Premium Essay

The Escalation of Deception in Organizations

In:

Submitted By margaretJohnson
Words 950
Pages 4
The Escalation of Deception in Organizations
I am happy and sad to read this article, written by Peter Fleming and Stelios C. Zyglidopoulos (2008), ‘The Escalation of Deception in Organizations’. Just knowing how easily deception starts, how it escalates and how it can end if left unchecked is shocking! Sir Walter Scott, Marmion, Canto Vl, is right on target when he wrote, “Oh, what a tangled web we weave when first we practice to deceive!” Individuals weave complex webs with threads of deception, corporation, escalation, lying and unethical behavior that can manifest from the inside or outside of any organizations. This behavior can and will encompass unsuspecting employees and investors who may inadvertently become involved without their knowledge. This article explains, to its readers, why it is imperative to understand where this organizational killer starts, be aware of how it escalates and how moderators can prevent the deception from escalating into an organizational level phenomenon.
The happy news is that escalation of deceit to the organizational level (the end) can be prevented altogether. If escalation has already started and caught in an early stage, this phenomenon can be halted and reversed using these two moderators; Commitment and implementation of a corporate code of ethics explained by Sommers, (2001), Adam and Rachman-Moore (2004), O’Dwyer and Madden (2006) and Effective Control Systems, Rosanas and Velila (2005).
A morally matured person acts and behaves around the universal ethical principles, whereas, morally immature people will act and behave around egocentric motivations, Kohlberg (1969). Understanding the maturity level of the corporation’s management team is will determine the success a monitoring system would provide. For example, when a control system’s put into place, a morally immature people will most likely not monitor

Similar Documents

Free Essay

Introduction Accounting Theory

...productive outcomes and minimize destructive ones. This paper will briefly describe some common sources of conflict, the levels of social interaction at which conflict occurs, and the general strategies of approaching conflict that are available. There is an old Chinese curse which states, "I curse you--may I you live in an important age." Indeed, we do live in an important age, saturated with many forms and intensities of conflict. While conflicts of value are slow to erupt between individuals and institutions in a stable society, they are prevalent in times of rapid change. In our age of dynamic change it is imperative that the manager understand the source of; and various strategies for dealing with, conflict which inevitably occurs in organizations. Typical of this conflict is the breakdown of...

Words: 3501 - Pages: 15

Free Essay

Trolling Through Twitter Hashtags

...Trolling through Twitter hashtags Andrei Coste Context Internet Trolling has been around ever since there were means that users could communicate with each other over web protocols. It’s deeply rooted in the internet culture and is often considered to be a form of bullying (cyberbullying). The website Know Your Meme says that “the contemporary use of the term is alleged to have appeared on the Internet in the late 1980s, but the earliest known mention of the word “troll” on record can be found in a post on the Usenet newsgroup alt.folklore.urban from December 14th, 1992. The term continued to grow popular in the early 1990s through its usage in the Usenet group alt.folklore.urban and by the late 1990s, the alt.folklore.urban newsgroup had such heavy traffic and participation that acts of trolling became frowned upon. Prior to the widespread use of the term “trolling,” similar behaviors have been observed through “griefing,” the act of intentionally causing distress to other players in an online game, since the days of Multi-User Dungeons (MUDs) in the late 1980s and “flaming,” the act of instigating hostility or unpleasant exchanges in online forums, which also emerged through Usenet newsgroup discussions”. They also state that In the late 1980s, Internet users adopted the word “troll” to denote someone who intentionally disrupts online communities. Early trolling was relatively innocuous, taking place inside of small, single-topic Usenet groups. The trolls employed what...

Words: 4201 - Pages: 17

Free Essay

Fraud in Healthcare

...fraud in the healthcare a force to reckon from 2013 to 2015. These cases include a psychiatrist from Chicago, Lloyd Torrez who was found guilty of defrauding insurance companies; Empowerment Non-Emergency Medical Transportation, Inc. an enrolled Medicaid provider being led by its owner, Ms. Shorter, which was defrauding the Indiana Medicaid; and Paula Cluding, owner of Prairie View Hospice in Oklahoma who provided millions of dollars’ worth of fraudulent claims to the federal Medical Care program. INTRODUCTION Fraud is deliberate deception to gain unfair and unlawful gain from an act. It is both civil and criminally wrong, and the people who commit fraud usually do it to gain monetary gain or material benefits, but the ones who commit fraud to gain monetary gains are the most common. The elements of fraud as a crime similarly vary. The requisite elements of perhaps most general form of criminal fraud, theft by false pretense, are the intentional deception of a victim by false representation or pretense with the intent of persuading...

Words: 1936 - Pages: 8

Premium Essay

Ethics in Advertising

...Ethics in Advertising Abstract Business is about selling something whether that be a service or a product. Advertising that service or product has to be done to get the word out that the service or product is available but at the same time nobody wants their competition to be stronger. Can advertising be done ethically? Advertising applies to anyone that makes purchases and uses products or services. Advertisements are used to capture consumers’ attention and make them want to purchase their products, use their service, or interpret a specific message. Commercial advertising is the means for many corporations to spread the word about their products or services. It is currently the most effective means of getting a message across to a large audience across the world, and advertising aids the link between the actual production of a good or service and its consumption by consumers. Because of the significance of advertising, the average person is exposed to up to 5,000 ad messages per day. (Chan & Shenoy 2009). Advertising is constantly reminding consumers of their brands and the message that they are trying to portray. Any form of space, even the walls in public toilet cubicles, has the potential to be used for advertising. This is especially pertinent coupled with the use of the Internet, making advertisements all the more accessible (illustrated by video-sharing websites like YouTube); regardless of which part in the world the advertisement...

Words: 2286 - Pages: 10

Free Essay

Riordan Corporate Compliance Plan

...Plan Susan Holmes, Marcia Kelly, Peter Flores, Ronald Cox, Celeste Mellett, and Orlinda Watson, LAW/531 April 9, 2012 Instructor Name: Thane Messinger Understanding the position companies must take to protect the interests of investors and employees, the organization must have compliance plan in place. The compliance plan must address every possible liability that can bring financial and physical harm to the company. The organization must work with each department to understand the risks involved with each job. Knowing the risks and working to help the employees understand what those risks are and will help keep the employee minimizing risks of the organization. The compliance plan helps list the goals Riordan Manufacturing established to ensure the employees know the correct steps to comply with the laws and regulations. Legal Risk Exposure and Responses Traditionally, Riordan Manufacturing Company legal counsel interacts primarily with executive management and the board of directors to report on existing, pending, and probable litigation. Although this responsibility continues to be critical, it is imperative that there be an increased presence of legal counsel to the internal organization. It is important for counsel to act as an internal company consultant to help reduce legal risks. Activities include circulating existing legal risks status data, consulting internal management, acting as a sounding board for staff to determine risks associated with...

Words: 1779 - Pages: 8

Premium Essay

Business Research

...Business Research Methods Cooper 12th Edition Solutions Manual Click here to download the solutions manual INSTANTLY!!! http://www.solutionsmanualtestbank.com/products/2014/10/2 6/business-research-methods-cooper-12th-edition-solutionsmanual Business Research Methods Cooper 12th Edition Solutions Manual Business Research Methods Cooper Schindler 12th Edition Solutions Manual ***THIS IS NOT THE ACTUAL TEXTBOOK. YOU ARE PURCHASING the Solution Manual in e-version of the following textbook*** Name: Business Research Methods Author: Cooper Schindler Edition: 12th ISBN-10: 0073521507 Type: Solutions Manual - The file contains solutions and questions to all chapters and all questions. All the files are carefully checked and accuracy is ensured. - The file is either in .doc, .pdf, excel, or zipped in the package and can easily be read on PCs and Macs. - Delivery is INSTANT. You can download the files IMMEDIATELY once payment is done. If you have any questions, please feel free to contact us. Our response is the fastest. All questions will always be answered in 6 hours. This is the quality of service we are providing and we hope to be your helper. Delivery is in the next moment. Solution Manual is accurate. Buy now below and the DOWNLOAD LINK WILL APPEAR IMMEDIATELY once payment is done! Prepare to receive your Business Research Methods Solution Manual in the next moment. -------------------------------------Business Research Methods Solution Manual Business Research Methods 12th...

Words: 8218 - Pages: 33

Premium Essay

Decision Making Perspective to Negotiation

...A Decision-making Perspective to Negotiation: A Review of the Past and a Look into the Future Chia-Jung Tsay Max H. Bazerman Working Paper 10-002 Copyright © 2009 by Chia-Jung Tsay and Max H. Bazerman Working papers are in draft form. This working paper is distributed for purposes of comment and discussion only. It may not be reproduced without permission of the copyright holder. Copies of working papers are available from the author. 1 A Decision-making Perspective to Negotiation: A Review of the Past and a Look into the Future By Chia-Jung Tsay and Max H. Bazerman Chia-Jung Tsay is a doctoral student in organizational behavior at Harvard Business School in Boston. Her e-mail address is ctsay@hbs.edu. Max H. Bazerman is the Jesse Isidor Straus Professor of Business Administration at Harvard Business School in Boston. His e-mail address is mbazerman@hbs.edu. Abstract Through the decision-analytic approach to negotiations, the past quarter century has seen the development of a better dialog between the descriptive and the prescriptive, as well as a burgeoning interest in the field for both academics and practitioners. Researchers have built upon the work in behavioral decision theory, examining the ways in which negotiators may deviate from rationality. The 1990s brought a renewed interest in social factors, as work on social relationships, egocentrism, attribution and construal processes, and motivated illusions was incorporated into our understanding of negotiations...

Words: 6301 - Pages: 26

Premium Essay

Crisis Management

...Faculty of Economics Seminar paper on the subject: English 4 Crisis management June, 2012 Crisis management is the process by which an organization deals with a major event that threatens to harm the organization, its stakeholders, or the general public. The study of crisis management originated with the large scale industrial and environmental disasters in the 1980. Three elements are common to most definitions of crisis: (a) a threat to the organization, (b) the element of surprise, and (c) a short decision time. Venette argues that "crisis is a process of transformation where the old system can no longer be maintained." Therefore the fourth defining quality is the need for change. If change is not needed, the event could more accurately be described as a failure or incident. In contrast to risk management, which involves assessing potential threats and finding the best ways to avoid those threats, crisis management involves dealing with threats before, during, and after they have occurred. That is, crisis management is proactive, not merely reactive. It is a discipline within the broader context of management consisting of skills and techniques required to identify, assess, understand, and cope with a serious situation, especially from the moment it first occurs to the point that recovery procedures start. Introduction Crisis management consists of: * Methods used to respond...

Words: 6157 - Pages: 25

Premium Essay

Elly

...Best Practices for Negotiating with Key Suppliers Excerpted from the Vantage Partners study Negotiating and Managing Key Supplier Relationships: A Cross-Industry Study of 20 Best Practices by Jonathan Hughes and Mark Gordon Introduction Based on 15 years of working with clients in the sourcing and procurement arena, Vantage Partners identified twenty best practices for managing critical supplier relationships. These practices represent a reasonably comprehensive (though certainly not exhaustive) approach to maximizing value in important supplier relationships. While not a recipe for guaranteed success, these practices comprise a roadmap for systematically negotiating and managing key supplier relationships more effectively. Today’s sourcing and procurement professionals face a multitude of negotiation challenges: from internal negotiations with business units around sourcing strategies; to negotiating agreements with single and sole source suppliers; to ongoing negotiations over individual statements of work, change orders, issues of scope, and the like. This excerpt describes the four best practices related to negotiation and offers some practical ideals about how to implement them. About the study The study was based on data collected from sourcing and supply chain executives at more than 100 companies about relationship management practices with their key suppliers, across six fundamental areas: Evaluation and Selection Negotiation Post-Deal Relationship...

Words: 8901 - Pages: 36

Premium Essay

Wag the Dog Reaction Paper

...I. Background Information Wag the Dog is a hilarious new satire movie directed by Barry Levinson. Ironic with the genre of the film as a comedy, it carries a serious and an eye-opening message about the relationship between politics and mass-market entertainment. This is one of Levinson's best films, and the screenplay, co-penned by noted writer David Mamet along with Hilary Henkin, is brilliantly on-target. The story begins with presentation of the premise which is the president of the United States is accused of having sex with a teen aged girl who belongs to an organization similar to the girl scouts and the election is less than two weeks away. A brief encounter with a Firefly Girl becomes public knowledge, and now his 17% lead is about to go downhill. The president's opponents get wind of the story and use it to their advantage. Thus, this led the president's Public Relations team to take action regarding the crisis. Winifred Ames played by Anne Heche, one of the President's top aides, calls in spin doctor extraordinary, Conrad Bream (Robert De Niro). Conrad goes to work immediately, thinking of the best way how to turn away the public's attention from the Firefly Girl issue. He came out with the idea to create another bigger issue for the public to think about and over power the bad publicity caused by the sex scandal. "Change the story, change the lead" is his motto, so he decides to manufacture a small, cost-effective war against Albania, which he euphemistically refers...

Words: 2894 - Pages: 12

Premium Essay

Co2520

...CO2520 Communications QUIZZES AND EXAMS Communications QUIZZES AND EXAMS Unit 3 Quiz 1 Units 1, 2, 3: QUESTIONS Directions: Please select the best response(s) for each question. When there are multiple correct answers for a question, please select all that apply. 1. Communication is a _____________ process in which ___________ generate(s) meaning through the exchange of verbal and nonverbal messages in specific _________, influenced by individual and societal forces and embedded in ___________. a. contextual, people, transactions, culture b. people, transactions, cultures, contexts c. cultural, people, contexts, transactions d. transactional, people, contexts, culture 2. Which of these is not a component of human communication? a. Feedback b. Channels c. Decisions d. Setting 3. Which of the following is the model of communication created by the textbook authors? a. Human Communication in Society b. Transactional c. Interrelation d. Linear 4. Communication ethics is defined as ____________________. a. standards of what is right and wrong, good and bad, moral and immoral b. the standards of right and wrong that one applies to messages that are sent and received c. pertaining to the belief that there is a single correct answer d. pertaining to the belief that moral behavior differs among individuals -1- 07/29/2013 Communications QUIZZES AND EXAMS 5. Ancient Greeks, the Middle Ages, and the _____________...

Words: 3754 - Pages: 16

Premium Essay

Business

...Chapter 1 The Nature of Negotiation Fill in the Blank Questions 1. People ____________ all the time. Answer: negotiate Page: 2 2. The term ____________ is used to describe the competitive, win-lose situations such as haggling over price that happens at yard sale, flea market, or used car lot Answer: bargaining Page: 3 3. Negotiating parties always negotiate by ____________. Answer: choice Page: 6 4. There are times when you should _________ negotiate. Answer: not Page: 6 5. Successful negotiation involves the management of ____________ (e.g., the price or the terms of agreement) and also the resolution of ____________. Lewicki/Barry/Saunders, Negotiation, 6/e 1 Answer: tangibles, intangibles Page: 8 6. Independent parties are able to meet their own ____________ without the help and assistance of others. Answer: needs Page: 9 7. The mix of convergent and conflicting goals characterizes many ____________ relationships. Answer: interdependent Page: 10 8. The ____________ of people’s goals, and the ____________ of the situation in which they are going to negotiate, strongly shapes negotiation processes and outcomes. Answer: interdependence, structure Page: 10 9. Whether you should or should not agree on something in a negotiation depends entirely upon the attractiveness to you of the best available _________. Answer: alternative Page: 10 – 12 10. When parties are interdependent, they have to find a way to ____________ their differences. Answer:...

Words: 65823 - Pages: 264

Premium Essay

Ethical Hacking

...Chapter-1 1.0 Introduction With the tremendous advancement of Internet, different aspects of it are achieving the highest peak of growth. An example of it is e-commerce. More and more computers get connected to the Internet, wireless devices and networks are booming and sooner or later, nearly every electronic device may have its own IP address. The complexity of networks is increasing, the software on devices gets more sophisticated and user friendly – interacting with other devices and people are a main issues. At the same time, the complexity of the involved software grows, life cycles are getting shorter and maintaining high quality is difficult. Most users want (or need) to have access to information from all over the world around the clock. Highly interconnected devices which have access to the global network are the consequence. As a result, privacy and security concerns are getting more important. In a word, information is money. There is a serious need to limit access to personal or confidential information – access controls are needed. Unfortunately most software is not bug free due to their complexity or carelessness of their inventors. Some bugs may have a serious impact on the access controls in place or may even open up some unintended backdoors. Security therefore is a hot topic and quite some effort is spent in securing services, systems and networks. On the internet, there is a silent war going on between the good and the bad guys – between the ones...

Words: 8365 - Pages: 34

Premium Essay

Business Communication

...Question 1 The ethics defined by an organization are 1) social ethics. 2) professional ethics. 3) individual ethics. 4) legal ethics. 0 / 0.1 points socioeconomic ethics. Question 2 Which of the following statements about laws is least accurate? 5) 1) 0 / 0.1 points People in accounting and finance should be aware of the Sarbanes-Oxley Act. Anything published on the Internet is in the public domain and can be used 2) freely. 3) Assume that anything produced privately after 1989 is copyrighted. The concept of fair use gives individuals limited rights to use copyrighted materials without requiring permission. Question 0.1 / 0.1 3 points The reasons why people make unethical decisions include 4) 1) taking the easy way out. 2) doing whatever it takes to win. 3) rationalizing one's choices. 4) A, B, and C 5) B and C only View Feedback Question 4 0.1 / 0.1 points Which of the following statements comparing oral and written communication is least accurate? 1) Written communication is preferred when a permanent record is needed. Written messages are generally more organized and well-considered than oral messages. One advantage of oral communication such as a face-to-face meeting is that it 3) allows for immediate feedback. 2) 4) Oral communication is preferred when presenting formal or complex ideas. View Feedback Question 5 0.1 / 0.1 points Which of the following is an example of horizontal communication in an organization? 1) Four payroll clerks meet to discuss a new...

Words: 18885 - Pages: 76

Premium Essay

The Role of Power in Financial Statement Fraud Schemes

...investigate a large-scale financial statement fraud to better understand the process by which individuals are recruited to participate in financial statement fraud schemes. The case reveals that perpetrators often use power to recruit others to participate in fraudulent acts. To illustrate how power is used, we propose a model, based upon the classical French and Raven taxonomy of power, that explains how one individual influences another individual to participate in financial statement fraud. We also provide propositions for future research. Keywords Financial statement fraud  Organizational corruption  Recruitment  Collusion  Power and influence Introduction In recent years, fraud and other forms of unethical behavior in organizations have received significant attention in the business ethics literature (Uddin and Gillet 2002; Elias 2002; Rockness and Rockness 2005; Robison and Santore 2011), investment circles (Pujas 2003; Albrecht et al. 2011), and regulator communities (Farber 2005; Ferrell and Ferrell 2011). Scandals at Enron, WorldCom, Xerox, Quest, Tyco, HealthSouth, and other companies created a loss of confidence in the integrity of the American business (Carson 2003) and even caused the accounting profession in the United States to reevaluate and reestablish basic accounting procedures (Apostolon and Crumbley 2005). In response to the Enron scandal, the American Institute of Certified Public Accountants issued the following statement: Our profession...

Words: 8383 - Pages: 34