Go to top of page

Corruption Prevention Myths

ACLEI Top 5 Corruption Prevention Myths

Assumptions can hinder effective corruption prevention. ACLEI has identified 5 common assumptions, or corruption prevention myths, that can limit the ways we might approach managing corruption risk.

Click the tabs below to discover the myths

Myth 1 image

Bad Apples

Thinking that corruption is always the domain of a ‘bad apple’ or rogue employee— a corrupt individual acting alone— can draw attention away from considering organisational vulnerability and integrity systems as a whole.

While risk exists from the ‘malicious insider’, corruption also arises from unguarded opportunity. Relying on the belief that corruption risk resides entirely within the individual might mean that organisations concentrate on catching and removing offenders without a corresponding focus on risk management and prevention.

Organisations can further protect themselves by providing a work environment in which professional standards are valued and integrity measures are easy to follow, essentially becoming their “governing ethos”1.

For more information about considering broader risk, see our page about Corruption Resistance

1 Paine, L (1994) Managing for organisational integrity. Harvard Business Review

Myth 2 image

It’s all about the Money

Assuming that vulnerability to corruption is always driven by financial gain can mean missing possible indicators. Personal benefit might take other forms, such as social reward, ideological satisfaction, or excitement.

Corruption vulnerability may increase where an employee’s personal values do not align with an organisation’s professional standards. Risk may also be heightened during periods of significant change, industrial action, or during the implementation of new policy or strategy.

Robust pre-employment screening is a key mechanism for identifying potential employees whose values may not align with an organisation’s expectations. Clear policy on managing and declaring conflict of interest is also important, as it encourages supervisors to get to know their staff and confidently ask them appropriate questions about risk.

For more information about ensuring Values Alignment, see our website

Myth 3 image

The Training Fix-all

Limiting corruption prevention to formal training as a sole prevention mechanism might lessen impact. Learning theory tells us that the overwhelming majority of adult learning happens on the job and through interactions with others2.

Formal training and education is often the first solution offered when issues become apparent—because it’s measurable and quickly implementable. However, organisations should appreciate the influence that informal situations have on establishing a desired culture.

Where training is necessary, factor in the risk of creating a program suited for the ‘average’ employee, which may ultimately be of limited relevance to your target audience. More importantly, it is essential that frontline supervisors and senior staff model desired behaviour to foster a culture of integrity.

For more information about ensuring Leadership and Culture, see our website.

Myth 4 image

The Slippery Slope

Believing that the ‘slippery slope’ to corruption is inevitable because of making one mistake or poor decision can be self-perpetuating. Early intervention is possible, if organisation integrity systems are strong, fair and employees have trust in them.

Supervisors and senior staff should foster a culture which acknowledges the inevitability of mistakes and doesn’t punish those seeking assistance to correct them. This empowers staff to take accountability for their decisions, and to report risks rather than attempting to manage them alone.

For an example of a case where poor behaviour escalated into corruption, see the Operation Marlowe Investigation Report, available on our website:

Myth 5 image

It’s all in the Front Line

Supposing that ‘Back office’ staff could not be as vulnerable to compromise as front-line operational staff can create blind spots.

Non-operational staff may be as vulnerable, and less prepared to respond, to improper approaches. Many have similar or higher levels of access to sensitive information and systems as their operational colleagues do.

Organisations should understand and communicate to their staff the value of the information they hold, and provide them with the tools to identify grooming and inappropriate approaches for information.

For an example of a case where ‘super-user’ access created corruption vulnerability, see the Operation Galaxy Investigation Report. For more information about ACLEI’s Asset Protection Model, see our website.

View as PDF