Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Compliance

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 105

Full-Text Articles in Business

Dentistry And The Law: Don’T Overlook Corporate Transparency Act Compliance, Daniel Schulte Jd Aug 2024

Dentistry And The Law: Don’T Overlook Corporate Transparency Act Compliance, Daniel Schulte Jd

The Journal of the Michigan Dental Association

Under the Corporate Transparency Act (CTA), entities existing as of January 1, 2024, must report beneficial ownership to FinCEN by December 31, 2024. Beneficial owners include those with 25% ownership or substantial control. Required information includes legal name, birthdate, address, and ID details. Non-compliance can result in severe civil and criminal penalties. Exceptions may apply for tax-exempt entities and large companies. Legal challenges to the CTA are ongoing, but compliance is advised.


Revolutionising Nonprofit Verification With Ai Powered Intelligence, J Unsdorfer Jun 2024

Revolutionising Nonprofit Verification With Ai Powered Intelligence, J Unsdorfer

Journal of Nonprofit Innovation

In an era where stakeholders increasingly demand clarity and honesty, the importance of corporate transparency has reached unprecedented levels. Both businesses and nonprofits are now faced with the challenge of effectively demonstrating their integrity and trustworthiness. Artificial intelligence (AI) offers promising solutions to these challenges by enabling deeper insights into corporate relationships. Venturefy, an Israel-based company, is at the forefront of this movement, using AI to decode complex data sets and verify corporate connections. This article explores how AI works, Venturefy’s unique approach to transparency, and its significant partnership with WikiCharities to enhance transparency in the nonprofit sector.


The Market For Corporate Criminals, Andrew K. Jennings Jan 2023

The Market For Corporate Criminals, Andrew K. Jennings

Faculty Articles

This Article identifies problems and opportunities at the intersection of mergers and acquisitions (M&A) and corporate crime and compliance. In M&A, criminal successor liability is of particular importance, because it is quantitatively less predictable and qualitatively more threatening to buyers than successor liability in tort or contract. Private successor liability requires a buyer to bear bounded economic costs, which can in turn be reallocated to sellers via the contracting process. Criminal successor liability, however, threatens a buyer with non-indemnifiable and potentially ruinous punishment for another firm’s wrongful acts.

This threat may inhibit the marketability of businesses that have criminal exposure, …


Governance, Risk And Compliance (Grc) In Digital Transformation: Investor Views, Clarence Goh, Yuanto Kusnadi, Gary Pan, Poh Sun Seow Nov 2022

Governance, Risk And Compliance (Grc) In Digital Transformation: Investor Views, Clarence Goh, Yuanto Kusnadi, Gary Pan, Poh Sun Seow

Research Collection School Of Accountancy

Companies are embracing digital transformation to enhance their competitiveness. Existing studies show that it is important for companies to manage the governance, risk, and compliance (GRC) aspects of their digital transformation initiatives. While companies are increasingly understanding the importance of the role of GRC in digital transformation, it is unclear from the investors’ views. Thus, this study examines whether investors are placing importance on the role of GRC in digital transformation for their investment decisions. The results show that investors care about the GRC aspects of digital transformation initiatives undertaken by companies. The findings of this study are consistent with …


10-Minute Ebd: Is Oil-Pulling Useful In Treating Periodontal Disease?, Heather Willey Rda Nov 2022

10-Minute Ebd: Is Oil-Pulling Useful In Treating Periodontal Disease?, Heather Willey Rda

The Journal of the Michigan Dental Association

The 10-Minute Evidence-Based Dentistry Column illustrates how to implement the evidence-based dentistry search process to quickly identify and apply the best literature to answer a clinical question. Through critical appraisal, the author of this article answers the clinical question: Is Oil-Pulling Useful in Treating Periodontal Disease? Examining the potential utility of oil-pulling as a treatment for periodontal disease and comparing it to conventional periodontal therapies. The study conducted an evidence-based search using various databases and keywords related to oil-pulling, periodontal disease, and oral health. The results revealed that oil-pulling is not a substitute for standard oral hygiene practices, and insufficient …


Are All Risks Created Equal? Rethinking The Distinction Between Legal And Business Risk In Corporate Law, Adi Libson, Gideon Parchomovsky Aug 2022

Are All Risks Created Equal? Rethinking The Distinction Between Legal And Business Risk In Corporate Law, Adi Libson, Gideon Parchomovsky

All Faculty Scholarship

Should corporate legal risk be treated similarly to corporate business risks? Currently, the law draws a clear-cut distinction between the two sources of risk, permitting the latter type of risk and banning the former. As a result, fiduciaries are shielded from personal liability in the case of business risk and are entirely exposed to civil and criminal liability that arises from legal risk-taking. As corporate law theorists have underscored, the differential treatment of business and legal risk is highly problematic from the perspective of firms and shareholders. To begin with, legal risk cannot be completely averted or eliminated. More importantly, …


How Do People Justify Not Paying Their Taxes? A Study On Moral Disengagement And Tax Evasion, Grace M. Hufff Jun 2022

How Do People Justify Not Paying Their Taxes? A Study On Moral Disengagement And Tax Evasion, Grace M. Hufff

Doctor of Business Administration (DBA)

Early studies on the reasons for tax evasion focused on economics. When economic reasons were deemed insufficient to explain all decisions, researchers added psychological and sociological constructs to their explorations. These studies focused on whether taxpayers see their tax compliance decisions as ethical ones. For those who believe their choice is ethical, they must come to grips with their own internal ethical standards and feelings of guilt when they make an unethical decision. They must then employ some mechanism to disconnect these feelings of guilt from their unethical decision. Researchers have characterized this mechanism of disconnection as neutralization, rationalization, and/or …


Strategies To Reduce Corrupt Practices At The Firm Level In Nigeria, Alexander Iloka Rajis Jan 2022

Strategies To Reduce Corrupt Practices At The Firm Level In Nigeria, Alexander Iloka Rajis

Walden Dissertations and Doctoral Studies

Corruption is harmful to businesses and impedes performance and growth. When business leaders fail to mitigate fraud and corruption, their business and the local economy suffer. Grounded in the principal-agent theory and the integrative social contract theory, the purpose of this qualitative multiple case study was to explore strategies business leaders in Nigeria use to reduce firm-level corrupt practices. The participants were six anticorruption officers at three firms who implemented successful strategies to reduce corrupt practices to enhance performance. Data collected came from semistructured interviews and company documents. Five themes emerged from the thematic analysis: bribery and corruption are part …


Exploring Business Strategies For Assuring Compliance To Changes In Employment Law, Kyla M. Vanchieri Jan 2022

Exploring Business Strategies For Assuring Compliance To Changes In Employment Law, Kyla M. Vanchieri

Walden Dissertations and Doctoral Studies

Noncompliance with employment and labor laws can result in compensatory and punitive damages, adversely impacting business profitability. Human Resources (HR) personnel who lack strategies to anticipate and react to changes in employment laws risk penalties for noncompliance, resulting in reduced profitability. Grounded in the top-down model of adaptation and political risk management, the purpose of this qualitative multiple case study was to explore strategies some HR personnel use to anticipate and react to changes in employment laws to avoid compensatory and punitive damages. The participants included nine HR personnel from nine organizations in the District of Columbia, Maryland, and Virginia …


Strategies For Banks Anti-Money Laundering/Counter-Terrorism Finance Compliance Programs To Protect Financial Systems, Pamela L. Connell Jan 2022

Strategies For Banks Anti-Money Laundering/Counter-Terrorism Finance Compliance Programs To Protect Financial Systems, Pamela L. Connell

Walden Dissertations and Doctoral Studies

Ineffective implementation of anti-money laundering (AML) compliance programs exposes the vulnerability of banks’ and increases the threats of money laundering and terrorist financing. The banking community must address the threat of money laundering and terrorism finance to protect the global financial system from abuse. Grounded in the fraud management lifecycle theory, the purpose of this qualitative multiple case study was to explore strategies to reduce threats of money laundering and terrorist financing. Data were collected from semistructured interviews, a review of bank policy documents, and previous Bank Secrecy Act (BSA) cases. The participants comprised six BSA/AML compliance officers at banks …


The Role Of Firm-Level Pdo In Asymmetrically Dependent Marketing Channel Relationships, Yuerong Liu Jan 2022

The Role Of Firm-Level Pdo In Asymmetrically Dependent Marketing Channel Relationships, Yuerong Liu

Graduate Theses, Dissertations, and Problem Reports

This dissertation introduces power distance orientation (PDO) at firm level to extend the traditional view of power/dependence asymmetry. The traditional view suggests that the powerful firm will exploit its power for its own interest, and the dependent firm will engage in a preemptive strike (e.g., engage in self-interested, guileful behaviors before the powerful partner exploits them) due to its fear of being exploited. As a result, power/dependence asymmetry leads to deleterious relationship outcomes. Yet, power dependence theory does not consider the role of power dependence orientation, which is a firm’s acceptance of unequally distributed power. This dissertation consists of three …


The Role Of Response Efficacy And Risk Aversion In Promoting Compliance During Crisis, Veronica L. Thomas, Hooman Mirahmad, Grace Kemper Jan 2022

The Role Of Response Efficacy And Risk Aversion In Promoting Compliance During Crisis, Veronica L. Thomas, Hooman Mirahmad, Grace Kemper

Marketing Faculty Publications

This research examines consumers' compliance with behaviors that focus on preventing the spread of COVID‐19. Drawing on Protection Motivation Theory and research on efficacy, we find that, during a pandemic, consumers who have higher perceptions of response efficacy are less likely to engage in risky consumption behaviors (Study 1) and more likely to engage in protective consumption behaviors (Study 2). This effect is moderated by risk aversion, such that as risk aversion increases, COVID‐compliant behaviors increase even when consumers do not believe in their ability to effectuate change. Further, the relationship between response efficacy and COVID‐compliant behaviors is mediated by …


Miracle 14: Transparency In Indonesia’S State-Owned Enterprises, Muhammad Yasin, Harsanto Nursadi Oct 2021

Miracle 14: Transparency In Indonesia’S State-Owned Enterprises, Muhammad Yasin, Harsanto Nursadi

BISNIS & BIROKRASI: Jurnal Ilmu Administrasi dan Organisasi

In administrative science and administrative law, public information disclosure has universally recognized as important partway to good governance. There is an explosive recognition of the world to freedom of information act. Freedom of information or right to information is a inseparable part of transparency principle in governance. Enacting freedom of information act is an effort not only to make government better, but also to create trust among government, the business, and citizens. Indonesia has enacted Act Number 14/2008 (FOI Act) and run into force in 2010, which contains 14 obligations to State-Owned Enterprises (SOE’s). This paper will focus to elaborate …


An Empirical Examination Of The Impact Of Organizational Injustice And Negative Affect On Attitude And Non-Compliance With Information Security Policy, Celestine Kemah Jan 2021

An Empirical Examination Of The Impact Of Organizational Injustice And Negative Affect On Attitude And Non-Compliance With Information Security Policy, Celestine Kemah

CCE Theses and Dissertations

Employees’ non-compliance with Information Security (IS) policies is an important socio-organizational issue that represents a serious threat to the effective management of information security programs in organizations. Prior studies have demonstrated that information security policy (ISP) violation in the workplace is a common significant problem in organizations. Some of these studies have earmarked the importance of this problem by drawing upon cognitive processes to explain compliance with information security policies, while others have focused solely on factors related to non-compliance behavior, one of which is affect. Despite the findings from these studies, there is a dearth of extant literature that …


Deterrence Theory: Key Findings And Challenges, Alex Raskolnikov Jan 2021

Deterrence Theory: Key Findings And Challenges, Alex Raskolnikov

Faculty Scholarship

This chapter reviews the key findings of the optimal deterrence theory and discusses the remaining challenges. Some of these challenges reflect current modeling choices and limitations. These include the treatment of the offender’s gains in the social welfare function; the design of the damages multiplier in a realistic, multi-period framework; the effects of different types of uncertainty on behavior; and the study of optional, imperfectly enforced, threshold-based regimes – that is, regimes that reflect the most common real-world regulatory setting. Other challenges arise because several key regulatory features and enforcement outcomes are inconsistent with the deterrence theory’s predictions and prescriptions. …


How Youtube Health Vloggers Influence Viewer Compliance: The Interplay Between Vlogger Characteristics, Parasocial Interaction, And Viewer Characteristics, Md Nazmus Sakib Aug 2020

How Youtube Health Vloggers Influence Viewer Compliance: The Interplay Between Vlogger Characteristics, Parasocial Interaction, And Viewer Characteristics, Md Nazmus Sakib

Theses and Dissertations

Drawing on the notion of parasocial interaction (PSI) theory (Horton and Wohl, 1956), this dissertation provides a framework to demonstrate how YouTube health vloggers can influence viewer compliance intention toward a prescribed health behavior (i.e., weight-loss diet to lose weight). Initially, drawing on the discounting principles of attribution theory (Kelly, 1973), physical attractiveness stereotype (Eagly et al., 1991), and the black sheep effect (Marques and Yzerbyt, 1988), the interaction effects of three vlogger characteristics on viewer PSI experience were conceptualized and examined (Study 1). Then by using a scenario-based experiment, viewer PSI experience with the vlogger was manipulated (high vs. …


Impact Of Sanctions And Awareness On Intention To Comply With Information Security, Kevin Fitzgerald Jan 2020

Impact Of Sanctions And Awareness On Intention To Comply With Information Security, Kevin Fitzgerald

Walden Dissertations and Doctoral Studies

Employees in higher education are likely to violate information security policies because of the open nature of academic institutions. Policy violations can lead to data breaches and identity theft that can cause harm to businesses and individuals. The purpose of this quantitative, correlational, cross-sectional study based on general deterrence theory and neutralization theory was to analyze the relationships between the independent variables, severity of sanctions, vulnerability to sanctions, and awareness of consequences, and the dependent variable, intention to comply with information security policy. Participants (n=100) who work in a higher education institution with an information security policy completed an online …


Blockchain And Insurance: A Review For Operations And Regulation, Richard Brophy Jan 2020

Blockchain And Insurance: A Review For Operations And Regulation, Richard Brophy

Articles

The purpose of this paper is to examine the operational and regulatory positions of the employment of Blockchain in the insurance industry. Blockchain technology has attracted wide interest from various stakeholders. Many theorists are predicting that this technology will disrupt financial services, including insurance. As stated that the development of blockchain is dependent on regulatory acceptance of this technology, it is essential to establish the current state of play with regard to the application and use of blockchain from a commercial and regulatory standpoints.


It Security Policy Compliance: A University Perspective, Jack D. Barnes Jan 2020

It Security Policy Compliance: A University Perspective, Jack D. Barnes

Honors Theses and Capstones

No abstract provided.


Management-Based Regulation, Cary Coglianese, Shana M. Starobin Jan 2020

Management-Based Regulation, Cary Coglianese, Shana M. Starobin

All Faculty Scholarship

Environmental regulators have embraced management-based regulation as a flexible instrument for addressing a range of important problems often poorly addressed by other types of regulations. Under management-based regulation, regulated firms must engage in management-related activities oriented toward addressing targeted problems—such as planning and analysis to mitigate risk and the implementation of internal management systems geared towards continuous improvement. In contrast with more restrictive forms of regulation which can impose one-size-fits-all solutions, management-based regulation offers firms greater operational choice about how to solve regulatory problems, leveraging firms’ internal informational advantage to innovate and search for alternative measures to achieve the intended …


Inducing Compliance With Post-Market Studies For Drugs Under Fda’S Accelerated Approval Pathway, Liang Xu, Hui Zhao, Nicholas C. Petruzzi Jan 2020

Inducing Compliance With Post-Market Studies For Drugs Under Fda’S Accelerated Approval Pathway, Liang Xu, Hui Zhao, Nicholas C. Petruzzi

Department of Supply Chain Management and Analytics: Faculty and Staff Publications

Problem definition: In 1992, FDA instituted the accelerated approval pathway (AP) to allow promising drugs to enter the market based on limited evidence of efficacy, thereby permitting manufacturers to verify true clinical benefits through post-market studies. However, most postmarket studies have not been completed as promised. We address this non-compliance problem.

Academic/Practical Relevance: The prevalence of this non-compliance problem poses considerable public health risk, thus compromising the original purpose of a well-intentioned AP initiative. We provide an internally consistent and implementable solution to the problem through a comprehensive analysis of the myriad complicating factors and tradeoffs facing FDA.

Methodology: We …


Complex Compliance Investigations, Veronica Root Martinez Jan 2020

Complex Compliance Investigations, Veronica Root Martinez

Faculty Scholarship

Whether it is a financial institution like Wells Fargo, an automotive company like General Motors, a transportation company like Uber, or a religious organization like the Catholic Church, failing to properly prevent, detect, investigate, and remediate misconduct within an organization’s ranks can have devastating results. The importance of the compliance function is accepted within corporations, but the reality is that all types of organizations—private or public—must ensure their members com­ply with legal and regulatory mandates, industry standards, and internal norms and expectations. They must police thousands of members’ compli­ance with hundreds of laws. And when compliance failures occur at these …


More Meaningful Ethics, Veronica Root Martinez Jan 2020

More Meaningful Ethics, Veronica Root Martinez

Faculty Scholarship

Firms have exponentially increased their investment in the creation and implementation of ethics and compliance programs over the past fifteen years. The convergence of more robust corporate enforcement actions and more sophisticated industry standards and practices surrounding compliance efforts has created a booming compliance industry with commonly accepted standards and responsibilities. Within these efforts is a formal acknowledgment by the government, industry leaders, and academics that ethics has a role to play in helping to prevent misconduct within firms and that compliance without concern for ethics is insufficient. The reality, however, is that within firms’ efforts to implement effective ethics …


Employee Compliance To Information Security In Retail Stores, Bertrand Muhire, Ramakrishna Ayyagari Dec 2019

Employee Compliance To Information Security In Retail Stores, Bertrand Muhire, Ramakrishna Ayyagari

Communications of the IIMA

Retail industry has suffered some of the biggest data breaches in recent times. Organizations are deploying technological tools to limit data breaches. However, purely technological solution is not going to be sufficient because human-factor is often considered to be the weakest link in Information Security. In this paper, the authors investigate the behavioral aspect of information security in a retail setting. Specifically, the factors that influence compliance behaviors to information security policies (ISP) in retail stores are identified. Attitude, awareness, and sanctions are proposed as key variables that influence compliance intentions to ISP. The authors test the proposed model using …


End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn Dec 2019

End-Users Compliance To The Information Security Policy: A Comparison Of Motivational Factors, Peter Straver, Pascal Ravesteyn

Communications of the IIMA

Business information, held within information systems, is critical for most organizations. To protect these critical information assets, security controls should be deployed which might come as a hindrance for the end-users. The Information Security Policies (ISP) give direction to their behaviors. Organizations can focus on conditions likely to promote so-called motivational factors influencing the end-users intentions to perform the desired behavior of compliance to ISP in order to protect these information assets.

In total, six motivational factors, applicable to intentions on compliance, are found during research and are measured within five organizational contexts. From the measurements and analysis is learned, …


Corporate Leverage, Constraints, And Compliance, Abdullah Khaled Alnamlah Aug 2019

Corporate Leverage, Constraints, And Compliance, Abdullah Khaled Alnamlah

University of New Orleans Theses and Dissertations

The first chapter evaluates the zero-leverage effect on firms' financial constraints. Moreover, using investment- and cash-to-cash-flow sensitivities as financial constraint indicators, the results suggest that unleveraged firms are expected to face lower constraints relative to leveraged firms. Lastly, the results indicate that the zero-leverage effect on firms’ financial constraints is more likely stronger for smaller firms, zero-dividend firms, firms with lower proportions of tangible assets, and growth firms. The second chapter develops a new quantitative measure that reflects the extent to which a firm complies to Shariah relative to the other firms located in a certain region at a certain …


The Double-Edged Sword Of Jurisdictional Entrenchment: Explaining Human Resources Professionals’ Failed Strategic Repositioning, Kurt Sandholtz, Daisy Chung, Isaac Waisberg Jul 2019

The Double-Edged Sword Of Jurisdictional Entrenchment: Explaining Human Resources Professionals’ Failed Strategic Repositioning, Kurt Sandholtz, Daisy Chung, Isaac Waisberg

Faculty Publications

To protect themselves against deskilling and obsolescence, professionals must periodically revise their claims to authority and expertise. Although we understand these dynamics in the broader system of professions, we have a less complete understanding of how this process unfolds in specific organizational contexts. Yet given the ubiquity of embedded professionals, this context is where jurisdictional shifts increasingly take place.Drawing on a comparative ethnographic study of human resources (HR) professionals in two engineering firms, we introduce the concept of jurisdictional entrenchment to explain the challenges embedded professionals face when they attempt to redefine their jurisdiction. Jurisdictional entrenchment describes a condition in …


Service Now: Cmdb Research, Monika Patel, Smita Patil, Katerina Tzanavara, Manish Chauhan, Yuhao Wang, Houmin Xie, Lei Shi May 2019

Service Now: Cmdb Research, Monika Patel, Smita Patil, Katerina Tzanavara, Manish Chauhan, Yuhao Wang, Houmin Xie, Lei Shi

School of Professional Studies

The MAPFRE Capstone team has been tasked with reviewing and recommending roadmap on the existing CMDB configuration. Paper discusses the team’s overall research on ServiceNow CMDB, Client’s deliverables and introduction to the latest technological innovations. Based on given objectives and team’s analysis we have recommended key solutions for the client to better understand the IT environment areas of business service impact, asset management, compliance, and configuration management. In addition, our research has covered all the majority of the technical and functional areas to provide greater visibility and insight into existing CMDB and IT environment.


The Informed Human Firewall: The Impact Of Knowledge Dimensions On Employees' Secure Behavior, Ashraf Mady Apr 2019

The Informed Human Firewall: The Impact Of Knowledge Dimensions On Employees' Secure Behavior, Ashraf Mady

PhD in Business Administration Dissertations

Organizations implement a variety of knowledge mechanisms such as information security education, training, and awareness (SETA) programs and information security policies to influence employees’ secure behavior. However, skills gained through these knowledge mechanisms have not always translated to secure behavior. Protection motivation theory (PMT) is a widely used and accepted theory in information security behavioral research. Nevertheless, information security research has not examined the impact of knowledge mechanisms on PMT psychological processes. This study explains the key psychological processes that influence employees’ secure behavior and seeks to understand how organizational knowledge mechanisms influence these key psychological processes that form threats …


The Compliance Process, Veronica Root Jan 2019

The Compliance Process, Veronica Root

Faculty Scholarship

Even as regulators and prosecutors proclaim the importance of effective compliance programs, failures persist. Organizations fail to ensure that they and their agents comply with legal and regulatory requirements, industry practices, and their own internal policies and norms. From the companies that provide our news, to the financial institutions that serve as our bankers, to the corporations that make our cars, compliance programs fail to prevent misconduct each and every day. The causes of these compliance failures are multifaceted and include general enforcement deficiencies, difficulties associated with overseeing compliance programs within complex organizations, and failures to establish a culture of …