Introduction to Global Business

Page 209

186

C h a p t er 7 C orr u p t i o n a n d E t h i cs i n G lo b a l B u s i n ess

sentence for fraud to 25 years. SOX established new crimes with potential 20-year sentences for destroying, altering, or fabricating records in federal investigations, or any scheme or attempt to defraud shareholders. SOX requires that the chief executive officer and chief financial officer of a publicly traded corporation must certify in each periodic report containing financial statements that the report fully complies with the Securities Exchange Act of 1934 and that the information fairly presents the company’s financial condition and results of operations. As a result of the FCPA and later SOX, some people might have anticipated that strong corporate governance would be implemented and that companies would become models of corporate social responsibility. Unfortunately, news media continue to report bribery allegations in distant locations, increasing fines, and lots of money spent on control enhancements. To expand market share, many companies work to grow markets in developing countries, which indeed have some of the highest growth and potential, but also have additional challenges related to the FCPA.

7-6b Computer Security of Accounting Information Advances in technology have revolutionized business and other aspects of society. Electronic business, or e-business—the exchange of goods or services using an electronic infrastructure—began with the early computers of the 1950s. However, e-business did not become commonplace until the development of the world wide web in the 1990s. Technology facilitates business activities, but there are some downsides. Business managers must beware of potential problems associated with e-business. A business must take precautions to avoid becoming a victim of computer crime. A computer crime involves the use of computers to perpetrate or facilitate illegal activity. The average computer crime has been estimated to cost almost $200,000, whereas the average armed robbery involves far less money: only $250. Statistics show that the higher the dollar amount of a crime, the lower its probability of prosecution.13 Increased use of computers to maintain financial records has led to more opportunities for computer crime. Estimates of computer fraud losses are several billion dollars per year. One of the most highly publicized computer crimes was the Equity Funding fraud, in which nonexistent insurance policy records were added to the customer master file of the firm over a nine-year period from 1964 to 1973. Allegedly this was done by a large number of employees claiming to be carrying out “unscheduled” file updating that was not part of the normal data processing operations. Based on movies and television shows, you might think that the biggest threat to computer security is intentional sabotage or unauthorized access to data or equipment. For most organizations this is not true. The five basic threats to security are:

• • • • •

natural disasters; dishonest employees; disgruntled employees; persons external to the organization; and accidental errors and omissions.14

Accidental errors and omissions cause the great majority of the problems concerning computer security. Errors and omissions are especially prevalent in systems of sloppy design, implementation, and operation. However, if the system’s development process is implemented properly, errors and omissions will be minimized. At the same time, better computer security will protect against intentional misrepresentation of data by employees and persons external to the company. An effective internal control structure that includes computer security is an integral part of any reliable information system. Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

15-5b Evaluating Trends

2min
page 403

15-2d Differences Between U.S. GAAP and Selected Countries

13min
pages 397-401

15-5a Financial Ratios

2min
page 402

15-2a U.S. GAAP

2min
page 395

14-3d Government Financing

5min
pages 375-376

14-4b The Cost of Capital: Domestic Versus Global

6min
pages 380-381

14-2-1 Futures Contracts

6min
pages 365-366

13-5b The Role of Information Technologies

30min
pages 353-364

14-3c International Stock Markets

5min
pages 373-374

13-4c Relocation of Production Facilities

1min
page 351

13-4b Location of Production Facilities for Products

3min
page 350

13-4a Location of Production Facilities for Components and Raw Materials

3min
page 349

12-6d Transfer Pricing

31min
pages 330-342

13-3a Advantages of Making

2min
page 347

13-2c Outsourcing and Insourcing

8min
pages 344-346

12-6c Dumping

3min
page 329

13-3b Disadvantages of Making

3min
page 348

12-5b Physical Distribution

8min
pages 325-327

12-5a Channels of Distribution

2min
page 324

12-3c Where to Locate Research and Development Facilities

2min
page 320

11-4c Comparative Labor Relations

14min
pages 305-312

12-4b Sales Promotion

3min
page 322

12-3b Managing Existing Products

2min
page 319

11-2a Virtual Staffing

3min
page 297

12-4c Publicity

2min
page 323

11-1-3 Regulatory Issues Including Immigration and Border Security

5min
pages 294-295

11-1-4 Outsourcing and Offshoring

1min
page 296

10-4a Functional Structure

2min
page 271

11-1-2 Cultural Issues and Differences

5min
pages 292-293

10-4b Divisional Structure

6min
pages 272-274

10-4d Matrix Structure

25min
pages 277-290

11-1-1 Statistical Overview

2min
page 291

10-4c Hybrid Structure

3min
pages 275-276

10-3a Creating an Export Department

2min
page 269

9-5b Organizational Change

27min
pages 257-268

9-4-2 Interpersonal Controls

1min
page 252

9-4-3 Output Controls and Measurement

8min
pages 253-255

9-3a Impediments to Coordination

3min
page 249

9-1a Mission Statement

3min
page 243

9-4-1 Bureaucratic Controls

3min
page 251

9-3b Knowledge Management and Systems

3min
page 250

9-5a Types of Organizational Culture

2min
page 256

9-1b Shareholders Versus Stakeholders

6min
pages 244-246

8-3b Cost-Minimizing Strategies

3min
page 228

7-6b Computer Security of Accounting Information

17min
pages 209-217

8-1f Cross-Border Mergers and Acquisitions

2min
page 223

8-3a Revenue Maximizing Strategies

5min
pages 226-227

8-3c Risk Minimizing Strategies

3min
page 229

8-3d Dunning’s Eclectic Theory of Foreign Direct Investment

6min
pages 230-231

7-4a Enron

2min
page 199

7-6a Foreign Corrupt Practices Act

4min
pages 207-208

7-3a Rules, Policies, and Guidelines

2min
page 196

7-3b Ethics Codes at Selected Companies

5min
pages 197-198

7-2a Ethics and Economics

3min
page 193

6-5c Copyrights

18min
pages 185-192

6-4g Dispute Settlement Law

5min
pages 181-182

6-4d Tax Law

3min
page 179

6-4a Legal Systems

4min
pages 176-177

6-3c Corruption

3min
page 174

6-3a Econimic Risks

3min
page 171

6-3b Political Risks

4min
pages 172-173

6-2c Capitalism

3min
page 170

5-6d Communication

19min
pages 159-168

5-6c Advertising Campaigns

3min
page 158

5-6b Product Development and Management

2min
page 157

5-6a Management Styles

2min
page 156

5-5a Cultural Dimensions of Doing Business in Japan

2min
page 152

5-2a Language

2min
page 141

4-4b Interest Rate Parity

29min
pages 128-140

5-2b Religion

3min
page 142

5-3d Gannon’s Cultural Metaphors

2min
page 151

4-4a Purchasing Power Parity

5min
pages 126-127

4-3e Hard and Soft Currencies

3min
page 125

3-2b Major Classes and Characteristics of Regional Integration

18min
pages 88-95

2-4b Geopolitical Rationale

24min
pages 74-83

3-1b Pros and Cons of Regional Integration

4min
pages 85-86

3-2a Steps to Regional Integration

2min
page 87

4-1b The Financial Account

5min
pages 116-117

2-3b Nontariff Barriers

7min
pages 71-72

2-4a Socioeconomic Rationale

3min
page 73

2-3a Tariffs, Preferential Duties, and Most Favored Nation Status

3min
page 70

1-6a Job Losses and Income Stagnation

2min
page 46

2-2a Wealth Accumulation as a Basis for Trade Theory: Mercantilism

3min
page 63

1-6b Sustainable Development and Environmental Degradation

4min
pages 47-48

1-7a Globalization’s Winners and Losers

1min
page 49

2-2b Specialization as a Basis for Trade Theory: Absolute and Comparative Advantage

5min
pages 64-65

1-5d How Countries “Leapfrog” into the Internet and Cell Phone Era

3min
page 45

1-5c The Digital Divide Myth

1min
page 44

1-2b The World Bank

2min
page 35

1-2c The World Trade Organization

2min
page 36

1-4b Competitive Markets

3min
page 41

1-3b Transparency of Political Institutions

1min
page 38

1-1b Decoupling and the Move to a Multipolar World Economic Order

5min
pages 31-32

1-2a The International Monetary Fund

5min
pages 33-34

1-3a What Is Institutional Structure?

2min
page 37

1-3c Adaptive Institutions to Strengthen Public Participation

1min
page 39
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.