We contribute to the le- in neoinstitutional theory by considering how in-
gitimacy literature and entrepreneurship litera- stitutional pressures on an entity change with
ture by explicitly linking legitimacy criteria to time.
systemic changes in audience expectations of Second, as a venture transitions from being
new ventures as they evolve and grow. Prior re- dependent on resource providers with a certain
search at the intersection of entrepreneurship and set of expectations to others with an alternative
institutions (e.g., Hiatt et al., 2009; Sine et al., 2007) expectation of what constitutes a legitimate en-
has provided interesting insights into the link trepreneurial identity, it confronts the challenge
between institutional environments on organiza- of operating under conditions of salient in-
tional start-ups (for a review see Tolbert et al., stitutional pluralism, where it must comply with
2011). Yet research on how a new venture evolves institutional conventions of multiple social sys-
and grows—in particular, as it transitions to dif- tems (Kraatz & Block, 2008: 247). By attempting to
ferent stages of development with different in- project an identity that satisfies the pluralistic
stitutional expectations—is sorely lacking. By demands of multiple audiences, the venture risks
connecting entrepreneurial identity claims with being perceived as illegitimate by these audi-
systemic changes in the audience expectations of ences. This important insight extends the concept
new ventures as they evolve and grow, we ad- of institutional pluralism into the entrepreneur-
dress the calls by institutional theorists to ex- ship literature by highlighting how a growing
plore how assessments of new ventures “differ venture inevitably faces the challenge of having
across different audience contexts” (Navis & Glynn, to meet the expectations of different organiza-
2011: 494). tional audiences as it evolves. Additionally, by
Building on prior research and integrating in- examining the concomitant evolution of organi-
sights from different theoretical perspectives, we zational identity as a function of the organiza-
highlighted that entrepreneurial ventures con- tion’s life cycle stage, our insights use Whetten’s
front multiple legitimacy thresholds as they (2006) pioneering work as a point of departure to
evolve and grow. From this we identified three key shift identity theory’s core frame of reference and
insights related to entrepreneurs’ efforts to cross discourse from the “who” to the “when,” “how,”
those thresholds at different organizational life and “why.”
cycle stages: institutional pluralism, venture- Third, we argued that attaining high levels of
identity embeddedness, and legitimacy buffer- legitimacy is not without drawbacks. Those ven-
ing. These insights advance our understanding tures with the highest levels of legitimacy in one
of identity-claiming activity and legitimacy man- stage of their life cycle face the most significant
agement in new ventures as they transition through challenges related to venture-identity embedd-
different stages of their life cycles. edness as they transition to the next stage, owing
First, our core assertion that new ventures face to cognitive and relational lock-in stemming from
multiple legitimacy thresholds extends the notion perceived success in their current environment
402 Academy of Management Review July

(Baker & Nelson, 2005; Maurer & Ebers, 2006). Such managers to consider the expectations of hetero-
lock-in constrains their ability to adapt to differ- geneous organizational audiences and the asso-
ing audience expectations, because the people in ciated challenges of changing their ventures’
an organization may identify more strongly with identities and practices to meet these changing
its historic identity and be less willing and eager expectations.
to adapt their identity to meet changing expecta- These arguments are broadly consistent with
tions. Highlighting the barriers that entrepre- past research highlighting the relevance of rec-
neurs and ventures experience when required to ognizing organizational legitimacy challenges in
make alternative identity claims contributes to new ventures through an industry evolution lens.
the literature on organizational identity and new Aldrich and Fiol (1994) described how the legiti-
market development (Navis & Glynn, 2010; Wry macy strategies of new ventures change as
et al., 2011) in that it not only suggests the need an industry develops. We complement this per-
for identity adaptation but also enumerates the spective by examining organizational legiti-
mechanisms that can make this difficult. macy challenges in new ventures through an
Fourth, we proposed the concept of legitimacy organizational life cycle lens, thereby recogniz-
buffering: the notion that entrepreneurial ventures ing that it is not only industry evolution but also
build up “stocks” of legitimacy in one institutional organizational evolution that impacts legiti-
setting and so, when transitioning to another, re- macy challenges for entrepreneurs and man-
ceive greater leeway to comply with the relevant agers. In the same way that Aldrich and Fiol
expectations of the new setting. Therefore, legiti- spurred further research into the link between
macy garnered during an earlier stage does not industry evolution and organizational legiti-
necessarily become devalued as a venture transi- macy (e.g., Navis & Glynn, 2010), we hope that the
tions to a new institutional audience; rather, past model proposed here will spur further research
successes benefit a venture as it moves forward, into the link between organizational life cycles
even if they relate to different institutional expec- and organizational legitimacy management.
tations (Merton, 1968). The notion of legitimacy
buffering helps explain how new venture legiti-
Implications
mation can be path dependent even when different
audiences use distinctive legitimacy criteria. It The conceptual model we propose has important
also illustrates how legitimacy garnered in one implications for researchers and entrepreneurs. It
stage creates an occasion for sensemaking by en- provides a broad roadmap for entrepreneurs to
abling otherwise taken-for-granted expectations understand how and why their ventures may be
to be revisited and perhaps altered (Weick, 1995). assessed according to different criteria as they
These theoretical assertions—the core asser- transition through different stages. In particular,
tion pertaining to multiple legitimacy thresholds our model highlights how, over time, legitimacy
and the other insights related to institutional plu- evaluation criteria evolve from primarily symbolic
ralism, venture-identity embeddedness, and legit- parameters focused on the founding team to ob-
imacy buffering—individually and in combination jective accounting metrics focused on the organi-
provide a novel, unique, and comprehensive per- zation. Further, our model provides a basis for
spective on legitimacy attainment and manage- understanding how a venture’s approach to legit-
ment in new ventures. Together, they suggest that imacy acquisition and its entrepreneurial identity
legitimacy attainment early in a venture’s life cycle must adapt to match audience expectations cor-
does not necessarily ensure its continuance over responding to its current life cycle stage. As such,
time. They highlight the challenges associated entrepreneurs should recognize that a venture’s
with legitimacy attainment and management that identity must evolve over time; they should be
occur over a venture’s life cycle. Further, these prepared to layer on additional identity elements
theoretical assertions recognize that many of the while striving to retain valuable and important
challenges associated with legitimacy attainment elements of the current identity. Through this pro-
and management faced by ventures occur during cess an organization’s identity may come to consist
different life cycle stages. They identify the mech- of multidimensional “constellations of features
anisms that entrepreneurs can use to manage and labels appropriate for different contexts and
legitimacy in order to ensure continued access interactions” (Gioia et al., 2000: 74). Balancing the
to resources. They also alert entrepreneurs and paradoxical demands of various audiences and
2016 Fisher, Kotha, and Lahiri 403

expectations can be challenging yet critical for the stringent expectations placed on a venture in
growth and continued success. Our proposed transition, while venture-identity embeddedness
framework suggests ways in which entrepreneurs suggests that such ventures may struggle to con-
may adapt the venture’s entrepreneurial identity to form to the legitimacy criteria of new audience
anticipate and respond to legitimacy challenges expectations because they fail to perceive the need
so as to access much needed resources as the for change. This raises the question of when one
venture evolves. may overpower the other. Future research should
The conceptual model we propose has impor- build a deeper understanding of when each force
tant implications for researchers. It highlights the dominates and how they interact. In addition, we
importance of studying legitimacy management anticipate that there are a variety of opportunities
in entrepreneurial ventures. Scholars studying le- for additional research exploring audience re-
gitimacy in entrepreneurial ventures have tended action to identity claim shifts to explicate how
to focus on legitimacy attainment (e.g., Delmar & barriers differ for ventures in markets with strong
Shane, 2004; Martens et al., 2007; Navis & Glynn, collective identities—such as grass fed beef and
2011; Sine et al., 2007; Zimmerman & Zeitz, 2002; French nouvelle cuisine (Rao et al., 2003; Weber,
Zott & Huy, 2007) and the importance of legiti- Heinze, & DeSoucey, 2008)—compared to those
macy maintenance in established organizations markets with indistinct collective identities.
(e.g., Elsbach, 1994; Jonsson et al., 2009; Suchman, Our work complements the stream of research
1995). In contrast, the ideas here show that entre- exploring the relationship between the coexistence
preneurial ventures not only have to attain legiti- of multiple institutional demands on organizations
macy but also have to actively manage it to grow and the concomitant sensemaking processes and
and get established (Garud et al., 2014). shifts in an organization’s identity (e.g., Battilana &
The conceptual model we propose offers prom- Dorado, 2010; Lok, 2010; Meyer & Hammerschmid,
ising avenues for future research. Researchers can 2006; Pache & Santos, 2010; Rao et al., 2003). While
undertake in-depth, qualitative analysis of ven- hybridization is often a viable option for organiza-
tures transitioning through stages of the organiza- tions that are confronted with such a challenge
tional life cycle. Similar to the approach Maurer and (Battilana & Dorado, 2010; Lok, 2010), we suspect
Ebers (2006) took to assess social capital dynamics that in conditions such as the ones new ventures
through a qualitative analysis of biotechnology face during transition phases in their life cycle,
firms, researchers can use the proposed theoretical a speedy resolution of ambiguity by anticipating
framework to unpack and analyze legitimacy tran- and meeting expectations of the audience in the
sitions in order to highlight the microfoundations of next stage may yield superior outcomes. We thus
new venture legitimation during transitions. reiterate the call by Greenwood, Raynard, Kodeih,
The shift from symbolic to tangible sources of Micelotta, and Lounsbury (2011) for greater empiri-
legitimacy for new ventures, resulting from the cal attention to how organizations, particularly
uncertainty reduction that occurs as a venture new ventures, respond to such complex institu-
develops, is an issue that could be elaborated tional environments, and how this impacts ven-
on in future research. We make reference to this tures’ ability to become established. In this vein, it
shift in the discussion of venture evaluation in the may be worth examining the contingencies gov-
different stages of venture development, but we erning the choice of strategies for dealing with in-
do not delve into the implications of this shift for stitutional pluralism, such as decoupling (Fiss &
entrepreneurs, managers, or resource providers. Zajac, 2006), hybridization (Battilana & Dorado, 2010),
A deeper exploration of this shift is a promising or elimination of old identities (Kraatz & Block, 2008).
way to further utilize a longitudinal perspective of The insights in this article provide an inter-
entrepreneurial ventures to generate meaningful esting new theoretical perspective on research
conceptual and practical insights. into founder-CEO succession in entrepreneurial
One interesting point of theoretical and empir- ventures. Prior literature on founder-CEO re-
ical focus is the tension between venture-identity placement has tended to focus on managerial
embeddedness and legitimacy buffering. Both skills (Certo, Covin, Daily, & Dalton, 2001), power
may be powerful forces behind highly legitimate, and influence (Boeker & Karichalil, 2002), and
growing ventures, yet they function in opposing uncertainty resolution (Wasserman, 2003) as the-
directions. Legitimacy buffering provides a means oretical explanations for CEO replacement.
for highly legitimate ventures to escape some of Wasserman’s inductive research in this domain
404 Academy of Management Review July

highlighted two central intertemporal events that grow while others are resource starved. The core
may affect founder-CEO succession: “the com- assertion from this conceptual analysis is that
pletion of product development and the raising of entrepreneurial ventures confront multiple legit-
each round of financing from outside investors” imacy thresholds as they evolve and grow. Hence,
(2003: 149). The theoretical explanation we pro- to acquire resources, entrepreneurs must adapt
pose would suggest that these intertemporal their venture’s entrepreneurial identity to appeal
events propel a venture into a new developmental to different audiences, with different expectations,
phase, one that needs to satisfy the expectations at different stages of its life cycle. By presenting
of a new audience. In this process a venture can a framework for how legitimacy criteria and the
encounter challenges related to venture-identity associated entrepreneurial identity demands placed
embeddedness. Such challenges relate to the link- on a venture change over the life cycle of a venture,
age between the venture’s identity and that of its we hope to stimulate further inquiry into the dy-
founder-CEO. Replacing a founder-CEO is one ap- namic interactions among entrepreneurial action,
proach to overcoming such challenges. We believe institutional environments, and new venture re-
that this legitimacy and identity-based explanation source acquisition.
of founder-CEO succession complements existing
explanations of the phenomenon and thereby en-
REFERENCES
hances this stream of research.
One purposeful limitation of this article is that it Albert, S., & Whetten, D. A. 1985. Organizational identity. Re-
search in Organizational Behavior, 7: 263–295.
focuses on technology ventures seeking to es-
tablish legitimacy in order to attract financial Aldrich, H. E., & Fiol, C. M. 1994. Fools rush in? The institutional
resources. We recognize that the domain of en- context of industry creation. Academy of Management
Review, 19: 645–670.
trepreneurship has a broader scope than just
technology ventures and that legitimacy serves Amburgey, T. L., Kelly, D., & Barnett, W. P. 1990. Resetting the
clock: The dynamics of organizational change and failure.
a purpose broader than just attaining financial Paper presented at annual meeting of the Academy of
resources. If the conceptual ideas presented here Management, San Francisco.
are applied to different types of ventures (e.g., Anderson, C. R., & Zeithaml, C. P. 1984. Stage of the product
social ventures, family businesses, or corporate life cycle, business strategy, and business performance.
ventures), then different organizational audi- Academy of Management Journal, 27: 5–24.
ences with different expectations (e.g., social ex- Anderson, N. H. 1981. Foundations of information integration
pectations, relational expectations, or integration theory. New York: Academic Press.
expectations) would likely drive judgments of Ashforth, B. E., & Gibbs, B. W. 1990. The double-edge of orga-
legitimacy. Yet such ventures may still undergo nizational legitimation. Organization Science, 1: 177–194.
similar transitions as those described here; Ashforth, B. E., & Mael, F. 1989. Social identity theory and the
therefore, the concepts of legitimacy thresholds, organization. Academy of Management Review, 14:
institutional pluralism, venture-identity embed- 20–39.
dedness, and legitimacy buffering would likely be Baker, T., & Nelson, R. E. 2005. Creating something from nothing:
relevant. Applying the conceptual model to differ- Resource construction through entrepreneurial bricolage.
ent types of ventures offers an interesting oppor- Administrative Science Quarterly, 50: 329–366.
tunity for extension, generalization, and refinement Battilana, J., & Dorado, S. 2010. Building sustainable hybrid
of the ideas outlined. organizations: The case of commercial microfinance
organizations. Academy of Management Journal, 53:
1419–1440.
CONCLUSION Beckman, C., Eisenhardt, K., Kotha, S., Meyer, A., & Rajagopalan,
N. 2012. Technology entrepreneurship. Strategic Entrepre-
Based on the accepted premise and evidence neurship Journal, 6(2): 89–93.
that legitimacy judgments are central to resource
Berkery, D. 2007. Raising venture capital for the serious entre-
acquisition for new ventures, we theorized a shift preneur. New York: McGraw-Hill.
in legitimacy criteria used to evaluate new tech-
Bhide, A. 2000. The origin and evolution of new businesses.
nology ventures over different stages of their or- New York: Oxford University Press.
ganizational life cycle. We posited that a nuanced
Bitektine, A. 2011. Toward a theory of social judgments of
understanding of new venture legitimacy judg- organizations: The case of legitimacy, reputation,
ments provides the basis for understanding why and status. Academy of Management Review, 36:
some ventures acquire resources to survive and 151–179.
2016 Fisher, Kotha, and Lahiri 405

Blank, S. 2013. Why the lean start-up changes everything. Denis, D. J. 2004. Entrepreneurial finance: An overview of the issues
Harvard Business Review, 91(5): 63–72. and evidence. Journal of Corporate Finance, 10: 301–326.
Boeker, W., & Karichalil, R. 2002. Entrepreneurial transitions: Dodge, H. R., Fullerton, S., & Robbins, J. E. 1994. Stage of the
Factors influencing founder departure. Academy of Man- organizational life cycle and competition as mediators of
agement Journal, 45: 818–826. problem perception for small businesses. Strategic Man-
Boeker, W., & Wiltbank, R. 2005. New venture evolution and agement Journal, 15: 121–134.
managerial capabilities. Organization Science, 16: 123– Dodge, H. R., & Robbins, J. E. 1992. An empirical investigation of
133. the organizational life cycle model for small business
Branscomb, L., Morse, K., & Roberts, M. 2000. Managing tech- development and survival. Journal of Small Business
nical risk. Report No. NIST GCR 00-797. Washington, DC: Management, 30(1): 27–37.
U.S. Department of Commerce. Dosi, G. 1982. Technological paradigms and technological tra-
Branscomb, L. M., & Auerswald, P. E. 2002. Between inven- jectories: A suggested interpretation of the determinants
tion and innovation: An analysis of early stage techni- and directions of technical change. Research Policy, 11:
cal development. Washington, DC: National Institute 147–162.
of Standards and Technology, U.S. Department of Dunn, M. B., & Jones, C. 2010. Institutional logics and in-
Commerce. stitutional pluralism: The contestation of care and science
Brockner, J. 1992. The escalation of commitment to a failing logics in medical education, 1967–2005. Administrative
course of action: Toward theoretical progress. Academy Science Quarterly, 55: 114–149.
of Management Review, 17: 39–61. Duryee, T. 2011. Groupon stock now half off. All Things D,
Brown, A. D., & Starkey, K. 2000. Organizational identity and November 28: http://allthingsd.com/20111128/groupon-stock-
learning: A psychodynamic perspective. Academy of now-half-off-whats-the-deal/.
Management Review, 25: 102–120. Dutton, J. E., & Dukerich, J. M. 1991. Keeping an eye on the
Cardon, M. S., Wincent, J., Singh, J., & Drnovsek, M. 2009. The mirror: Image and identity in organizational adaptation.
nature and experience of entrepreneurial passion. Acad- Academy of Management Journal, 34: 517–554.
emy of Management Review, 34: 511-532. Dutton, J. E., Dukerich, J. M., & Harquail, C. V. 1994. Organiza-
Carroll, G. R., & Swaminathan, A. 2000. Why the microbrewery tional images and member identification. Administrative
movement? Organizational dynamics of resource parti- Science Quarterly, 39: 239–263.
tioning in the US brewing industry. American Journal of Ehrenberg, R. 2008. Monitor110: A post mortem. Information
Sociology, 106: 715–762. Arbitrage, July 18: http://informationarbitrage.com/post/
Certo, S. T., Covin, J. G., Daily, C. M., & Dalton, D. R. 2001. 698402433/monitor110-a-post-mortem.
Wealth and the effects of founder management among Elsbach, K. D. 1994. Managing organizational legitimacy in
IPO-stage new ventures. Strategic Management Journal, the California cattle industry: The construction and ef-
22: 641–658. fectiveness of verbal accounts. Administrative Science
Chandler, A. D. 1962. Strategy and structure: Chapters in the Quarterly, 39: 57–88.
history of the American enterprise. Cambridge, MA: Mas- Elston, J. A., & Audretsch, D. B. 2011. Financing the entrepre-
sachusetts Institute of Technology. neurial decision: An empirical approach using experi-
Chen, G., Hambrick, D. C., & Pollock, T. G. 2008. Puttin’on mental data on risk attitudes. Small Business Economics,
the Ritz: Pre-IPO enlistment of prestigious affiliates as 36: 209–222.
deadline-induced remediation. Academy of Management Fauchart, E., & Gruber, M. 2011. Darwinians, communitar-
Journal, 51: 954–975. ians, and missionaries: The role of founder identity in
Clarkson, M. E. 1995. A stakeholder framework for analyzing entrepreneurship. Academy of Management Journal, 54:
and evaluating corporate social performance. Academy 935–957.
of Management Review, 20: 92–117. Fini, R., & Lacetera, N. 2010. Different yokes for different folks:
Colyvas, J. A., & Powell, W. W. 2007. From vulnerable to ven- Individual preferences, institutional logics, and the
erated: The institutionalization of academic entrepre- commercialization of academic research. Advances in
neurship in the life sciences. Research in the Sociology the Study of Entrepreneurship, Innovation & Economic
of Organizations, 25: 219–259. Growth, 21: 1–25.
Corley, K. G., & Gioia, D. A. 2004. Identity ambiguity and Fischer, H. M., & Pollock, T. G. 2004. Effects of social capital and
change in the wake of a corporate spin-off. Adminis- power on surviving transformational change: The case
trative Science Quarterly, 49: 173–208. of initial public offerings. Academy of Management Jour-
nal, 47: 463–481.
Corley, K. G., Harquail, C. V., Pratt, M. G., Glynn, M. A., Fiol,
C. M., & Hatch, M. J. 2006. Guiding organizational identity Fisher, G. 2012. Effectuation, causation, and bricolage: A be-
through aged adolescence. Journal of Management In- havioral comparison of emerging theories in entrepre-
quiry, 15: 85–99. neurship research. Entrepreneurship Theory and Practice,
36: 1019–1051.
Delmar, F., & Shane, S. 2004. Legitimating first: Organizing
activities and the survival of new ventures. Journal of Fiske, S., & Taylor, S. 1991. Social cognition (2nd ed.).
Business Venturing, 19: 385–410. New York: McGraw-Hill.
406 Academy of Management Review July

Fiss, P. C., & Zajac, E. J. 2006. The symbolic management of Hall, J., & Hofer, C. W. 1993. Venture capitalists’ decision cri-
strategic change: Sensegiving via framing and decou- teria in new venture evaluation. Journal of Business
pling. Academy of Management Journal, 49: 1173–1193. Venturing, 8: 25–42.
Freeman, R. E. 2010. Strategic management: A stakeholder Hallen, B. L. 2008. The causes and consequences of the initial
approach. Cambridge: Cambridge University Press. network positions of new organizations: From whom do
Gaibraith, J. 1982. The stages of growth. Journal of Business entrepreneurs receive investments? Administrative Sci-
Strategy, 3(1): 70–79. ence Quarterly, 53: 685–718.

Garud, R., Schildt, H. A., & Lant, T. K. 2014. Entrepreneurial Hallen, B. L., & Eisenhardt, K. M. 2012. Catalyzing strategies
storytelling, future expectations, and the paradox of le- and efficient tie formation: How entrepreneurial firms
gitimacy. Organization Science, 25: 1479–1492. obtain investment ties. Academy of Management Journal,
55: 35–70.
Gioia, D. A. 1998. From individual to organizational identity. In
D. A. Whetten & P. C. Godfrey (Eds.), Identity in organiza- Hanlon, D., & Saunders, C. 2007. Marshaling resources to form
tions: Building theory through conversations, vol. 11: 17–31. small new ventures: Toward a more holistic understand-
Thousand Oaks, CA: Sage. ing of entrepreneurial support. Entrepreneurship Theory
and Practice, 31: 619–641.
Gioia, D. A., Schultz, M., & Corley, K. G. 2000. Organizational
identity, image, and adaptive instability. Academy of Hannan, M. T., Baron, J. N., Hsu, G., & Koçak, Ö. 2006. Organi-
Management Review, 25: 63–81. zational identities and the hazard of change. Industrial
and Corporate Change, 15: 755–784.
Gioia, D. A., & Thomas, J. B. 1996. Identity, image, and issue
interpretation: Sensemaking during strategic change in Hensel, N. 2005. Are Dutch auctions right for your IPO?
academia. Administrative Science Quarterly, 41: 370–403. HBS Working Knowledge, April 11: http://hbswk.hbs.edu/
archive/4747.html.
Glynn, M. A. 2000. When cymbals become symbols: Conflict
over organizational identity within a symphony orchestra. Hiatt, S. R., Sine, W. D., & Tolbert, P. S. 2009. From Pabst to Pepsi:
Organization Science, 11: 285–298. The deinstitutionalization of social practices and the cre-
ation of entrepreneurial opportunities. Administrative Sci-
Glynn, M. A. 2008. Beyond constraint: How institutions en-
ence Quarterly, 54: 635–667.
able identities. In R. Greenwood, C. Oliver, K. Sahlin-
Andersson, & R. Suddaby (Eds.), The Sage handbook of Hilts, P. J. 1981. The gold rush of companies into bio-
organizational institutionalism: 413–430. Thousand Oaks, technology is waning. Washington Post, November 3:
CA: Sage. https://www.washingtonpost.com/archive/politics/1981/11/03/
Glynn, M. A., & Marquis, C. 2004. When good names go bad: the-gold-rush-of-companies-into-biotechnology-is-waning/
Symbolic illegitimacy in organizations. Research in the cfa840aa-e73f-4fa8-8216-38f90e9a4380/.
Sociology of Organizations, 22: 147–170. Hite, J. M., & Hesterly, W. S. 2001. The evolution of firm networks:
Golden-Biddle, K., & Rao, H. 1997. Breaches in the boardroom: From emergence to early growth of the firm. Strategic
Organizational identity and conflicts of commitment in Management Journal, 22: 275–286.
a nonprofit organization. Organization Science, 8: 593–611. Hsu, D. H. 2007. Experienced entrepreneurial founders, orga-
Gompers, P. A. 1995. Optimal investment, monitoring, and the stag- nizational capital, and venture capital funding. Research
ing of venture capital. Journal of Finance, 50: 1461–1489. Policy, 36: 722–741.

Granovetter, M. 1978. Threshold models of collective behavior. Hsu, D. H. 2008. Technology-based entrepreneurship. In S. Shane
American Journal of Sociology, 83: 1420–1443. (Ed.), Handbook of technology and innovation manage-
ment: 367–388. West Sussex, UK: Wiley.
Granovetter, M. 1992. Economic institutions as social con-
structions: A framework for analysis. Acta Sociologica, Hughes, S. S. 2011. Genentech: The beginnings of biotech.
35: 3–11. Chicago: University of Chicago Press.

Gray, B., & Ariss, S. S. 1985. Politics and strategic change across Jawahar, I., & McLaughlin, G. L. 2001. Toward a descriptive
organizational life cycles. Academy of Management Re- stakeholder theory: An organizational life cycle approach.
view, 10: 707–723. Academy of Management Review, 26: 397–414.
Greenwood, R., Raynard, M., Kodeih, F., Micelotta, E. R., & Jones, T. M., & Wicks, A. C. 1999. Convergent stakeholder
Lounsbury, M. 2011. Institutional complexity and orga- theory. Academy of Management Review, 24: 206–221.
nizational responses. Academy of Management Annals, Jonsson, S., Greve, H. R., & Fujiwara-Greve, T. 2009. Unde-
5: 317–371. served loss: The spread of legitimacy loss to innocent or-
Gross, D. 2012. Zuckerberg’s hoodie rankles Wall Street. ganizations in response to reported corporate deviance.
CNN Money, May 9: http://www.cnn.com/2012/05/09/ Administrative Science Quarterly, 54: 195–228.
tech/social-media/zuckerberg-hoodie-wall-street/. Kafka, P. 2008. Monitor 110 shuttered. Business Insider,
Gulati, R., Nohria, N., & Zaheer, A. 2000. Strategic networks. July 16: http://www.businessinsider.com/2008/7/monitor-
Strategic Management Journal, 21: 203–215. 110-shuttered.
Haeussler, C., & Colyvas, J. A. 2011. Breaking the ivory tower: Katz, J., & Gartner, W. B. 1988. Properties of emerging or-
Academic entrepreneurship in the life sciences in UK and ganizations. Academy of Management Review, 13:
Germany. Research Policy, 40: 41–54. 429–441.
2016 Fisher, Kotha, and Lahiri 407

Kazanjian, R. K. 1988. Relation of dominant problems to stages Maurer, I., & Ebers, M. 2006. Dynamics of social capital and
of growth in technology-based new ventures. Academy of their performance implications: Lessons from bio-
Management Journal, 31: 257–279. technology start-ups. Administrative Science Quarterly,
Kelly, D., & Amburgey, T. L. 1991. Organizational inertia and 51: 262–292.
momentum: A dynamic model of strategic change. Acad- Merton, R. K. 1968. Social theory and social structure. New York:
emy of Management Journal, 34: 591–612. Simon & Schuster.
Kennedy, M. T. 2008. Getting counted: Markets, media, and Meyer, R. E., & Hammerschmid, G. 2006. Changing institutional
reality. American Sociological Review, 73: 270–295. logics and executive identities: A managerial challenge to
Kennedy, M. T., Lo, J. Y.-C., & Lounsbury, M. 2010. Category public administration in Austria. American Behavioral
currency: The changing value of conformity as a function Scientist, 49: 1000–1014.
of ongoing meaning construction. Research in the Sociol- Miller, D., & Friesen, P. H. 1980. Momentum and revolution in
ogy of Organizations, 31: 369–397. organizational adaptation. Academy of Management
Kraatz, M. S., & Block, E. S. 2008. Organizational implications Journal, 23: 591–614.
of institutional pluralism. In R. Greenwood, C. Oliver, Milliman, J., Von Glinow, M. A., & Nathan, M. 1991. Organiza-
K. Sahlin-Andersson, & R. Suddaby (Eds.), The Sage tional life cycles and strategic international human
handbook of organizational institutionalism: 243–275. resource management in multinational companies: Im-
Thousand Oaks, CA: Sage. plications for congruence theory. Academy of Manage-
Kraatz, M. S., & Zajac, E. J. 1996. Exploring the limits of the new ment Review, 16: 318–339.
institutionalism: The causes and consequences of illegit- Mintzberg, H. 1984. Power and organization life cycles. Acad-
imate organizational change. American Sociological Re- emy of Management Review, 9: 207–224.
view, 61: 812–836.
Murray, F. 2010. The oncomouse that roared: Hybrid exchange
Lee, P. M., Pollock, T. G., & Jin, K. 2011. The contingent value of strategies as a source of distinction at the boundary of
venture capitalist reputation. Strategic Organization, 9: overlapping institutions. American Journal of Sociology,
33–69. 116: 341–388.
Levy, A. 2014. Google shares took off, but the auction didn’t. Nag, R., Corley, K. G., & Gioia, D. A. 2007. The intersection
CNBC, August 19: http://www.cnbc.com/id/101912149. of organizational identity, knowledge, and practice:
Lewis, M. 1999. The new new thing: A Silicon Valley story. New Attempting strategic change via knowledge grafting.
York: Norton. Academy of Management Journal, 50: 821–847.
Lewis, V. L., & Churchill, N. C. 1983. The five stages of small Navis, C., & Glynn, M. A. 2010. How new market categories
business growth. Harvard Business Review, 61(3): emerge: Temporal dynamics of legitimacy, identity, and
30–50. entrepreneurship in satellite radio, 1990–2005. Adminis-
trative Science Quarterly, 55: 439–471.
Libaers, D., Hicks, D., & Porter, A. L. 2010. A taxonomy of
small firm technology commercialization. Industrial Navis, C., & Glynn, M. A. 2011. Legitimate distinctiveness and
and Corporate Change, Advance access available the entrepreneurial identity: Influence on investor judg-
at http://icc.oxfordjournals.org/citmgr?gca5indcor% ments of new venture plausibility. Academy of Manage-
3Bdtq039v1. ment Review, 36: 479–499.
Lok, J. 2010. Institutional logics as identity projects. Academy Olson, M., & Olson, M. 2009. The logic of collective action:
of Management Journal, 53: 1305–1335. Public goods and the theory of groups. Cambridge, MA:
Harvard University Press.
Loughran, T., & McDonald, B. 2013. IPO first-day returns,
offer price revisions, volatility, and form S-1 language. Pache, A.-C., & Santos, F. 2010. When worlds collide: The in-
Journal of Financial Economics, 109: 307–326. ternal dynamics of organizational responses to conflicting
institutional demands. Academy of Management Review,
Lounsbury, M. 2007. A tale of two cities: Competing logics
35: 455–476.
and practice variation in the professionalizing of mu-
tual funds. Academy of Management Journal, 50: Perkmann, M., King, Z., & Pavelin, S. 2011. Engaging excel-
289–307. lence? Effects of faculty quality on university engagement
with industry. Research Policy, 40: 539–552.
Lounsbury, M., & Glynn, M. A. 2001. Cultural entrepreneurship:
Stories, legitimacy, and the acquisition of resources. Pollock, T. G., & Rindova, V. P. 2003. Media legitimation effects
Strategic Management Journal, 22: 545–564. in the market for initial public offerings. Academy of
Management Journal, 46: 631–642.
MacMillan, I. C., Siegel, R., & Narasimha, P. S. 1986. Criteria
used by venture capitalists to evaluate new venture Porac, J. F., Wade, J. B., & Pollock, T. G. 1999. Industry cate-
proposals. Journal of Business Venturing, 1: 119–128. gories and the politics of the comparable firm in CEO
Martens, M. L., Jennings, J. E., & Jennings, P. D. 2007. Do compensation. Administrative Science Quarterly, 44:
the stories they tell get them the money they need? 112–144.
The role of entrepreneurial narratives in resource ac- Powell, W. W., & Sandholtz, K. W. 2012. Amphibious entrepre-
quisition. Academy of Management Journal, 50: 1107– neurs and the emergence of organizational forms. Strate-
1132. gic Entrepreneurship Journal, 6: 94–115.
408 Academy of Management Review July

Pratt, M. G., & Foreman, P. O. 2000. Classifying managerial Slevin, D. P., & Covin, J. G. 1997. Strategy formation patterns,
responses to multiple organizational identities. Academy performance, and the significance of context. Journal of
of Management Review, 25: 18–42. Management, 23: 189–209.
Quinn, R. E., & Cameron, K. 1983. Organizational life cycles and Smith, K. G., Mitchell, T. R., & Summer, C. E. 1985. Top level man-
shifting criteria of effectiveness: Some preliminary evi- agement priorities in different stages of the organizational
dence. Management Science, 29: 33–51. life cycle. Academy of Management Journal, 28: 799–820.
Rajgopal, S., Venkatachalam, M., & Kotha, S. 2003. The value Spiers, E. 2013. Andrew Mason on how to deal: From founder
relevance of network advantages: The case of e-commerce to ex-Groupon CEO. Fast Company, April 15: http://
firms. Journal of Accounting Research, 41: 135–162. www.fastcompany.com/3007842/andrew-mason-how-deal-
founder-ex-groupon-ceo.
Rao, H. 1994. The social construction of reputation: Certifica-
tion contests, legitimation, and the survival of organiza- Starbuck, W. H., & Milliken, F. J. 1988. Challenger: Fine-tuning
tions in the American automobile industry: 1895–1912. the odds until something breaks. Journal of Management
Strategic Management Journal, 15(Supplement 1): 29–44. Studies, 25: 319–340.
Rao, H., Monin, P., & Durand, R. 2003. Institutional change in Staw, B. M. 1981. The escalation of commitment to a course of
Toque Ville: Nouvelle cuisine as an identity movement action. Academy of Management Review, 6: 577–587.
in French gastronomy. American Journal of Sociology, Stimpert, J. L., Gustafson, L. T., & Sarason, Y. 1998. Organiza-
108: 795–843. tional identity within the strategic management conver-
Ravasi, D., & Schultz, M. 2006. Responding to organizational sation: Contributions and assumptions. In D. A. Whetten
identity threats: Exploring the role of organizational cul- & P. C. Godfrey (Eds.), Identity in organizations: Building
ture. Academy of Management Journal, 49: 433–458. theory through conversations: 83–99. Thousand Oaks, CA:
Sage.
Reese, P. R., & Aldrich, H. E. 1995. Entrepreneurial networks
and business performance. In S. Birley & I. MacMillan Stinchcombe, A. 1965. Social structure and organizations. In
(Eds), International entrepreneurship: 124-144. London: J. G. March (Ed.), Handbook of organizations: 142–193.
Routledge. Chicago: Rand McNally.
Reynolds, P., & Miller, B. 1992. New firm gestation: Conception, Stuart, T. E., Hoang, H., & Hybels, R. C. 1999. Interorganizational
birth, and implications for research. Journal of Business endorsements and the performance of entrepreneurial
Venturing, 7: 405–417. ventures. Administrative Science Quarterly, 44: 315–349.
Ridgeway, C. L., & Berger, J. 1986. Expectations, legitimation, Suchman, M. C. 1995. Managing legitimacy: Strategic and in-
and dominance behavior in task groups. American So- stitutional approaches. Academy of Management Review,
ciological Review, 51: 603–617. 20: 571–610.

Ries, E. 2011. The lean startup: How today’s entrepreneurs use Thornton, P. H., Ocasio, W., & Lounsbury, M. 2012. The in-
continuous innovation to create radically successful busi- stitutional logics perspective: A new approach to culture,
nesses. New York: Crown Business. structure, and process. Oxford: Oxford University Press.

Roberts, M. J., & Barley, L. 2004. How venture capitalists eval- Tolbert, P. S., David, R. J., & Sine, W. D. 2011. Studying choice and
uate potential venture opportunities. Cambridge, MA: change: The intersection of institutional theory and entre-
Harvard Business School. preneurship research. Organization Science, 22: 1332–1344.

Santos, F. M., & Eisenhardt, K. M. 2009. Constructing markets Vohora, A., Wright, M., & Lockett, A. 2004. Critical junctures in
and shaping boundaries: Entrepreneurial power in na- the development of university high-tech spinout compa-
scent fields. Academy of Management Journal, 52: nies. Research Policy, 33: 147–175.
643–671. Waldron, T. L., Navis, C., & Fisher, G. 2013. Explaining differ-
Sauermann, H., & Stephan, P. 2013. Conflicting logics? A mul- ences in firms’ responses to activism. Academy of Man-
tidimensional view of industrial and academic science. agement Review, 38: 397–417.
Organization Science, 24: 889–909. Wasserman, N. 2003. Founder-CEO succession and the paradox of
Schildt, H. A., Zahra, S. A., & Sillanpää, A. 2006. Scholarly com- entrepreneurial success. Organization Science, 14: 149–172.
munities in entrepreneurship research: A co-citation anal- Webb, J. W., Tihanyi, L., Ireland, R. D., & Sirmon, D. G. 2009. You say
ysis. Entrepreneurship Theory and Practice, 30: 399–415. illegal, I say legitimate: Entrepreneurship in the informal
Sengupta, S. 2012. Facebook’s ambition collides with harsh economy. Academy of Management Review, 34: 492–510.
market. New York Times, August 20: http://www.nytimes. Weber, K., & Glynn, M. A. 2006. Making sense with institutions:
com/2012/08/21/technology/facebooks-ambition-collides-with- Context, thought and action in Karl Weick’s theory.
a-harsh-market.html?pagewanted5all&_r50. Organization Studies, 27: 1639–1660.
Shane, S. A. 2004. Academic entrepreneurship: University spin- Weber, K., Heinze, K. L., & DeSoucey, M. 2008. Forage for
offs and wealth creation. Northampton, MA: Edward Elgar. thought: Mobilizing codes in the movement for grass-fed
Sine, W. D., David, R. J., & Mitsuhashi, H. 2007. From plan to meat and dairy products. Administrative Science Quar-
plant: Effects of certification on operational start-up in the terly, 53: 529–567.
emergent independent power sector. Organization Sci- Weick, K. E. 1995. Sensemaking in organizations. Thousand
ence, 18: 578–594. Oaks, CA: Sage.
2016 Fisher, Kotha, and Lahiri 409

Weinberg, A. 2004. IPO Dutch auctions vs. traditional alloca- Wry, T., Lounsbury, M., & Glynn, M. A. 2011. Legitimating na-
tion. Forbes, May 10: http://www.forbes.com/2004/05/10/ scent collective identities: Coordinating cultural entre-
cx_aw_0510mondaymatchup.html. preneurship. Organization Science, 22: 449–463.
Whetten, D. A. 2006. Albert and Whetten revisited: Strength- Zimmerman, M. A., & Zeitz, G. J. 2002. Beyond survival:
ening the concept of organizational identity. Journal of Achieving new venture growth by building legitimacy.
Management Inquiry, 15: 219–234. Academy of Management Review, 27: 414–431.
Woolcock, M. 1998. Social capital and economic development: Zott, C., & Huy, Q. N. 2007. How entrepreneurs use symbolic
Toward a theoretical synthesis and policy framework. management to acquire resources. Administrative Sci-
Theory and Society, 27: 151–208. ence Quarterly, 52: 70–105.

Greg Fisher (fisherg@indiana.edu) is an assistant professor of entrepreneurship at the


Kelley School of Business, Indiana University. He received his Ph.D. from the Michael
G. Foster School of Business at the University of Washington. His research examines
entrepreneurship in nascent and evolving markets, focusing on new venture resource
acquisition, entrepreneurial action, and institutional entrepreneurship in these settings.
Suresh Kotha (skotha@uw.edu) is the Douglas E. Olesen/Battelle Excellence Chair in
Entrepreneurship and a professor of management at the Michael G. Foster School of
Business, University of Washington. He received his Ph.D. in strategic management from
the Lally School of Management, Rensselaer Polytechnic Institute. His research interests
focus on entrepreneurship, technology and innovation management, and competitive
strategy.

Amrita Lahiri (alahiri1@uw.edu) is a doctoral candidate at the Michael G. Foster School of


Business, University of Washington. Her research examines entrepreneurial firms, with
a focus on strategic management of resources and innovation.

You might also like