Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024JUST ACCEPTED
Public administration digitalization effects on corruption: Lesson learned from Indonesia
The digitalization of public administrations can reduce corruption, but many efforts fail. Although the relationship between digitalization and corruption has been investigated, how corruption can be reduced in practice is given hardly any attention. ...
- research-articleMay 2023
From Compliance to Progress: A Sensemaking Perspective on the Governance of Corruption
Organization Science (INFORMS-ORGS), Volume 34, Issue 3Pages 1184–1215https://doi.org/10.1287/orsc.2022.1614The governance of corruption is increasingly important in a global business environment involving ever more frequent transactions across diverse institutional contexts. Previous scholarship has theorized a fundamental tension between the enforcement of ...
- short-paperApril 2023
Curbing Ghost Worker Fraud In Developing Countries Using Consortium Blockchain
IWSPA '23: Proceedings of the 9th ACM International Workshop on Security and Privacy AnalyticsPages 77–83https://doi.org/10.1145/3579987.3586569One of the major issues facing the governments of developing countries, such as Nigeria, is ghost worker fraud. Ghost worker fraud refers to all practices relating to employee impersonations that have salary cost effects on the government. More than one ...
- research-articleJanuary 2023
Seeing data like a state: A case of Open Government Data in India’s livelihoods program
Open Government Data (OGD) initiatives promise to make governments transparent, enabling citizens to participate actively in governance. Yet, empirical evidence suggests that OGD doesn’t have the democratic impact that its advocates expect. Based ...
- research-articleJanuary 2023
The Impact of Bribery Relationships on Firm Growth in Transition Economies
Organization Science (INFORMS-ORGS), Volume 34, Issue 1Pages 303–328https://doi.org/10.1287/orsc.2022.1575This study explores how bribery affects firm growth by focusing on the asymmetric dependence of firms on government resources and services. We conceptualize bribery as relationships through which bribery requests require firms to frequently interact with ...
-
- research-articleJune 2022
How Could Information Systems Support Transparency to Face Corruption? Systematic Mapping of the Literature
SBSI '22: Proceedings of the XVIII Brazilian Symposium on Information SystemsArticle No.: 38, Pages 1–9https://doi.org/10.1145/3535511.3535549Context: Corruption is a problem that follows the evolution of humanity, taking root in human society and causing global problems in the form of social inequality, the precariousness of public services, and the exhaustion of democracy. In this scenario, ...
- research-articleOctober 2021
What Determines the Return to Bribery? Evidence from Corruption Cases Worldwide
We analyze a hand-collected sample of bribery cases from around the world to describe how the payment of bribes affects shareholder value. The net present value of a bribe conditional on getting caught is close to zero for the median firm in our sample. ...
- research-articleJanuary 2021
The Corruption Perception Index: analysis of dependence on socio-economic indicators
Procedia Computer Science (PROCS), Volume 190, Issue CPages 193–203https://doi.org/10.1016/j.procs.2021.06.024AbstractThe article presents the results of applying data analysis methods, in particular cluster analysis and machine learning methods for corruption analysis. The analysis of dependence of the corruption perception index on social and economic ...
- research-articleNovember 2020
Efficiency Improvements for Encrypt-to-Self
CYSARM'20: Proceedings of the 2nd Workshop on Cyber-Security Arms RacePages 13–23https://doi.org/10.1145/3411505.3418438Recent work by Pijnenburg and Poettering (ESORICS'20) explores the novel cryptographic Encrypt-to-Self primitive that is dedicated to use cases of symmetric encryption where encryptor and decryptor coincide. The primitive is envisioned to be useful ...
- extended-abstractJune 2019
Identifying Bid Leakage in Procurement Auctions: Machine Learning Approach
EC '19: Proceedings of the 2019 ACM Conference on Economics and ComputationPages 69–70https://doi.org/10.1145/3328526.3329642We propose a novel machine-learning-based approach to detect bid leakage in first-price sealed-bid auctions. We extract and analyze the data on more than 1.4 million Russian procurement auctions between 2014 and 2018. As bid leakage in each particular ...
- research-articleMarch 2019
Restoring Trust in Mexican Government. Preliminary Assessment of DLT Implementation
ICBCT '19: Proceedings of the 2019 International Conference on Blockchain TechnologyPages 24–29https://doi.org/10.1145/3320154.3320158In this paper we discuss the often-mentioned possibility to use DLTs in reducing government corruption and increasing transparency, as they could be applied to the specific Mexican context, identifying the most advantageous areas of implementation with ...
- research-articleJune 2018
Corruption in the customs service
ICEEG '18: Proceedings of the 2nd International Conference on E-commerce, E-Business and E-GovernmentPages 41–46https://doi.org/10.1145/3234781.3234786Economic well-being of any country is one of the main foundations of any developing or developed nation. The openness to trade with other nations plays a very significant role in strengthening the economy of a country. This happens through two-way flow ...
- short-paperMay 2018
Towards generalized process patterns for detecting corruption within the government using open data
dg.o '18: Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data AgeArticle No.: 86, Pages 1–6https://doi.org/10.1145/3209281.3209282Governments are seeking for new ways to fight corruption within their own administration. The opening of data has the potential to involve citizens in detecting corruption by providing them the ability to view and analyze data about what is happening ...
- articleNovember 2017
The Evolutionary Game of Pressure or Interference, Resistance and Collaboration
Mathematics of Operations Research (MOOR), Volume 42, Issue 4Pages 915–944https://doi.org/10.1287/moor.2016.0838In this paper we extend the framework of the evolutionary inspection game put forward recently by the author and coworkers to a large class of conflict interactions to address the pressure executed by the major player or principal on the large group of ...
- research-articleJune 2017
E-government, corruption reduction and culture: a study based on panel data of 57 countries
dg.o '17: Proceedings of the 18th Annual International Conference on Digital Government ResearchPages 310–318https://doi.org/10.1145/3085228.3085292In e-government literature, there have been very few studies that constructed longitudinal data and empirically assessed the association of e-government development and corruption in different cultural context. This paper constructs a highly-balanced ...
- articleMay 2017
Competition in Corruptible Markets
Firms seeking business opportunities often face corruptible agents in many markets. This paper investigates the marketing strategy implications for firms competing for business, and for the buyer in a corruptible market. We consider a setting in which a ...
- research-articleJanuary 2017
Blockchain and bitcoin as a way to lift a country out of poverty - tourism 2.0 and e-governance in the Republic of Moldova
International Journal of Internet Technology and Secured Transactions (IJITST), Volume 7, Issue 2Pages 115–143https://doi.org/10.1504/ijitst.2017.087132In this article, we explore the formidable yet untapped capabilities of Blockchain technology and Bitcoin in order to alleviate poverty. We focus on the Republic of Moldova, which has been plagued by endemic corruption and persistently high poverty levels ...
- articleJune 2016
You can't bribe a computer: dealing with the societal challenge of corruption through ICT
MIS Quarterly (MISQ), Volume 40, Issue 2Pages 511–526Despite the influence of information and communication technologies (ICTs) on enhancing transparency and fairness, there is limited theoretical understanding of how ICT affects corruption. Adopting an institutional perspective, we conceptualize the ...
- abstractMarch 2016
Studying the Opposing Effects of Robot Presence on Human Corruption
Social presence has two opposing effects on human corruption: the collaborative and contagious nature of another person's presence can cause people to behave in a more corrupt manner. In contrast, the monitoring nature of another person's presence can ...
- articleMarch 2016
Corruptible social agents
Computer Animation and Virtual Worlds (CAVW), Volume 27, Issue 2Pages 89–102https://doi.org/10.1002/cav.1613Agent-based virtual simulations of social systems susceptible to corruption e.g., police agencies require agents capable of exhibiting corruptible behaviors to achieve realistic simulations and enable the analysis of corruption as a social problem. This ...