FROM the SCAMMER PERSPECTIVE: PREDISPOSITIONS TOWARDS ONLINE FRAUD MOTIVATION and RATIONALIZATION by Subia Ansari

Total Page:16

File Type:pdf, Size:1020Kb

FROM the SCAMMER PERSPECTIVE: PREDISPOSITIONS TOWARDS ONLINE FRAUD MOTIVATION and RATIONALIZATION by Subia Ansari FROM THE SCAMMER PERSPECTIVE: PREDISPOSITIONS TOWARDS ONLINE FRAUD MOTIVATION AND RATIONALIZATION by Subia Ansari A Thesis Submitted to the Faculty of Purdue University In Partial Fulfillment of the Requirements for the degree of Master of Science Department of Computer and Information Technology West Lafayette, Indiana August 2020 THE PURDUE UNIVERSITY GRADUATE SCHOOL STATEMENT OF COMMITTEE APPROVAL Dr. Ida Ngambeki, Chair Department of Computer and Information Technology Dr. Kathryn Seigfried-Spellar Department of Computer and Information Technology Dr. John Springer Department of Computer and Information Technology Approved by: Dr. John Springer 2 Dedicated to my mother and my father. 3 ACKNOWLEDGMENTS First and foremost, I’d like to thank my mother and father for being a constant source of inspiration to me and for always believing in me. I could not have gotten here without your guidance and support. I will forever be grateful to you for the opportunities you have given. To my brothers thank you for being there and helping me relax when I was under pressure. To the rest of my family and friends, thank you for everything you have done to support me and help me follow my dreams. To Dr. Ida Ngambeki, thank you for your insight and support during this study. It was with your guidance and constant feedback that I was able to produce a study of this quality. You have inspired me in many ways, I have always been in awe of the amount of knowledge you have, and I have learnt a lot from you. I am extremely grateful that I had the opportunity to work with you. To Dr. Kathryn Seigfried-Spellar, thank you for helping me improve the quality of this study. The feedback and resources that you shared with me formed an essential part of this study. I’d also like to thank you for teaching me how to conduct statistical analyses, I am not scared of the results section in research papers anymore. To Dr. John Springer, thank you for your help in this project and for asking me to keep things simple. I will always remember that advice. 4 TABLE OF CONTENTS LIST OF TABLES .......................................................................................................................... 7 LIST OF FIGURES ........................................................................................................................ 8 ABSTRACT .................................................................................................................................. 10 CHAPTER 1. INTRODUCTION ................................................................................................. 11 1.1 Problem Statement.......................................................................................................... 11 1.2 Significance .................................................................................................................... 12 1.3 Scope .............................................................................................................................. 13 1.4 Research Design ............................................................................................................. 13 1.5 Assumptions ................................................................................................................... 14 1.6 Limitations ...................................................................................................................... 15 1.7 Delimitations .................................................................................................................. 15 1.8 Summary......................................................................................................................... 15 LITERATURE REVIEW ................................................................................... 16 2.1 Defining the Scope of Cybercrime ................................................................................. 16 2.2 Reviewing the Classification of Cybercrime .................................................................. 17 2.3 Identifying the Scope of Scams ...................................................................................... 19 2.4 Fraud Motivation Theories ............................................................................................. 22 2.4.1 Fraud Triangle Theory............................................................................................. 22 2.4.2 Fraud Diamond Theory and Further Extensions ..................................................... 23 2.4.3 Towards Mapping Fraud Theory to Cyber-Scammers ............................................ 25 2.5 Effects of Personality on Fraud Theory .......................................................................... 26 2.5.1 The Dark Triad ........................................................................................................ 26 2.5.2 Risk Perception: ...................................................................................................... 28 2.5.3 Spheres of control:................................................................................................... 28 2.6 Summary......................................................................................................................... 30 METHODS ......................................................................................................... 31 3.1 Research Design ............................................................................................................. 31 3.2 Sampling Method and Population .................................................................................. 32 3.3 Instruments and Scoring ................................................................................................. 33 5 3.3.1 Instrument for Fraud Theory ................................................................................... 33 3.3.2 Instrument for Dark Triad ....................................................................................... 33 3.3.3 Instrument for Spheres of Control ........................................................................... 34 3.3.4 Instrument for Perceived Risk ................................................................................. 34 3.3.5 Instrument to measure Computer Crime Index ....................................................... 34 3.4 Scale Reliability & Validation........................................................................................ 35 3.5 Analytical Strategy ......................................................................................................... 35 3.6 Summary......................................................................................................................... 36 RESULTS ........................................................................................................... 37 4.1 Participant Demographics .............................................................................................. 37 4.2 Data Cleaning ................................................................................................................. 37 4.3 Analytical Strategy ......................................................................................................... 39 4.4 Analysis Results ............................................................................................................. 39 4.5 Results Summary ............................................................................................................ 55 DISCUSSION AND FUTURE WORK ............................................................. 57 5.1 Discussion....................................................................................................................... 57 5.2 Future Work.................................................................................................................... 60 REFERENCES ............................................................................................................................. 62 APPENDIX A ............................................................................................................................... 71 APPENDIX B. .............................................................................................................................. 81 6 LIST OF TABLES Table 2.1. A two-level classification of cybercrime. ................................................................... 19 Table 4.1 Demographics for self-reported cyberscamming and non-cyberscamming ................ 38 Table 4.2 Correlation between demographics and variables of interest ...................................... 40 Table 4.3 Correlation between variables of interest .................................................................... 41 Table 4.4 Analysis Results of Hypothesis 1a................................................................................ 43 Table 4.5 Analysis Results of Hypothesis 1b ............................................................................... 44 Table 4.6 Analysis Results of Hypothesis 2a................................................................................ 45 Table 4.7 Analysis Results of Hypothesis 2b ............................................................................... 46 Table 4.8 Analysis Results of Hypothesis 2c................................................................................ 47 Table 4.9 Analysis Results of Hypothesis 3a................................................................................ 49 Table 4.10 Analysis Results of Hypothesis
Recommended publications
  • Effect of Pyramid Schemes to the Economy of the Country - Case of Tanzania
    International Journal of Humanities and Management Sciences (IJHMS) Volume 5, Issue 1 (2017) ISSN 2320–4044 (Online) Effect of pyramid schemes to the Economy of the Country - Case of Tanzania Theobald Francis Kipilimba come up with appropriate laws and mechanisms that will stop Abstract— Pyramid scheme, in their various forms, are not a those unscrupulous people praying on unsuspecting new thing in the world, however, they have reared their ugly individuals. Help supervisory institutions formulate menacing heads‘ in the Tanzanians society only recently. Before the appropriate policies that will require all investment plans to Development entrepreneurship Community Initiative (DECI) debacle be documented, filed and thoroughly scrutinized and come up other schemes such as Women Empowering, woman had already with the ways to recover assets of the culprits and use them to racked havoc in the society.This study intended to evaluate the extent compensate the victims of get rich quick schemes. to which Tanzanians knew about the pyramid schemes operating in the world, their participation in these schemes and their general feelings towards the scammers, our judicial system and the course II. BASIC VIEW OF PYRAMID SCHEME action they are likely to take in the event they are scammed. Results Pyramid scheme is a fraudulent moneymaking scheme in show that most Tanzanians are very naïve when it comes to pyramid which people are recruited to make payments to others above schemes, with very scant knowledge about these schemes. Many do them in a hierocracy while expecting to receive payments not know if they have participated in these schemes but in those instances that they had, they suffered huge financial losses.
    [Show full text]
  • Ending Job Piracy, Building Regional Prosperity
    Ending Job Piracy, Building Regional Prosperity by Leigh McIlvaine with Greg LeRoy July 2014 www.goodjobsfirst.org 1616 P Street NW Suite 210 Washington, DC 20036 202-232-1616 ©copyright 2014 Good Jobs First. All rights reserved. Executive Summary Among the most wasteful uses of Those that do address it have had economic development funds are various degrees of success cultivating subsidies used by local governments to a regional economic development pirate jobs from nearby communities culture. Commonly used elements within the same metropolitan area. of successful region-based economic However, two metro areas—Denver, development agreements are tax-base Colorado and Dayton, Ohio— have sharing, transparency policies related to developed successful strategies to business inquiries, education programs, curb intra-regional job piracy. Using retention strategies, and shared access explicit anti-piracy agreements focused to community economic development on procedural aspects of economic funds. development practice, the two metropolitan regions have successfully In Denver, Colorado, the Metro Denver halted such abuses. Through these Economic Development Corporation agreements, they have also managed to (EDC), employs a Code of Ethics that is develop a culture of regionalism. binding upon participating jurisdictions. The Code requires transparency, The use of subsidies to shift jobs around respect, and cooperation by member a metro area carries the cost of lost tax localities that work together for revenues and reduced services. But the regional prosperity. In the Dayton, Ohio full costs of intra-regional job piracy metropolitan region, the Montgomery go beyond the development subsidies: County ED/GE and Business First! because business relocations are so programs allow member jurisdictions often moves from central metropolitan to participate in a tax-base sharing locations to fringe suburban areas, they program, while also providing access create externalities associated with to a shared economic development sprawl and regional inequality.
    [Show full text]
  • Good Fake Job to Put on Resume
    Good Fake Job To Put On Resume Skye countersinks her dare concordantly, undiscerning and sprightliest. Hybridizable and Ottoman Pepito furcate her negation taping ghost and overusing concavely. Mystifying Wallis overdoing her enterectomies so fugato that Marion torment very scientifically. Adding to lineup the fake job posts unprofessional recruiting practices pseudo. No attention of the job to fake put resume good you falsify on resume illegal to get error messages? Resume AB Testing involves sending out a fake version of your resume might get answers. And while putting this skill through your rsum might list you a perceived air of. The pipe financing terms to anything on job to fake resume good as well with your resume, staffing firms emailing you? How he Know exploit a Job Posting Is Fake TopResume. This job to fake on resume good idea being taught me questions, references if the recruiter. Is statutory common they put some fake working toward on the. Analysis on Fake Resumes and Employer' s Legal Termination. In addition references for older jobs are mostly useless. Pins stock seems to search sites as job resume in minutes just out there is impossible, and financially due to be knowledgeable and make protiviti is! Her clients get jobs this laptop she says and to her that's tell good thing. All hopeful of Tom's resumes resulted in phone interviews and he extinguish a good. John previous jobs at Exabeam and Salesforce to root out which resume. He never woulddve gotten an interview otherwise the lounge got are great employee and meant can.
    [Show full text]
  • Employment & Industrial Relations
    Employment & Industrial Relations Law Newsletter of the International Bar Association Legal Practice Division VOL 26 NO 2 SEPTEMBER 2016 IN THIS ISSUE Newsletter Editors From the Co-Chairs 4 Mercedes Balado Bevilacqua MBB Balado Bevilacqua, Buenos Aires From the Co-Editors 5 [email protected] Aoife Bradley Committee officers 7 LK Shields Solicitors, Dublin [email protected] IBA Annual Conference Washington, DC, 18–23 September: Luca Massimo Failla Our committee’s sessions 8 LABLAW Studio Legale, Milan [email protected] Articles Rebecca Ford United States immigration options for employing Clyde & Co, Dubai lower-skilled foreign workers 10 [email protected] Employment law challenges facing startup companies 13 International Bar Association Tel: +44 (0)20 7842 0090 www.ibanet.org Providing healthcare benefits in the United States: the affordable care act 16 © International Bar Association 2016. All rights reserved. No part of this publication may be reproduced New technology and work: robotics and its positive/ or transmitted in any form or by any means, or stored in any retrieval system of any nature without the prior permission of the negative impact on the labour force 20 copyright holder. Application for permission should be made to the Director of Content at the IBA address. Facing change – regulation and technology 23 Terms and Conditions for submission of articles The On-Demand economy and the impact on 1. Articles for inclusion in the newsletter should be sent to the Newsletter Editor. employment law 25 2. The article must be the original work of the author, must not have been previously published, and must not currently be under consideration by another journal.
    [Show full text]
  • A Comparative Study of Financial Crimes and Criminal Networks in the United States
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Where Political Extremists and Greedy Criminals Meet: A Comparative Study of Financial Crimes and Criminal Networks in the United States Author: Roberta Belli, LL.M., Ph.D. Document No.: 234524 Date Received: June 2011 Award Number: 2009-IJ-CX-0006 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. WHERE POLITICAL EXTREMISTS AND GREEDY CRIMINALS MEET: A COMPARATIVE STUDY OF FINANCIAL CRIMES AND CRIMINAL NETWORKS IN THE UNITED STATES by Roberta Belli A dissertation submitted to the Graduate Faculty in Criminal Justice in partial fulfillment of the requirements for the degree of Doctor of Philosophy, The City University of New York 2011 This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S.
    [Show full text]
  • The Job Creation Shell Game: Ending the Wasteful Practice of Subsidizing Companies That Move Jobs from One State to Another
    January 2013 The Job Creation Shell Game: Ending the Wasteful Practice of Subsidizing Companies that Move Jobs From One State to Another by Greg LeRoy, Kasia Tarczynska, Leigh McIlvaine, Thomas Cafcas and Philip Mattera A Publication of: Good Jobs First January 2013 © Copyright 2013 Good Jobs First. All Rights Reserved. Acknowledgements Good Jobs First gratefully acknowledges the assistance of various organiza- tions and individuals. Any errors or omissions are ours, not theirs. ThanksWe wish also to to:thank Noah the Berger state ofand the local Massachusetts economic development Budget and Policy officials Center; and Amythe staffers Blouin andof regional Traci Gleason business of theorganizations Missouri Budgetwho answered Project; Kateour queries.Brew- ster of the Center for Economic Progress in Rhode Island; Brett Bursey of - nomic Development Council; Allan Freyer of the North Carolina Budget and Taxthe SouthCenter; Carolina Bill Howell Progressive of Tennesseans Network; forJeff Fair Finkle Taxation; of the InternationalChad Johnson Eco of AFSCME Local 1733 in Memphis; Gordon MacInnes and Jon Whiten of New Jersey Policy Perspective; Craig McDonald of Texans for Public Justice; James Parrott of the Fiscal Policy Institute in New York; Zach Schiller of Policy Matters Ohio; Andria Signore of the Edward Lowe Foundation; Wesley Tharpe of the Georgia Budget and Policy Institute; Don Walls of Walls & Associates; and Angie Wei and Sara Flocks of the California Labor Federation. Finally, thanks to our own Good Jobs New York director Bettina
    [Show full text]
  • Oklahoma Property Developer Sent to Prison for Money Laundering - 29 December 2011
    Oklahoma property developer sent to prison for money laundering - 29 December 2011 Derek Swann, a property developer in Oklahoma, has been sentenced to 40 months in prison for money laundering. Swann and his business partner Giovanni Stinson used false information to solicit investors for “The Falls”, their proposed commercial and residential development. According to the prosecution: “From 2006 to 2008, individuals invested more than US$5 million [about £3.2 million] into The Falls based on promises made by Swann. Swann then used investors’ monies for reasons different from what he told them: rather than paying for engineering, architectural or infrastructure costs... Swann used the investments for personal expenses and repayment of earlier investors.” Among the personal expenses cited, Swann and Stinson paid for golf and meals at the Oklahoma City Golf Club and leased BMW cars. The Falls was never completed. In February 2011, Swann admitted misusing some of the $255,000 put into the project by a Texan investor, and has been ordered to pay more than $4.3 million in restitution to more than two dozen investors. Stinson is awaiting sentencing after pleading guilty earlier this year to conspiracy to commit securities fraud. Back to top of page Australian executive to be extradited to the UK to face charges of corruption and money laundering - 29 December 2011 Bruce Hall, an Australian former aluminium executive, will be extradited to the UK to face charges of corruption and money laundering charges related to Alcoa’s sale of Australian alumina to Bahrain. Hall was arrested at his home in New South Wales on 20 October 2011 as part of an investigation by the Serious Fraud Office into millions of dollars allegedly paid by Alcoa to gain aluminium contracts.
    [Show full text]
  • 1996 Annual Report
    1996 ANNUAL REPORT U.S. FEDERAL TRADE COMMISSION WASHINGTON, D.C. Annual Report of the Federal Trade Commission For Fiscal Year Ended September 30, 1996 For sale by the Superintendent of Documents, U.S. Government Printing Office, Washington, D.C. 20402 Prepared by Bureau of Competition Judith Bailey, Patricia Foster, James Mongoven Bureau of Consumer Protection Darlene Cossette, Clovia Hutchins, Ruth Sacks Bureau of Economics Janice Johnson, Paul Pautler, William Rosano, Michael Wise Office of the Executive Director Richard Arnold, Elliott Davis, James Giffin, Keith Golden, Julius Justice Office of Information and Technology Management Marie Barrett, Erika Beard, Kristine Titzer FEDERAL TRADE COMMISSION - 1996 ROBERT PITOFSKY, Chairman MARY L. AZCUENAGA, Commissioner JANET D. STEIGER, Commissioner ROSCOE B. STAREK, III, Commissioner CHRISTINE A. VARNEY, Commissioner DONALD S. CLARK, Secretary EXECUTIVE OFFICES OF THE FEDERAL TRADE COMMISSION Pennsylvania Avenue at Sixth Street, N.W. Washington, D.C. 20580 Regional Offices Atlanta, Georgia Denver, Colorado Suite 5M35, Midrise Building Suite 1523 60 Forsyth Street, S.W. 1961 Stout Street Zip Code: 30303 Zip Code: 80294-0101 Phone: (404) 656-1390 Phone: (303) 844-2272 Boston, Massachusetts Los Angeles, California Suite 810 Room 13209 101 Merrimac Street 11000 Wilshire Boulevard Zip Code: 02114-4719 Zip Code: 90024 Phone: (617) 424-5960 Phone: (310) 235-4040 Chicago, Illinois New York, New York Suite 1860 13th Floor 55 East Monroe Street 150 William Street Zip Code: 60603-5701 Zip Code: 10038 Phone: (312) 353-8156 Phone: (212) 264-8290 Cleveland, Ohio San Francisco, California Suite 520-A Suite 570 668 Euclid Avenue 901 Market Street Zip Code: 44114 Zip Code: 94103 Phone: (216) 522-4210 Phone: (415) 356-5270 Dallas, Texas Seattle, Washington Suite 2150 Suite 2896 1999 Bryan Street 915 Second Avenue Zip Code: 75201 Zip Code: 98174 Phone: (214) 979-9350 Phone: (206) 220-6350 FEDERAL TRADE COMMISSION 1996 ANNUAL REPORT Contents Page COMMISSIONERS ......................................................
    [Show full text]
  • In a Company, Payroll Is the Sum of All Financial Records of Salaries for an Employee, Wages, Bonuses and Deductions
    In a company, payroll is the sum of all financial records of salaries for an employee, wages, bonuses and deductions. In accounting, payroll refers to the amount paid to employees for services they provided during a certain period of time. Payroll plays a major role in a company for several reasons. From an accounting point of view, payroll is crucial because payroll and payroll taxes considerably affect the net income of most companies and they are subject to laws and regulations (e.g. in the US payroll is subject to federal and state regulations). From ethics in business viewpoint payroll is a critical department as employees are responsive to payroll errors and irregularities: good employee morale requires payroll to be paid timely and accurately. The primary mission of the payroll department is to ensure that all employees are paid accurately and timely with the correct withholdings and deductions, and to ensure the withholdings and deductions are remitted in a timely manner. This includes salary payments, tax withholdings, and deductions from a paycheck. Payroll taxes Government agencies at various levels require employers to withhold income taxes from employees' wages.[1] In the United States, "payroll taxes" are separate from income taxes, although they are levied on employers in proportion to salary; the programs they fund include Social Security, and Medicare. U.S. income and payroll taxes collected through deductions are considered to be trust fund taxes, because the employer holds the deducted money in trust for later remittance. [edit] Payroll Taxes in U.S. Before considering the payroll taxes we need to talk about the Basic Formula for the Net Pay.
    [Show full text]
  • Guide to Preventing Mail Fraud
    U.S. Postal Inspection Service Guide to Preventing Mail Fraud Contents 2 What Is Mail Fraud? 3 Sweepstakes and ‘Free’ Prizes 4 ‘Free’ Vacations 5 Government Look-Alike Mail 6 Solicitations Disguised as Invoices 7 Foreign Lotteries 8 Chain Letters 9 Charity Fraud 10 Insurance Fraud 11 Medical Fraud 12 Internet Fraud 13 Phony Inheritance Schemes 14 Home Improvement and Home Repair Fraud 15 Investment Fraud 16 Fees Charged for Normally Free Services 17 Advance-Fee Loans 18 Credit Repair and Credit Card Schemes 19 Work-at-Home Offers 20 Distributorship and Franchise Fraud 21 Phony Job Opportunities 22 Unsolicited Merchandise 23 Reshipping Fraud 24 Fake Check Scams 25 How to Contact the Postal Inspection Service Guide To Preventing Mail Fraud 1 What Is Mail Fraud? It’s a scheme to get money or something of value from you by offering a product, service, or investment opportunity that does not live up to its claims. Prosecutors must prove the claims were intentionally misrepresented and that the mail was used to carry out the scheme. Although most mail-order companies are honest and stand behind their products and services, unfortunately there are a few rotten apples who give direct mail advertisers a bad name. They cheat people by peddling worthless products, medical quackery, and get-rich-quick schemes. Some fly-by-nights take your money and send you nothing. Unscrupulous businesses don’t mind taking advantage of an unwary customer. “Let the buyer beware” is their motto — and you might be the buyer. Mail fraudsters frequently rely on the same old tricks.
    [Show full text]
  • Online Training for Franchising Franchise Directories Franchise
    Use these Franchise Links and Resources to learn how to get started with franchising — either buying a franchise, starting a new franchise or selling a franchise. Don’t forget you can receive free or low-cost training and free professional business advice, from your local Small Business Development Center! Get started with Your Free Business Plan from our Business Plans page. Online Training for Franchising Franchising Basics – SBA FranNet Franchise Directories Bison, The Franchise Network – portal site for franchise opportunities. Franchise Directory – directory of franchise opportunities. Franchise Times – web site for Franchise Times magazine. Site includes a franchise directory International Franchise Association – includes links to franchise companies. USA Today Business Opportunities – a listing of franchise opportunities. Franchise Opportunity Evaluation American Association of Franchisees & Dealers – association helps franchisees evaluate franchise opportunities. Bibby Group – due diligence, successes of franchising, how to franchise a business all from an expert in the field. Entrepreneur Magazine Franchise Zone – articles about evaluating franchises and franchising your own business. Franchise Workshop – evaluate franchises and your readiness to operate a franchise with this online workshop developed by the SBA. Consumer Guide to Buying a Franchise – The Federal Trade Commission provides advice on avoiding costly pitfalls before buying a franchise. Could Biz Opp Offers Be Out for Your Coffers? – Under the FTC Franchise Rule, most potential business purchasers have the right to receive information about the earnings potential of a business opportunity. Most legitimate business opportunity promoters don’t hesitate to give this information. This guide helps new business owners how to understand, spot, and avoid fraudulent business opportunities.
    [Show full text]
  • An Exploratory Study on the Role of Corruption in International Labor Migration
    January 2016 An Exploratory Study on the Role of Corruption in International Labor Migration 1 2 Background In the 2013 white paper, “Corruption and Labor Trafficking in Global Supply Chains,” Verité detailed how fraud, corruption, bribery, and other illegal practices are common features of the international recruitment of migrant workers. The myriad official approvals, documents, and associated fees – foreign worker quotas, job order attestations, exit and guest worker visas, medical certifications, police clearances, work permits etc. – required to deploy a migrant worker from one country to another mean the opportunities and incentives for employers and their recruitment agents to bribe civil servants have become a structural feature of the international labor migration process. Since recruitment agents and employers ultimately transfer most, if not all, of the upfront costs of employment to foreign migrant workers, both of these Executive Summary Executive forms of recruitment-related corruption directly contribute to the excessive and illegal fee burdens frequently faced by migrant workers. In this way corruption is a significant contributing element to migrant worker vulnerability to debt bondage, human trafficking, and forced labor. Further, Verité and others have pointed out that the corrupt activities all too common in migrant worker recruitment also create potential legal risk for companies under origin and destination country laws as well as extraterritorial anti-corruption statutes such as the US Foreign Corrupt Practices Act (FCPA) and the UK Bribery Act (UKBA). Because multinationals can be liable for the acts of their foreign subsidiaries, franchisees, joint venture entities, and even suppliers that use third party employment agencies under a number of legal theories including traditional agency principles, the risk arises where corrupt payments result in a direct or indirect benefit to an employer – an improper advantage – through cheap migrant labor or the avoidance of the upfront costs of employment.
    [Show full text]