Skip to main content Accessibility help
×
Home
Hostname: page-component-99c86f546-swqlm Total loading time: 3.887 Render date: 2021-11-29T15:52:28.449Z Has data issue: true Feature Flags: { "shouldUseShareProductTool": true, "shouldUseHypothesis": true, "isUnsiloEnabled": true, "metricsAbstractViews": false, "figures": true, "newCiteModal": false, "newCitedByModal": true, "newEcommerce": true, "newUsageEvents": true }

Part IX - Analysis of Particular Fields

Published online by Cambridge University Press:  07 May 2021

Benjamin van Rooij
Affiliation:
School of Law, University of Amsterdam
D. Daniel Sokol
Affiliation:
University of Florida
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2021

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Ali, A., and Ahmad, N. (2014). “Trust and Tax Compliance among Malaysian Working Youth.” International Journal of Public Administration 37(7), 389–96. Doi:10.1080/01900692.2013.858353.CrossRefGoogle Scholar
Allingham, M. G., and Sandmo, A. (1972). “Income Tax Evasion: A Theoretical Analysis.” Journal of Public Economics 1, 323–38. Doi:10.1016/0047-2727(72)90010-2.CrossRefGoogle Scholar
Alm, J. (2014). “Does an Uncertain Tax System Encourage ‘Aggressive Tax Planning’?Economic Analysis and Policy 44, 30–8. Doi:10.1016/j.eap.2014.01.004.CrossRefGoogle Scholar
Alm, J., Jackson, B. R., and McKee, M. (2009). “Getting the Word Out: Enforcement Information Dissemination and Compliance Behavior.” Journal of Public Economics 93(3/4), 392402. Doi:10.1016/j.jpubeco.2008.10.007.CrossRefGoogle Scholar
Alm, J., Kirchler, E., and Muehlbacher, S. (2012). “Combining Psychology and Economics in the Analysis of Compliance: From Enforcement to Cooperation.” Economic Analysis and Policy 42, 133–51.Google Scholar
Alm, J., and Torgler, B. (2011). “Do Ethics Matter? Tax Compliance and Morality.” Journal of Business Ethics 101, 635–51.CrossRefGoogle Scholar
Bachmann, R. (2001). “Trust, Power and Control in Trans-organizational Relations.” Organization Studies 22, 337–65.CrossRefGoogle Scholar
Balliet, D., and van Lange, P. A. M. (2013). “Trust Punishment and Cooperation across 18 Societies: A Meta-analysis.” Perspectives on Psychological Science 8, 363–79. Doi:10.1177/1745691613488533.CrossRefGoogle ScholarPubMed
Batrancea, L., Nichita, A., Olsen, J., Kogler, C., Kirchler, E., Hoelzl, E., … Zukauskas, S. (2019). “Trust and Power as Determinants of Tax Compliance across 44 Nations.” Journal of Economic Psychology 74, 102191. Doi.org/10.1016/j.joep.2019.102191.CrossRefGoogle Scholar
Becker, G. S. (1968). “Crime and Punishment: An Economic Approach.” Journal of Political Economy 76(2), 169217.CrossRefGoogle Scholar
Beer, S., Kasper, M., Kirchler, E., and Erard, B. (2015). “Audit Impact Study. Taxpayer Advocate Service Annual Report to Congress.” www.taxpayeradvocate.irs.gov/Media/Default/Documents/2015ARC/ARC15_Volume2_3-AuditImpact.pdf.Google Scholar
Beer, S., Kasper, M., Kirchler, E., and Erard, B. (2017). “Do Audits Deter Future Noncompliance? Evidence on Self-Employed Taxpayers.” IRS Research Bulletin, pp. 911. www.irs.gov/uac/soi-tax-stats-2016-irs-tpc-research-conference.Google Scholar
Benk, S., Çakmak, A. F., and Budak, T. (2011). “An Investigation of Tax Compliance Intention: A Theory of Planned Behavior Approach.” European Journal of Economics, Finance and Administrative Sciences 28(1), 180–8.Google Scholar
Blackwell, C. (2007). “A Meta-analysis of Tax Compliance Experiments.” International Studies Program Working Paper 07–24. Atlanta: Andrew Young School of Policy Studies, Georgia State University.Google Scholar
Blaufus, K., Bob, J., Otto, P. E., and Wolf, N. (2017). “The Effect of Tax Privacy on Tax Compliance: An Experimental Investigation.” European Accounting Review 26, 561–80.CrossRefGoogle Scholar
Bosco, L., and Mittone, L. (1997). “Tax Evasion and Moral Constraints: Some Experimental Evidence.” Kyklos 50, 297324.CrossRefGoogle Scholar
Bougie, R., Pieters, R., and Zeelenberg, M. (2003). “Angry Customers Don’t Come Back, They Get Back: The Experience and Behavioral Implications of Anger and Dissatisfaction in Services.” Journal of the Academy of Marketing Science 31, 377–93. Doi: 10.1177/0092070303254412.CrossRefGoogle Scholar
Braithwaite, V. (2003). Taxing Democracy. Aldershot, UK: Ashgate.Google Scholar
Braithwaite, V. (2009). Defiance in Taxation and Governance: Resisting and Dismissing Authority in a Democracy. Cheltenham, UK: Edward Elgar.CrossRefGoogle Scholar
Braithwaite, V., and Ahmed, E. (2005). “A Threat to Tax Morale: The Case of Australian Higher Education Policy.” Journal of Economic Psychology 26, 523–40.CrossRefGoogle Scholar
Castelfranchi, C., and Falcone, R. (2010). Trust Theory: A Socio-cognitive and Computational Model. Chichester, UK: Wiley.CrossRefGoogle Scholar
Coricelli, G., Joffily, M., Montmarquette, C., and Villeval, M. C. (2010). “Cheating, Emotions, and Rationality: An Experiment on Tax Evasion.” Experimental Economics 13, 226–47. Doi: 10.1007/s10683-010-9237-5.CrossRefGoogle Scholar
Elffers, H. (2000). “But Taxpayers Do Cooperate!” In van Vugt, M., Snyder, M., Tyler, T. R. and Biel, A. (eds.), Cooperation in Modern Society: Promoting the Welfare of Communities, States, and Organizations (pp. 184–94). London: Routledge.Google Scholar
Elffers, H. (2015). “Multiple Interpretations of Rationality in Offender Decision Making.” In Bernasco, W., van Gelder, J.-L. and Elffers, H. (eds.), The Oxford Handbook of Offender Decision Making (pp. 5266). Oxford: Oxford University Press.Google Scholar
Enachescu, J., and Kirchler, E. (2019). “The Slippery Slope Framework of Tax Behaviour: Reviewed and Revised.” In Goslinga, S., van der Hel-van Dijk, L., Mascini, P. and van Steenbergen, A. (eds.), Tax and Trust. Institutions, Interactions and Instruments (pp. 87120). The Hague: Eleven.Google Scholar
Enachescu, J., Olsen, J., Kogler, C., Zeelenberg, M., Breugelmans, S. M., and Kirchler, E. (2019). “The Role of Emotions in Tax Compliance Behavior: A Mixed-Methods Approach.” Journal of Economic Psychology 74. Doi.org/10.1016/j.joep.2019.102194.CrossRefGoogle Scholar
Erard, B., and Feinstein, J. S. (1994). “The Role of Moral Sentiments and Audits Perceptions in Tax Compliance.” Public Finance 49 Supplement, 7089.Google Scholar
Erard, B., Kasper, M., Kirchler, E., and Olsen, J. (2019). “What Influence Do IRS Audits Have on Taxpayer Attitudes and Perceptions? Evidence from a National Survey.” TAS Research and Related Studies. https://taxpayeradvocate.irs.gov/Media/Default/Documents/2018-ARC/ARC18_Volume2_04_InfluenceAudits.pdf.Google Scholar
Farrell, H., and Knight, J. (2003). “Trust, Institutions, and Institutional Change: Industrial Districts and the Social Capital Hypothesis.” Politics and Society 31, 537–66.CrossRefGoogle Scholar
Feld, L. P., and Frey, B. S. (2007). “Tax Compliance as the Result of a Psychological Tax Contract: The Role of Incentives and Responsive Regulation.” Law and Policy 29, 102–20. Doi: 10.1111/j.1467-9930.2007.00248.x.CrossRefGoogle Scholar
Feld, L. P., and Frey, B. S. (2010). “Tax Evasion and the Psychological Tax Contract.” In Alm, J., Martinez-Vazquez, J. and Torgler, B. (eds.), Developing Alternative Frameworks for Explaining Tax Compliance (pp. 7494). London: Routledge.Google Scholar
Fischer, J. A. V., and Schneider, F. G. (2009). “The Puzzle of Tax Compliance Revisited: Testing the ‘Slippery Slope’ Hypothesis for Trust and Power against Field Data.” Working Paper SGVS. Paris: OECD.Google Scholar
Fochmann, M., Hechtner, F., Kirchler, E., and Mohr, P. N. C. (2019). “When Happy People Make Society Unhappy: How Incidental Emotions Affect Compliance Behavior.” https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3259071.Google Scholar
Frecknall-Hughes, J., and Kirchler, E. (2015). “Towards a General Theory of Tax Practice.” Social and Legal Studies 24(2) 289312.CrossRefGoogle Scholar
Freiberg, A. (2010). The Tools of Regulation. Leichhardt, Australia: Federation Press.Google Scholar
French, J. R. P., and Raven, B. (1959). “The Bases of Social Power.” In Cartwright, D. (ed.), Studies in Social Power (pp. 150–67). Ann Arbor: University of Michigan Press.Google Scholar
Frey, B. S. (1992). “Tertium Datum: Pricing, Regulating, and Intrinsic Motivation.” Kyklos 45, 161–84.CrossRefGoogle Scholar
Frey, B. S. (1997). “A Constitution for Knaves Crowds Out Civic Virtues.” Economic Journal 107, 1043–53.CrossRefGoogle Scholar
Gangl, K., Hofmann, E., and Kirchler, E. (2015). “Tax Authorities’ Interaction with Taxpayers: A Conception of Compliance in Social Dilemmas by Power and Trust.” New Ideas in Psychology 37, 1323. Doi: 10.1016/j.newideapsych.2014.12.001.CrossRefGoogle ScholarPubMed
Gangl, K., Muehlbacher, S., de Groot, M., Goslinga, S., Hofmann, E., Kogler, C., Antonides, G., and Kirchler, E. (2013). “‘How Can I Help You?’ Perceived Service Orientation of Tax Authorities and Tax Compliance.” FinanzArchiv: Public Finance Analysis 69(4), 487510. Doi: 10.1628/001522113X675683.CrossRefGoogle Scholar
Gemmell, N., and Ratto, M. (2012). “Behavioral Responses to Taxpayer Audits: Evidence from Random Taxpayer Inquiries.” National Tax Journal 65(1), 3358.CrossRefGoogle Scholar
Gobena, L. B., and van Dijke, M. (2017). “Fear and Caring: Procedural Justice, Trust, and Collective Identification as Antecedents of Voluntary Tax Compliance.” Journal of Economic Psychology 62, 116. Doi: 10.1016/j.joep.2017.05.005.CrossRefGoogle Scholar
Grasmick, H. G., and Bursik, R. J. Jr. (1990). “Conscience, Significant Others, and Rational Choice: Extending the Deterrence Model.” Law and Society Review 24(3), 837–61.CrossRefGoogle Scholar
Hauptman, L., Gürarda, Ş. , and Korez-Vide, R. (2015). “Exploring Voluntary Tax Compliance Factors in Slovenia: Implications for Tax Administration and Policymakers.” Lex Localis 13(3), 639–59. Doi: 10.4335/13.3.639-659(2015).Google Scholar
Hofmann, E., Gangl, K., Kirchler, E., and Stark, J. (2014). “Enhancing Tax Compliance through Coercive and Legitimate Power of Tax Authorities by Concurrently Diminishing or Facilitating Trust in Tax Authorities.” Law and Policy 36(3), 290313. Doi: 10.1111/lapo.12021.CrossRefGoogle ScholarPubMed
James, S., Hasseldine, J. D., Hite, P. A., and Toumi, M. (2003, December). “Tax Compliance Policy: An International Comparison and New Evidence on Normative Appeals and Auditing.” Paper presented at the ESRC Future Governance Workshop. Vienna, Austria: Institute for Advanced Studies.Google Scholar
Kaplanoglou, G., and Rapanos, V. T. (2015). “Why Do People Evade Taxes? New Experimental Evidence from Greece.” Journal of Behavioral and Experimental Economics 56, 2132. Doi: 10.1016/j.socec.2015.02.005.CrossRefGoogle Scholar
Kaplanoglou, G., Rapanos, V. T., and Daskalakis, N. (2016). “Tax Compliance Behaviour during the Crisis: The Case of Greek SMEs.” European Journal of Law and Economics 42(3), 405–44. Doi: 10.1007/s10657-016-9547-y.CrossRefGoogle Scholar
Kasper, M., Kogler, C., and Kirchler, E. (2015). “Tax Policy and the News: An Empirical Analysis of Taxpayers’ Perceptions of Tax-Related Media Coverage and Its Impact on Tax Compliance.” Journal of Behavioral and Experimental Economics 54, 5863. Doi: 10.1016/j.socec.2014.11.001.CrossRefGoogle Scholar
Kastlunger, B., Lozza, E., Kirchler, E., and Schabmann, A. (2013). “Powerful Authorities and Trusting Citizens: The Slippery Slope Framework and Tax Compliance in Italy.” Journal of Economic Psychology 34, 3645. Doi: 10.1016/j.joep.2012.11.007.CrossRefGoogle Scholar
Kastlunger, B., Kirchler, E., Mittone, L., and Pitters, J. (2009). “Sequences of Audits, Tax Compliance, and Taxpaying Strategies.” Journal of Economic Psychology 30, 405–18.CrossRefGoogle Scholar
Kirchler, E. (2007). The Economic Psychology of Tax Behavior. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Kirchler, E., and Hoelzl, E. (2018). Economic Psychology: An Introduction. Cambridge: Cambridge University Press.Google Scholar
Kirchler, E., Hoelzl, E., and Wahl, I. (2008). “Enforced versus Voluntary Tax Compliance: The ‘Slippery Slope’ Framework.” Journal of Economic Psychology 29, 210–25. Doi: 10.1016/j.joep.2007.05.004.CrossRefGoogle Scholar
Kirchler, E., Kogler, C., and Muehlbacher, S. (2014). “Cooperative Tax Compliance: From Deterrence to Deference.” Current Directions in Psychological Science 23(2), 8792.CrossRefGoogle Scholar
Kogler, C., Batrancea, L., Nichita, A., Pantya, J., Belianin, A., and Kirchler, E. (2013). “Trust and Power as Determinants of Tax Compliance: Testing the Assumptions of the Slippery Slope Framework in Austria, Hungary, Romania and Russia.” Journal of Economic Psychology 34, 169–80. Doi: 10.1016/j.joep.2012.09.010.CrossRefGoogle Scholar
Korczynski, M. (2000). “The Political Economy of Trust.” Journal of Management Studies 37, 121.CrossRefGoogle Scholar
Lederman, L. (2019). “Does Enforcement Reduce Voluntary Tax Compliance?Brigham Young University Law Review Collections 2018(3), 623–93. https://digitalcommons.law.byu.edu/lawreview/vol2018/iss3/6.Google Scholar
Lemoine, J., and Roland-Lévy, C. (2013). “Are Taxpayers, Who Pay Their Taxes, All Cooperative Citizens?Citizenship Teaching and Learning 8(2), 195213. Doi: 10.1386/ctl.8.2.195_1.CrossRefGoogle Scholar
Lerner, J. S., and Keltner, D. (2000). “Beyond Valence: Toward a Model of Emotion-Specific Influences on Judgement and Choice.” Cognition and Emotion 14(4), 473–93. Doi: 10.1080/026999300402763.CrossRefGoogle Scholar
Lerner, J. S., Li, Y., Valdesolo, P., and Kassam, K. S. (2015). “Emotion and Decision Making.” Annual Review of Psychology 66, 799823. https://doi.org/10.1146/annurev-psych-010213-115043.CrossRefGoogle ScholarPubMed
Lewis, J. D., and Weigert, A. (1985). “Trust as a Social Reality.” Social Forces 63(4), 967–85.CrossRefGoogle Scholar
Lisi, G. (2012). “Unemployment, Tax Evasion and the Slippery Slope Framework.” International Review of Economics 59, 297302.CrossRefGoogle Scholar
Lisi, G. (2019). “Slippery Slope Framework, Tax Morale and Tax Compliance: A Theoretical Integration and an Empirical Assessment.” Discussion Paper in Economic Behaviour, DPEP 02/19. Cassino, Italy: University of Cassino, Department of Economics and Law.Google Scholar
Loewenstein, G., and Lerner, J. S. (2003). “The Role of Affect in Decision Making.” In Davidson, R. J., Goldsmith, H. H. and Scherer, K. R. (eds.), Handbook of Affective Science (pp. 619–42). Oxford: Oxford University Press.Google Scholar
Lozza, E., and Castiglioni, C. (2018). “Tax Climate in the National Press: A New Tool in Tax Behavior Research.” Journal of Social and Political Psychology 6(2), 401–19.CrossRefGoogle Scholar
Lozza, E., Kastlunger, B., Tagliabue, S., and Kirchler, E. (2013). “The Relationship between Political Ideology and Attitudes toward Tax Compliance: The Case of Italian Taxpayers.” Journal of Social and Political Psychology 1(1), 5173. Doi: 10.5964/jspp.v1i1.108.CrossRefGoogle Scholar
Mas’ud, A., Manaf, N. A. A., and Saad, N. (2015). “Testing Assumptions of the ‘Slippery Slope Framework’ Using Cross-Country Data: Evidence from Sub-Saharan Africa.” International Journal of Business and Society 16(3), 408–21.Google Scholar
Mas’ud, A., Manaf, N. A. A., and Saad, N. (2019). “Trust and Power as Predictors of Tax Compliance: Global Evidence.” Economics and Sociology 12(2), 192204.CrossRefGoogle Scholar
Mayer, R. C., Davis, J. H., and Schoorman, F. D. (1995). “An Integrative Model of Organizational Trust.” Academy of Management Review 20(3), 709–34.CrossRefGoogle Scholar
Mendoza, J. P., Wielhouwer, J. L., and Kirchler, E. (2015). “The Backfiring Effect of Auditing on Tax Compliance.” SSRN Electronic Journal. Doi: 10.2139/ssrn.2597479.CrossRefGoogle Scholar
Mittone, L., Panebianco, F., and Santoro, A. (2017). “The Bomb-Crater Effect of Tax Audits: Beyond the Misperception of Chance.” Journal of Economic Psychology 61, 225–43.CrossRefGoogle Scholar
Mooijman, M., van Dijk, W. W., van Dijk, E., and Ellemers, N. (2016). “On Sanction-Goal Justifications: How and Why Deterrence Justifications Undermine Rule Compliance.” Journal of Personality and Social Psychology 111. Doi: 10.1037/pspi0000084.Google Scholar
Muehlbacher, S., and Kirchler, E. (2010). “Tax Compliance by Trust and Power of Authorities.” International Economic Journal 24(4), 607–10. Doi: 10.1080/10168737.2010.526005.CrossRefGoogle Scholar
Muehlbacher, S., Kirchler, E., and Schwarzenberger, H. (2011). “Voluntary versus Enforced Tax Compliance: Empirical Evidence for the ‘Slippery Slope’ Framework.” European Journal of Law and Economics 32(1), 8997. Doi: 10.1007/s10657-011-9236-9.CrossRefGoogle Scholar
Mulder, L. B., Verboon, P., and de Cremer, D. (2009). “Sanctions and Moral Judgments: The Moderating Effect of Sanction Severity and Trust in Authorities.” European Journal of Social Psychology 39, 255–69.CrossRefGoogle Scholar
Mulder, L. B., van Dijk, E., de Cremer, D., and Wilke, H. A. M. (2006). “Undermining Trust and Cooperation: The Paradox of Sanctioning Systems in Social Dilemmas.” Journal of Experimental Social Psychology 42, 147–62.CrossRefGoogle Scholar
Murphy, K., and Tyler, T. R. (2008). “Procedural Justice and Compliance Behaviour: The Mediating Role of Emotions.” European Journal of Social Psychology 38, 652–68. Doi: 10.1002/ejsp.CrossRefGoogle Scholar
Niesiobędzka, M. (2014). “Relations between Procedural Fairness, Tax Morale, Institutional Trust and Tax Evasion.” Journal of Social Research and Policy 5(1), 112.Google Scholar
Nooteboom, B. (2002). Trust: Forms, Foundations, Functions, Failures and Figures. Cheltenham, UK: Edward Elgar.CrossRefGoogle Scholar
OECD. (2008). “Study into the Role of Tax Intermediaries.” www.oecd.org/tax/administration/39882938.pdf.CrossRefGoogle Scholar
OECD. (2013). “Co-operative Compliance: A Framework: From Enhanced Relationship to Co-operative Compliance.” http://dx.doi.org/10.1787/9789264200852-en.CrossRefGoogle Scholar
Oishi, S., Schimmack, U., and Diener, E. (2012). “Progressive Taxation and the Subjective Well-Being of Nations.” Psychological Science 23, 8692.CrossRefGoogle ScholarPubMed
Olsen, J., Kasper, M., Enachescu, J., Benk, S., Budak, T., and Kirchler, E. (2018). “Emotions and Tax Compliance among Small Business Owners: An Experimental Survey.” International Review of Law and Economics 56(May), 4252. Doi: 10.1016/j.irle.2018.05.004.CrossRefGoogle Scholar
Olson, N. E. (2015). “Procedural Justice for All: A Taxpayer Rights Analysis of IRS Earned Income Credit Compliance Strategy.” Advances in Taxation 22, 135.CrossRefGoogle Scholar
Onu, D., and Oats, L. (2018). “Tax Talks: An Exploration of Online Discussions among Taxpayers.” Journal of Business Ethics 149, 931–44.CrossRefGoogle Scholar
Orviska, M., and Hudson, J. (2002). “Tax Evasion, Civic Duty and the Law Abiding Citizen.” European Journal of Political Economy 19, 83102.CrossRefGoogle Scholar
Prinz, A., Muehlbacher, S., and Kirchler, E. (2014). “The Slippery Slope Framework on Tax Compliance: An Attempt to Formalization.” Journal of Economic Psychology 40, 2034. Doi: 10.1016/j.joep.2013.04.004.CrossRefGoogle Scholar
Pukelienė, V., and Kažemekaitytė, A. (2016). “Tax Behaviour: Assessment of Tax Compliance in European Union Countries.” Ekonomika 95(2), 3056. Doi: 10.15388/Ekon.2016.2.10123.CrossRefGoogle Scholar
Rand, D. G., Greene, J. D., and Nowak, M. A. (2012). “Spontaneous Giving and Calculated Greed.” Nature 489, 427–30.CrossRefGoogle ScholarPubMed
Raven, B. H. (1965). “Social Influence and Power.” In Steiner, I. D. and Fishbein, M. (eds.). Current Studies in Social Psychology (pp. 371–82). New York: Holt, Rinehart, Winston.Google Scholar
Ruiu, G., and Lisi, G. (2011). “Tax Morale, Slippery-Slope Framework and Tax Compliance: A Cross-Section Analysis.” Dipartimento di Scienze Economiche. http://core.kmi.open.ac.uk/download/pdf/6279366.pdf.Google Scholar
Scherer, K. R. (2005). “What Are Emotions? And How Can They Be Measured?Social Science Information 44, 695729. Doi: 10.1177/0539018405058216.CrossRefGoogle Scholar
Siglé, M. A. (2019). The Effects of Cooperative Compliance Programs. Thesis, Nyenrode Business University, NL.Google Scholar
Sloterdijk, P. (2010). Die nehmende Hand und die gebende Seite [The Hand that Takes and the Side that Gives]. Berlin: Suhrkamp.Google Scholar
Srinivasan, T. N. (1973). “Tax Evasion: A Model.” Journal of Public Economics 2, 339–46. Doi: 10.1016/0047-2727(73)90024-8.CrossRefGoogle Scholar
Stevens, L. G. M., Pheijffer, M., van den Broek, J. G. A., Keijzer, T. J., and van der Hel-van Dijk, E. C. J. M. (2012). “Tax Supervision – Made to Measure.” https://download.belastingdienst.nl/belastingdienst/docs/tax_supervision_made_to_measure_tz0151z1fdeng.pdf.Google Scholar
Tsikas, S. A. (2017). “Enforce Tax Compliance, but Cautiously: The Role of Trust in Authorities and Power of Authorities.” Hannover Economic Papers No. 589. http://diskussionspapiere.wiwi.uni-hannover.de/pdf_bib/dp-589.pdf.Google Scholar
Tyler, T. R. (1997). “The Psychology of Legitimacy: A Relational Perspective on Voluntary Deference to Authorities.” Personality and Social Psychology Review 1(October), 323–45. Doi: 10.1207/s15327957pspr0104.CrossRefGoogle ScholarPubMed
Tyler, T. R. (2003). “Trust within Organisations.” Personnel Review 32, 556–68.CrossRefGoogle Scholar
Wahl, I., Kastlunger, B., and Kirchler, E. (2010). “Trust in Authorities and Power to Enforce Tax Compliance: An Empirical Analysis of the ‘Slippery Slope Framework’.” Law and Policy 32, 383406. Doi: 10.1111/j.1467-9930.2010.00327.CrossRefGoogle Scholar
Wang, L., and Murnighan, J. K. (2017). “The Dynamics of Punishment and Trust.” Journal of Applied Psychology 102(10), 1385402.CrossRefGoogle ScholarPubMed
Webley, P., Robben, H. S. J., Elffers, H., and Hessing, D. J. (1991). Tax Evasion: An Experimental Approach. Cambridge: Cambridge University Press.Google Scholar
Wilks, D. C., and Pacheco, L. (2014). “Tax Compliance, Corruption and Deterrence: An Application of the Slippery Model.” In Teixeira, A. (ed.), Interdisciplinary Insights on Fraud (pp. 87104). Newcastle upon Tyne: Cambridge Scholars Publishing.Google Scholar
Wurth, E., and Braithwaite, V. (2018). “Tax Practitioners and Tax Avoidance.” In Hashimzade, N. and Epifantseva, Y. (eds.), The Routledge Companion to Tax Avoidance Research (pp. 320–39). London: Routledge.Google Scholar
Ayres, Ian, and Braithwaite, John. 1992. Responsive Regulation: Transcending the Deregulation Debate. New York: Oxford University Press.Google Scholar
Bardach, Eugene B., and Kagan, Robert A.. 1982. Going by the Book: The Problem of Regulatory Unreasonableness, Philadelphia, PA: Temple University Press.Google Scholar
Bartels, Ann P., and Thomas, Lacy Glenn. 1985. “Direct and Indirect Effects of Regulation: A New Look at OSHA’s Impact.” Journal of Law and Economics 28:125.CrossRefGoogle Scholar
Becker, Gary S. 1968. “Crime and Punishment: An Economic Approach.” Journal of Political Economy 76:169217.CrossRefGoogle Scholar
Blanc, Florentin. 2016. “From Chasing Violations to Managing Risks: Origins, Challenges and Evolutions in Regulatory Inspections.” PhD dissertation, University of Leiden.Google Scholar
Blanc, Florentin. 2018. “Tools for Effective Regulation: Is ‘More’ Always ‘Better’?European Journal of Risk Regulation 9:465–82.CrossRefGoogle Scholar
Borck, Jonathan C., and Coglianese, Cary. 2011. “Beyond Compliance: Explaining Business Participation in Voluntary Environmental Programs.” Penn Law School Public Law and Legal Theory, Research Paper No. 12–06.Google Scholar
Bradbury, J. C. 2006. “Regulatory Federalism and Workplace Safety: Evidence from OSHA Enforcement, 1981–1995”. Journal of Regulatory Economics 29:211–24.CrossRefGoogle Scholar
Braithwaite, J., and Makkai, T.. 1991. “Testing an Expected Utility Model of Corporate Deterrence.” Law and Society Review 25:739.CrossRefGoogle Scholar
Castleman, Barry I., and Ziem, G. E.. 1988. “Corporate Influence on Threshold Limit Values.” American Journal of Industrial Medicine 13:531–59.CrossRefGoogle ScholarPubMed
Cheit, Ross. 1990. Setting Safety Standards. Berkeley: University of California Press.Google Scholar
Commonwealth of Pennsylvania. 2006. “Pennsylvania Workers’ Compensation and Safety Annual Report.” Harrisburg, PA: Department of Labor and Industry.Google Scholar
Cyert, Richard, and March, James G.. 1963. A Behavioral Theory of the Firm. Englewood Cliffs, NJ: Prentice-Hall.Google Scholar
European Agency for Safety Health at Work. 2010. European Survey of Enterprises on New Emerging Risks: Managing Safety Health at Work. Bilbao, Spain: European Agency for Safety Health at Work. European Risk Observatory Report TE-RO-10–002-EN-C, 2010. As of December 30, 2011. http://osha.europa.eu/en/publications/reports/esener1_osh_management.Google Scholar
Gray, Wayne B., and Jones, Carole A.. 1991a. “Are OSHA Health Inspections Effective? A Longitudinal Study in the Manufacturing Sector.” Review of Economics and Statistics 73:504–8.CrossRefGoogle Scholar
Gray, Wayne B., and Jones, Carole A.. 1991b. “Longitudinal Patterns of Compliance with Occupational Safety and Health Administration Health and Safety Regulations in the Manufacturing Sector.” Journal of Human Resources 26:623–53.Google Scholar
Gray, Wayne B., and Scholz, John. 1993. “Does Regulatory Enforcement Work? A Panel Analysis of OSHA Enforcement.” Law & Society Review 27:177213.CrossRefGoogle Scholar
Gunningham, Neil, Kagan, Robert A. and Thornton, Dorothy. 2003. Shades of Green: Business, Regulation, and Environment. Stanford, CA: Stanford University Press.Google Scholar
Haviland, Amelia, Burns, Rachel, Gray, Wayne B., Ruder, Teague and Mendeloff, John. 2010. “What Kinds of Injuries Do OSHA Inspections Prevent?Journal of Safety Research 41:339–45.CrossRefGoogle ScholarPubMed
Hawkins, Keith. 2002. Law as Last Resort: Prosecution Decision-Making in a Regulatory Agency. New York: Oxford University Press.Google Scholar
Hopkins, Anthony. 1994. “Compliance with What?British Journal of Criminology 34:431443.CrossRefGoogle Scholar
Huber, Gregory. 2007. The Craft of Bureaucratic Neutrality: Interests and Influence in Governmental Regulation of Occupational Safety. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Hutter, Bridget M. 1988. The Reasonable Arm of the Law? The Law Enforcement Procedures of Environmental Health Officers. Oxford: Clarendon Press.Google Scholar
Johnson, Matthew S. 2020. “Regulation by Shaming: Deterrence Effects of Publicizing Violations of Workplace Safety and Health Laws.” American Economic Review 110(6):18661904.CrossRefGoogle Scholar
Jung, Juergen, and Makowsky, Michael D.. 2014. “The Determinants of Federal and State Enforcement of Workplace Safety Regulations: OSHA Inspections 1990–2010.” Journal of Regulatory Economics 45:133.CrossRefGoogle ScholarPubMed
Kagan, Robert A. 1994. “Regulatory Enforcement.” In Handbook of Regulation and Administrative Law, Rosenbloom, D. H. and Schwartz, R. D., eds. New York: Marcel Dekker.Google Scholar
Kagan, Robert A., Gunningham, Neil and Thornton, Dorothy. 2011. “Fear, Duty, and Regulatory Compliance: Lessons from Three Research Projects.” In Explaining Compliance: Business Responses to Regulation, Parker, Christina and Neilsen, Vibeke, eds. Cheltenham, UK: Edward Elgar.Google Scholar
Kelman, Steven. 1981. Regulating America, Regulating Sweden: A Comparative Study of Occupational Safety and Health Policy. Cambridge, MA: MIT Press.Google Scholar
Ko, Kilkon, Mendeloff, John and Gray, Wayne. 2010. “The Role of Inspection Sequence in Compliance with the US Occupational Safety and Health Administration’s (OSHA) Standards: Interpretations and Implications.” Regulation and Governance 4:4870.CrossRefGoogle Scholar
Lofgren, Don J. 1989. Dangerous Premises: An Insider’s View of OSHA Enforcement. Ithaca, NY: Cornell University Press.Google Scholar
McClure, Kim V. 2019. “Understanding Regulatory Workplace Safety Inspections in British Columbia: Theory and Evidence.” PhD dissertation, University of British Columbia.Google Scholar
Mendeloff, John. 1979. Regulating Safety: A Political and Economic Analysis of OSHA. Cambridge, MA: MIT Press.Google Scholar
Mendeloff, John. 1984. “The Role of OSHA Violations in Serious Workplace Accidents.” Journal of Occupational Medicine May: 353–60.CrossRefGoogle Scholar
Mendeloff, John. 1988. The Dilemma of Toxic Substance Regulation. Cambridge, MA: MIT Press.Google Scholar
Mendeloff, John. 1995. “An Evaluation of OSHA’s ‘Top 200’ Program in Maine.” A Report to the OSHA Office of Policy.Google Scholar
Mendeloff, John, and Burns, Rachel. 2013. “States with Low Non-fatal Injury Rates Have High Fatality Rates and Vice-Versa.” American Journal of Industrial Medicine 56:509–19.CrossRefGoogle ScholarPubMed
Mendeloff, John, and Gray, Wayne B.. 2001. “An Evaluation of OSHA’s Consultation Program.” Report to the OSHA Office of Policy.Google Scholar
Mendeloff, John, and Gray, Wayne B.. 2005. “Inside the Black Box: What Kinds of Injuries Do OSHA Inspections Prevent?Law and Policy 27:219–37.CrossRefGoogle Scholar
Mendeloff, John, and Staetsky, Laura. 2014. “Occupational Fatality Risks in the United States and the United Kingdom.” American Journal of Industrial Medicine 57:414.CrossRefGoogle ScholarPubMed
Mendeloff, John, Haviland, Amelia, Gray, Wayne B., Main, Regan and Xia, Jing. 2012. “An Evaluation of the California Injury and Illness Prevention Program.” Santa Monica, CA: RAND Corporation, TR-1190, 2012.Google Scholar
Mendeloff, John, Dworsky, Michael, Gray, Wayne B. and Castillo, Jose. 2014. “Options for Improving Complaint Inspections and Follow-Up Inspections in the Cal-OSHA Program.” RAND Corporation, PR-1261, November 2014.Google Scholar
Mendeloff, John, Gray, Wayne B., Armour, Philip and Neuhauser, Frank. 2020. “The Re-Occurrence of Violations in Occupational Safety and Health Administration Inspections.” Forthcoming in Regulation and Governance.CrossRefGoogle Scholar
Nichols, Theo. 1997. The Sociology of Industrial Injury: Employment and Work Relations in Context. London: Mansell.Google Scholar
Occupational Safety and Health Administration Field Operations Manual. 2011.Google Scholar
Oleinick, A., Gluck, J. V. and Guire, K. E.. 1995. “Establishment Size and Risk of Occupational Injury.” American Journal of Industrial Medicine 28:121.CrossRefGoogle ScholarPubMed
Parker, Christina and Neilsen, Vibeke. 2011. eds. Explaining Compliance: Business Responses to Regulation. Cheltenham UK: Edward Elgar.CrossRefGoogle Scholar
Paternoster, Raymond, and Simpson, Sally S.. 1993. “A Rational Choice Theory of Corporate Crime.” In Routine Activity and Rational Choice: Advances in Criminological Theory Vol. 5, Clarke, Ronald V. and Felson, Marcus, eds. New Jersey: Transaction Publishers.Google Scholar
Reason, James. 1997. Managing the Risks of Organizational Accidents. Aldershot, UK: Ashgate.Google Scholar
Schell-Busey, Natalie. 2017. “Do Extralegal Variables Impact the Post-Inspection Process of the Occupational Safety and Health Administration?Crime, Law and Social Change 68:187216.CrossRefGoogle Scholar
Scholz, John T., and Wei, Feng Heng. 1986. “Regulatory Enforcement in a Federalist System.” American Political Science Review 80:1249–70.CrossRefGoogle Scholar
Scholz, John T., and Gray, Wayne B.. 1990. “OSHA Enforcement and Workplace Injuries: A Behavioral Approach to Risk Assessment.” Journal of Risk and Uncertainty 3:283305.CrossRefGoogle Scholar
Scholz, John T., Twombly, Jim and Headrick, Barbara. 1991. “Street-Level Political Controls over Federal Bureaucracy.” American Political Science Review 85:829–50.CrossRefGoogle Scholar
Shapiro, Sidney, and Rabinowitz, Randi. 1997. “Punishment versus Cooperation in Regulatory Enforcement: A Case Study of OSHA.” Administrative Law Review 49:713–62.Google Scholar
Shapiro, Sidney, and Rabinowitz, Randi. 2000. “Voluntary Regulatory Compliance in Theory and Practice: The Case of OSHA.” Administrative Law Review 52:97155.Google Scholar
Simpson, Sally S., and Rorie, Melissa. 2011. “Motivating Compliance: Economic and Material Motives for Compliance.” in Parker, Christina and Vibeke, Neilsen. eds. Explaining Compliance: Business Responses to Regulation. Cheltenham UK: Edward Elgar.Google Scholar
Sims, Robert H. 1988. “Hazard Abatement as a Function of Firm Size.” PhD Dissertation, RAND Graduate School.Google Scholar
Siskind, Frederick B. 2002. “Twentieth Century OSHA Enforcement Data: A Review and Explanation of the Major Trends.” Washington, DC: US Department of Labor, Office of the Assistant Secretary for Policy, Evaluation, and Research.Google Scholar
Viscusi, W. Kip. 1983. Risk by Choice. Cambridge, MA: Harvard University Press.CrossRefGoogle Scholar
Viscusi, W Kip. 1986. “The Impact of Occupational Safety and Health Regulation, 1973–83.” RAND Journal of Economics 17:567–80.CrossRefGoogle Scholar
Walters, David, Johnstone, Richard, Frick, Kaj, Quinlan, Michael, Baril-Gingras, Genevieve and Thebaud-Mony, Annie. 2011. Regulating Workplace Risks: A Comparative Study of Inspection Regimes in Times of Change. Cheltenham, UK: Edward Elgar.CrossRefGoogle Scholar
Weil, David. 1996. “If OSHA Is So Bad, Why Is Compliance So Good?RAND Journal of Economics 27:618–40.CrossRefGoogle Scholar
Wood, Dan B., and Waterman, Richard W.. 1994. Bureaucratic Dynamics: The Role of Bureaucracy in a Democracy. Boulder, CO: Westview Press.Google Scholar
Ad Hoc Advisory Group on the Organizational Sentencing Guidelines. 2003. Advisory Group Report. Washington, DC: US Sentencing Commission. www.ussc.gov/guidelines/organizational-guidelines/report-ad-hoc-advisory-group-organizational-sentencing-guidelines-october–7–2003.Google Scholar
American Health Lawyers Association. 2019. “Intellectual Property Policy.” In Health Law Practice Guide 4:App. C–148.Google Scholar
Bochner, Steven E., and Krause, Susan P.. 1989. “Intellectual Property Management and Board Liability.” In Securities Law Institute. New York: Practising Law Institute.Google Scholar
Boyle, Gary W. 1998. “The Foundation of Preventive Law in Corporate America.” National Center for Preventive Law Essays, www.preventivelawyer.org/main/default.asp?pid=essays/boyle.htm.Google Scholar
Brown, Louis M. 1995. “The Other Side of the Law.” In What Is Preventive Law? Cyber Institute. www.cyberinstitute.com/preventivelaw/week1.htm.Google Scholar
Brownlee, L. M. 2019. “Post-Transaction Intellectual Property Management.” In IP Due Diligence in Corporate Transactions, April 2019 Updates at §§ 13:55 to 13:117.Google Scholar
Business Software Alliance. 2019a. Software Licensing Basics, https://smeinfoportal.org/blog/software-licensing-basics/.Google Scholar
Business Software Alliance. 2019b. The Software Asset Management Blueprint, https://smeinfoportal.org/blog/the-software-asset-management-blueprint–2/.Google Scholar
Carr, Chris, Morton, Jack and Furniss, Jerry. 2000. “The Economic Espionage Act: Bear Trap or Mousetrap?Texas Intellectual Property Law Journal 8: 159.Google Scholar
Chen, Hui. 2019. “Don’t Let Your Compliance Program Fail Because You’re Afraid of Data.” Bloomberg Law, Feb. 12, https://huichenethics.files.wordpress.com/2019/02/afraidofdata.pdf.Google Scholar
Content Delivery & Security Association. 2012. Copyright & Licensing Verification (CLV) Program Standards & Procedures, www.mesalliance.org/wp-content/uploads/2016/04/CDSA-APCP-5-CLV-Standard-September-2012.pdf.Google Scholar
Copenhaver, Karen Faulds. 2008. “Managing Compliance with Open Source Software Licenses.” Practical Lawyer 54: 21.Google Scholar
Cottrell, Eric. 2016. “ISO 37001 – The Potential Impact of the New International Anti-Bribery Management System Standard.” JD Supra, Dec. 13, https://www.jdsupra.com/legalnews/iso-37001-the-potential-impact-of-the–69322/.Google Scholar
Dawson, Dave, DeZabala, Ted and King, Joe. 2017. “A Strategic Approach to Software Asset Management.” CIO Insights and Analysis from Deloitte, https://deloitte.wsj.com/cio/2018/10/03/a-strategic-approach-to-software-asset-management/.Google Scholar
Desio, Paula. 2003. “An Overview of the Organizational Guidelines.” In US Sentencing Commission. Organizational Guidelines. Washington, DC: US Sentencing Commission. www.ussc.gov/sites/default/files/pdf/training/organizational-guidelines/ORGOVERVIEW.pdf.Google Scholar
Fay, Erin, and Frymark, Julie. 2005. “Businessowners Beware: You May Have Insurance, But Does It Cover Your Intellectual Property?” Fire Casualty & Surety Bulletins (April/May).Google Scholar
Frankel, William H., Dolan, Christopher M., Lane, Bradley G. and Sendek, Timothy K.. 2018. Designing an Effective Intellectual Property Compliance Program. Eagan, MN: Thompson Reuters.Google Scholar
Freyer, Dana H. 1996. “Corporate Compliance Programs for FDA-Regulated Companies.” Food & Drug Law Journal 51: 225.Google ScholarPubMed
Gollin, Michael A. 1991. “Using Intellectual Property to Improve Environmental Protection.” Harvard Journal of Law & Technology 4: 193.Google Scholar
Gruner, Richard S. 2018. Corporate Criminal Liability and Prevention. New York: Law Journal Press.Google Scholar
Gruner, Richard S., and Brunell, Norman E.. 2018. “Goals of Intellectual Property Audits.” In The Legal Audit: Corporate Internal Investigation, edited by Brown, Louis M., Kandel, Anne O. and Gruner, Richard S.. Eagan, MN: Thompson Reuters.Google Scholar
Gruner, Richard S., Ghosh, Shubha and Kesan, Jay. 2018. Transactional Intellectual Property: From Startups to Public Companies, 4th ed. Durham, NC: Carolina Academic Press.Google Scholar
Gutterman, Alan S. 2018. “Business Uses of Intellectual Property Rights – Value and Uses of Intellectual Property Rights.” Corporate Counsel’s Guide to Technology Management & Transactions 1 Dec. 2018 Updates at § 1:3.Google Scholar
Gutterman, Alan S. 2019. “Executive Summary for Clients Regarding Intellectual Property Audits.” Business Transactions Solutions. April 2019 Updates at § 206:44.Google Scholar
Haislmaier, Jason. 2009. “Practical Strategies for Developing Open Source Compliance Programs: Why Compliance (Increasingly) Matters.” Practical Lawyer 55: 45.Google Scholar
Hancock, William A. 2005. “Drafting Intellectual Property Provisions for Codes of Conduct.” Intellectual Property Counselor (Nov.).Google Scholar
Harris, Ray K., and Burgess, James D.. 2003. “Compliance Planning for Intellectual Property Crimes.” Buffalo Intellectual Property Law Journal 2: 1.Google Scholar
International Chamber of Commerce. 2007. Model Intellectual-Property Guidelines for Business. Paris: International Chamber of Commerce. www.wipo.int/edocs/mdocs/sme/en/wipo_icc_smes_08/wipo_icc_smes_08_topic03-related2.pdf.Google Scholar
International Organization for Standardization. 2016. ISO 37001:2016 Anti-Bribery Management Systems – Requirements with Guidance for Use, www.iso.org/obp/ui/#iso:std:iso:37001:ed-1:v1:en.Google Scholar
Kendall, Frank (Acting Under Secretary of Defense). 2012. Overarching DoD Counterfeit Prevention Guidance, www.acq.osd.mil/log/SCI/.anti-counterfeit.html/Counterfeit-Prevention-Guidance.pdf.Google Scholar
Livingston, Henry. 2013. “Compliance Programs for Counterfeit Parts Avoidance and Detection.” Contract Management, May: 46.Google Scholar
Magarick, Pat, and Brownlee, Ken. 2019. “Intellectual Property.” In Casualty Insurance Claims, 4th ed. May 2019 Update, 3:§ 48:32. Eagan, MN: Thompson Reuters.Google Scholar
Microsoft Corporation. 2004. A Guide to Software Asset Management, http://download.microsoft.com/documents/australia/piracy/MIC035_SAM_Guide_FINAL.pdf.Google Scholar
Microsoft Corporation. 2005. Software Asset Management (SAM) Implementation Guide, http://download.microsoft.com/download/f/8/5/f859245b-f740-4168-8dbb-a92d72a62f6d/samguide.pdf.Google Scholar
National Center for Preventive Law. 1996. Corporate Compliance Principles. San Diego, CA: National Center for Preventive Law. www.preventivelawyer.org/content/pdfs/corporate.pdf.Google Scholar
Proctor, Melissa. 2019. “Core Elements of an Import Compliance Program.” Westlaw Practice Notes, www.westlaw.com/w-005-2872?transitionType=Default&contextData=(sc.Default)&VR=3.0&RS=cblt1.0.Google Scholar
Scheineson, Marc J., and Klinger, Shannon Thyme. 2005. “Lessons from Expanded Government Enforcement Efforts Against Drug Crime.” Food & Drug Law Journal 60: 1114.Google Scholar
Simensky, Melvin, and Osterberg, Eric C.. 1999. “The Insurance and Management of Intellectual Property Risks.” Cardozo Arts & Entertainment Law Journal 17: 321.Google Scholar
Tomeny, John. 2013. “Software License Compliance: Five Essential Steps.” Sassafras Software News, Nov. 22, https://web.archive.org/web/20180813041551/www.sassafras.com/software-license-compliance/.Google Scholar
United States Department of Defense. 2014. Defense Federal Acquisition Regulation Supplement: Detection and Avoidance of Counterfeit Electronic Parts. 79 FR 26092–01 (May 6).Google Scholar
United States Department of Justice. 2019. Evaluation of Corporate Compliance Programs (April 2019), www.justice.gov/criminal-fraud/page/file/937501/download.Google Scholar
United States Sentencing Commission. 2018. Sentencing Guidelines Manual. Washington, DC: United States Sentencing Commission.Google Scholar
Watts, Stephen, and Davis, Scott. 2018. “Software License Management (SLM) Explained.” The Business of IT Blog, Feb. 5, www.bmc.com/blogs/software-license-management/.Google Scholar
Anderson, John P. 2016. “Solving the Paradox of Insider Trading Compliance.” Temple Law Review 88: 273.Google Scholar
Bainbridge, Stephen M. 1999. “Insider Trading Regulation: The Path Dependent Choice between Property Rights and Securities Fraud.” SMU Law Review 52: 1589.Google Scholar
Bainbridge, Stephen M. 2014. Insider Trading Law and Policy. St. Paul, MN: Foundation Press.Google Scholar
Ball, James H. 2003. “Suggestions for Implementing Sarbanes-Oxley Act Requirements.” Andrews Securities Regulation Litigation & Regulation Report 8 (25): 15.Google Scholar
Barnard, Jayne W. 1999. “Reintegrative Shaming in Corporate Sentencing.” Southern California Law Review 72: 959.Google Scholar
Dolgopolov, Stanislav. 2008. “Insider Trading, Chinese Walls, and Brokerage Commissions: The Origins of Modern Regulation of Information Flows in Securities Markets.” Journal of Law, Economics, and Policy 4: 311.Google Scholar
Dye, Alan L. 2000. “Securities Law Compliance Programs.” ALI-ABA (American Law Institute and American Bar Association) Postgraduate Course in Federal Securities Law. Chicago, IL: American Law Institute-American Bar Association Committee on Continuing Professional Education.Google Scholar
Fisch, Jill E. 1991. “Start Making Sense: An Analysis and Proposal for Insider Trading Regulation.” Georgia Law Review 26: 179.Google Scholar
Institutional Shareholder Services. 2013. U.S. Proxy Voting Guidelines. Vol. 2013. Rockville, MD: ISS Governance.Google Scholar
Lamarre, David. 2009. “Keeping Current: Securities.” Business Law Today 19 (December): 20.Google Scholar
Panel Discussion. 2008. “Corporate Compliance: The Role of Company Counsel.” Georgetown Journal of Legal Ethics 21: 491.Google Scholar
Park, James J. 2017. “The Limits of the Right to Sell and the Rise of Federal Corporate Law.” Oklahoma Law Review 70: 159.Google Scholar
Sawyer, Melissa. 2013. “Corporate Governance Feature: 10b5-1 Plans and M&A Transactions.” Mergers & Acquisitions Lawyer 17 (7): 25.Google Scholar
Scheer, Craig M. 2013. “Rule 10b5–1 Trading Plans in the Current Environment: The Importance of Doing It Right.” Business Law Today 2013 (February): 1.Google Scholar
Seyhun, H. Nejat. 2008. “Insider Trading and the Effectiveness of Chinese Walls in Securities Firms.” Journal of Law, Economics, and Policy 4: 369.Google Scholar
Shapiro, Bernard, and Wyland, Neil D.. 1993. “Ethical Quandaries of Professionals in Bankruptcy Cases.” C836 ALI-ABA (American Law Institute and American Bar Association) 15.Google Scholar
St. John, Ronald R. 2005. “When an Ethical Screen Can Be Used to Avoid Vicarious Disqualification of a Law Firm Remains Unsettled.” L.A. Lawyer, February, 29.Google Scholar
Thomsen, Linda Chatman. 2007. “Speech by SEC Staff: Opening Remarks before the 15th Annual NASPP Conference,” Washington, DC, October 10. www.sec.gov/news/speech/2007/spch101007lct.htm.Google Scholar
U.S. Sentencing Commission. 2016. “Sentencing Guidelines Manual § 8B2.1.” October 27. www.ussc.gov/guidelines/2016-guidelines-manual/2016-chapter-8#NaN.Google Scholar
Wang, William K. S. 2015. “Application of the Federal Mail and Wire Fraud Statutes to Criminal Liability for Stock Market Insider Trading and Tipping.” University of Miami Law Review 70: 220.Google Scholar
Aguzzoni, Luca, Langus, Gregor, and Motta, Massimo. 2013. “The Effect of EU Antitrust Investigations and Fines on a Firm’s Valuation.” The Journal of Industrial Economics 61, No. 2: 290338.CrossRefGoogle Scholar
Beckenstein, Alan R., and Gabel, H. Landis. 1986. “The Economics of Antitrust ComplianceSouthern Economic Journal 53, No. 3: 673–92.Google Scholar
Bennett, Rebecca J., and Robinson, Sandra L.. 2000. “Development of a Measure of Workplace Deviance.” Journal of Applied Psychology, 85: 349–60.CrossRefGoogle ScholarPubMed
Bénabou, Roland, and Tirole, Jean. 2003. “Instrinsic and Extrinsic Motivation.” Review of Economic Studies 70: 489520.CrossRefGoogle Scholar
Bryant, Peter G., and Eckard, Woodrow. 1991. “Price Fixing: The Probability of Getting Caught.” Review of Economics and Statistics 73: 531–6.CrossRefGoogle Scholar
Bussmann, Kai-D. , Nestler, Claudia, and Salvenmoser, Steffen. 2018. “Wirtschaftskriminalität 2018.” https://pwc.to/2FzlHEC.Google Scholar
Campello, Murillo, Ferrés, Daniel, and Ormazabal, Gaizka. 2017. “Whistle-Blowers on the Board? The Role of Independent Directors in Cartel Prosecutions.” Journal of Law and Economics 60: 241–68.CrossRefGoogle Scholar
Combe, Emmanuel, Monnier, Constance, and Legal, Renaud. 2008. “Cartels: The Probability of Getting Caught in the European Union.” https://ssrn.com/abstract=1015061.CrossRefGoogle Scholar
Deci, Edward L., Koestner, Richard, and Ryan, Richard M.. 1999. “A Meta-analytic Review of Experiments Examining the Effects of Extrinsic Rewards on Intrinsic Motivation.” Psychological Bulletin 125: 627–68.CrossRefGoogle ScholarPubMed
EY. 2018. “Integrity in the Spotlight. The Future of Compliance. 15th Global Fraud Survey.” https://fraudsurveys.ey.com.Google Scholar
Fershtman, Chaim, and Judd, Kenneth. 1987. “Equilibrium Incentives in Oligopoly.” American Economic Review 77: 927–40.Google Scholar
Fisse, Brent, and Braithwaite, John. 2010. Corporations, Crime and Accountability. Cambridge University Press.Google Scholar
Geradin, Damien. 2013. “Antitrust Compliance Programmes and Optimal Antitrust Enforcement: A Reply to Wouter Wils.” Journal of Antitrust Enforcement 1: 325–46.CrossRefGoogle Scholar
González, Tanja A., and Schmid, Markus. 2012. “Corporate Governance and Antitrust Behavior.” Swiss Institute of Banking and Finance, University of St. Gallen, Working Paper.Google Scholar
González, Tanja A., Schmid, Markus, and Yermack, David. 2017. “Does Price Fixing Benefit Corporate Managers?” NYU Working Paper No. FIN–13–002.Google Scholar
Götz, Georg, Herold, Daniel, and Paha, Johannes. 2016. “Results of a Survey in Germany, Austria, and Switzerland on How to Prevent Violations of Competition Laws.” In Competition Law Compliance Programmes – An Interdisciplinary Approach, edited by Paha, Johannes, 3758. Springer.CrossRefGoogle Scholar
Harrington, Joseph E., and Wei, Yanhao. 2017. “What Can the Duration of Discovered Cartels Tell Us about the Duration of All Cartels?Economic Journal 127: 19772005.CrossRefGoogle Scholar
Herold, Daniel. 2016. “Compliance and Incentive Contracts.” In Competition Law Compliance Programmes – An Interdisciplinary Approach, edited by Paha, Johannes, 87102. Springer.CrossRefGoogle Scholar
Herold, Daniel, and Paha, Johannes. 2018. “Cartels as Defensive Devices: Evidence from Decisions of the European Commission 2001–2010.” Review of Law and Economics 14, No. 1: 131.CrossRefGoogle Scholar
Ivaldi, Marc, Jenny, Frédéric, and Khimich, Aleksandra. 2016. “Cartel Damages to the Economy: An Assessment for Developing Countries.” In Competition Law Enforcement in the BRICS and in Developing Countries, edited by Jenny, Frédéric and Katsoulacos, Yannis, 103–34. Springer.Google Scholar
Jensen, Michael C., and Meckling, William H.. 1976. “Theory of the Firm: Managerial Behavior, Agency Costs and Ownership Structure.” Journal of Financial Economics 3: 305–60.CrossRefGoogle Scholar
KPMG. 2016. “Global Compliance Survey.” https://bit.ly/2Zqx0Fu.Google Scholar
Levenstein, Margaret C., and Suslow, Valerie Y.. 2006. “What Determines Cartel Success?Journal of Economic Literature 44, No. 1 (March): 4395.CrossRefGoogle Scholar
Levenstein, Margaret C., and Suslow, Valerie Y.. 2015. “Cartels and Collusion, Empirical Evidence.” In The Oxford Handbook of International Antitrust Economics, edited by Blair, Roger D. and Sokol, D. Daniel, 442–63. Oxford University Press.Google Scholar
Marcus, Bernd, Schuler, Heinz, Quell, Patricia, and Gerhardt, Hümpfner. 2000. “Measuring Counterproductivity: Development and Initial Validation of a German Self‐Report Questionnaire.” International Journal of Selection and Assessment 1018–35.Google Scholar
McAdams, Richard H., and Rasmusen, Eric B. 2007. “Norms and the Law.” In Handbook of Law and Economics Vol. 2, edited by Polinsky, A. Mitchell and Shavell, Steven, 15731618. Elsevier.CrossRefGoogle Scholar
Murphy, Joseph E. 2010. “A Compliance & Ethics Program on a Dollar a Day: How Small Companies Can Have Effective Programs.” Society of Corporate Compliance & Ethics. https://assets.corporatecompliance.org/Portals/1/PDF/Resources/CEProgramDollarADay-Murphy.pdf. (Available in different languages at www.corporatecompliance.org/compliance-ethics-program-dollar-day-how-small-companies-can-have-effective.)Google Scholar
Murphy, Joseph E. 2014. “Tone at the Top: How the CEO Can Do More Than Just Talk.” Compliance & Ethics Professional (online magazine) (October): 80.Google Scholar
Murphy, Joseph E. 2017. “Policies in Conflict: Undermining Corporate Self-Policing.” Rutgers University Law Review 69: 421–96.Google Scholar
van der Noll, Rob, and Baarsma, Barbara. 2017. “Compliance with Cartel Laws and the Determinants of Deterrence – An Empirical Investigation.” European Competition Journal 13, no. 2–3: 336–55.CrossRefGoogle Scholar
Paha, Johannes, and Götz, Georg. 2015. “Screening und das Compliance-Risikomodell: Konzepte zur unternehmensinternen Aufdeckung von Verstößen gegen das Kartellverbot.” Wirtschaft und Wettbewerb 12: 1198210.Google Scholar
Parker, Christine. 2002. The Open Corporation: Effective Self-Regulation and Democracy. Cambridge University Press.CrossRefGoogle Scholar
Parker, Christine, and Nielsen, Vibeke Lehmann. 2009. “Corporate Compliance Systems: Could They Make Any Difference?Administration & Society 41, no. 1: 337.CrossRefGoogle Scholar
Paruzel, Agnieszka, Steinmann, Barbara, Nübold, Annika, Ötting, Sonja K., and Maier, Günter W. 2016. “Psychological Contributions to Competition Law Compliance.” In Competition Law Compliance Programmes – An Interdisciplinary Approach, edited by Paha, Johannes, 215–41. Springer.Google Scholar
Riley, Anne, and Sokol, Daniel. 2015Rethinking Compliance.” Journal of Antitrust Enforcement 3: 357.CrossRefGoogle Scholar
Rodger, Barry. 2015. “Competition Law Compliance: The CMA 2015 Study, Compliance Rationales and the Need for Increased Compliance Professionalism and Education.” European Competition Law Review 36, No. 10: 423–9.Google Scholar
Rummel, Per. 2016. “Legal Incentives for Compliance Programmes: Stick or Carrot?” In Competition Law Compliance Programmes – An Interdisciplinary Approach, edited by Paha, Johannes, 203–11. Springer.Google Scholar
Scheld, Denise, Paha, Johannes, and Fandrey, Nicolas. 2016. “Managing Antitrust Risks in the Banking Industry.” European Competition Journal 12: 113–36.CrossRefGoogle Scholar
Schwalbe, Ulrich. 2016. “Antitrust Compliance and Abusive Behaviour.” In Competition Law Compliance Programmes – An Interdisciplinary Approach, edited by Paha, Johannes, 103–20. Springer.Google Scholar
Simpson, Sally. 1986. “The Decomposition of Antitrust: Testing a Multi-level, Longitudinal Model of Profit-Squeeze.” American Sociological Review 51, No. 6: 859–75.CrossRefGoogle Scholar
2002. Corporate Crime, Law, and Social Control. Cambridge University Press.Google Scholar
Sokol, Daniel. 2012. “Cartels, Corporate Compliance, and What Practitioners Really Think about Enforcement.” Antitrust Law Journal 78: 201–38.Google Scholar
Sonnenfeld, Jeffrey. 2002. “What Makes Great Boards Great.” Harvard Business Review 2002 (September): 106–13.Google Scholar
Stephan, Andreas. 2010. “See No Evil: Cartels and the Limits of Antitrust Compliance Programs.” Company Lawyer 31, no. 8: 231–9.Google Scholar
Stigler, Gregory J. 1964. “Theory of Oligopoly.” Journal of Political Economy 72: 4461.CrossRefGoogle Scholar
Tayler, William B., and Bloomfield, Robert J.. 2011. “Norms, Conformity, and Controls.” Journal of Accounting Research, 49: 753–90.CrossRefGoogle Scholar
Thépot, Florence. 2015.“Antitrust v. Anti-corruption Policy Approaches to Compliance: Why Such a Gap?CPI Antitrust Chronicle 6, no. 2.Google Scholar
Thépot, Florence. 2016. “Can Compliance Programmes Contribute to Effective Antitrust Enforcement?” In Competition Law Compliance Programmes – An Interdisciplinary Approach, edited by Paha, Johannes, 191202. Springer.CrossRefGoogle Scholar
Thépot, Florence. 2019. The Interaction between Competition Law and Corporate Governance: Opening the “Black Box.” Cambridge University Press.CrossRefGoogle Scholar
Umphress, Elizabeth E., Bingham, John B., and Mitchell, Marie S.. 2010. “Unethical Behavior in the Name of the Company: The Moderating Effect of Organizational Identification and Positive Reciprocity Beliefs on Unethical Pro-organizational Behavior. Journal of Applied Psychology 95: 769–80.CrossRefGoogle ScholarPubMed
US Department of Justice, Criminal Division. 2019. “Evaluation of Corporate Compliance Programs. Guidance Document.” https://bit.ly/2lEphmk.Google Scholar
Wagner-von Papp, Florian. 2016. “Compliance and Individual Sanctions in the Enforcement of Competition Law.” In Competition Law Compliance Programmes – An Interdisciplinary Approach, edited by Paha, Johannes, 135–88. SpringerGoogle Scholar
Wils, Wouters. 2013. “Antitrust Compliance Programmes and Optimal Antitrust Enforcement.” Journal of Antitrust Enforcement 1: 581.CrossRefGoogle Scholar
Abrantes-Metz, R., Froeb, L., Geweke, J., and Taylor, C.. 2006. “A Variance Screen for Collusion.” International Journal of Industrial Organization 24, no. 3 (May): 467–86.CrossRefGoogle Scholar
Abrantes-Metz, Rosa, Kraten, Michael, Metz, Albert, and Seow, Gim. 2012. “Libor Manipulation?Journal of Banking and Finance 36, No. 1 (January): 136–50.CrossRefGoogle Scholar
Anderson, E. T., and Simester, D. I.. 2014. “Reviews without a Purchase: Low Ratings, Loyal Customers, and Deception.” Journal of Marketing Research 51, No. 3 (June): 249–69.CrossRefGoogle Scholar
Axelrod, R. 1984. The Evolution of Cooperation. New York: Basic Books.Google Scholar
Bajari, P., and Ye, L.. 2003. “Deciding between Competition and Collusion.” Review of Economics and Statistics 85, no. 4 (November): 971–89.CrossRefGoogle Scholar
Beckenstein, A. R., and Gabel, H. L.. 1986. “The Economics of Antitrust Compliance.” Southern Economics Journal 52, no. 3 (January): 673–92.CrossRefGoogle Scholar
Brown, Z. Y., and MacKay, A.. 2019. “Competition in Pricing Algorithms.” Working Paper.CrossRefGoogle Scholar
Calvano, E., Calzolari, G., Denicolò, V., and Pastorello, S.. 2020. “Artificial Intelligence, Algorithmic Pricing and Collusion.” American Economic Review 110, no. 10: 3267–97.CrossRefGoogle Scholar
Crandall, J. W., Oudah, M., Tennom, F. Ishowo-Oloko, S. Abdallah, J. F. Bonnefon, M. Cebrian, A. Shariff, M. A. Goodrich, , and Rahwan, I.. 2018. “Cooperating with Machines.” Nature Communications 9: 233.CrossRefGoogle ScholarPubMed
Dong, C., Wang, Y., Aldweesh, A., McCorry, P., and van Moorsel, A.. 2017. “Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing.” Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, 30 October–3 November.CrossRefGoogle Scholar
Ezrachi, A., and Stucke, M. E.. 2017. “Artificial Intelligence and Collusion: When Computers Inhibit Competition.” Illinois Law Review 2017: 17851810.Google Scholar
Genesove, D., and Mullin, W. P.. 2001. “Rules, Communication, and Collusion: Narrative Evidence from the Sugar Institute Case.” American Economic Review 91, No. 3: 379–98.CrossRefGoogle Scholar
Green, E., and Porter, R.. 1984. “Noncooperative Collusion under Imperfect Price Information.” Econometrica 52, No. 1: 87100.CrossRefGoogle Scholar
Greif, A. 2006. Institutions and the Path to the Modern Economy: Lessons from Medieval Trade. New York: Cambridge University Press.CrossRefGoogle Scholar
Harrington, J. 2007. “Behavioral Screening and the Detection of Cartels.” In European Competition Law Annual 2006: Enforcement of Prohibition of Cartels, eds. Ehlermann, Claus-Dieter and Atanasiu, Isabela, 5168. Oxford: Hart Publishing.Google Scholar
Harrington, J. 2018. “Antitrust in High Speed: Colluding through Algorithms and Other Technologies.” New York, 8 January. https://joeharrington5201922.github.io/pdf/Antitrust%20in%20High%20Speed_Remarks_Harrington.pdf.Google Scholar
Harrington, J., and Chen, J.. 2006. “Cartel Pricing Dynamics with Cost Variability and Endogenous Buyer Detection.” International Journal of Industrial Organization 24, No. 6: 347.CrossRefGoogle Scholar
Hendricks, K., McAfee, R. P., and Williams, M.. 2015. “Auctions and Bid Rigging.” In Oxford Handbook on International Antitrust Economics, Vol. 2, eds. Blair, Roger D. and Sokol, D. Daniel, 498522. New York: Oxford University Press.Google Scholar
Hylton, K. N. 2015. “Deterrence and Antitrust Punishment: Firms versus Agents.” Iowa Law Review 100: 2069–83.Google Scholar
Ishii, R. 2009. “Favor Exchange in Collusion: Empirical Study of Repeated Procurement Auctions in Japan.” International Journal of Industrial Organization 27: 137–44.CrossRefGoogle Scholar
Ittoo, A., and Petit, N.. 2017. “Algorithmic Pricing Agents and Tacit Collusion: A Technological Perspective.” Working Paper.CrossRefGoogle Scholar
Jiménez, J. L., and Perdiguero, J.. 2012. “Does Rigidity Hide Collusion?Review of Industrial Organization 41, no. 3: 223–48.CrossRefGoogle Scholar
Lappas, T., Sabnis, G., and Valkanas, G.. 2016. “The Impact of Fake Reviews on Online Visibility: A Vulnerability Assessment of the Hotel Industry.” Information Systems Research 27, No. 4: 940–61.CrossRefGoogle Scholar
Levenstein, M. 1997. “Price Wars and the Stability of Collusion: A Study of the Pre-World War I Bromine Industry.” Journal of Industrial Economics 45, No. 2: 117–38.Google Scholar
Kaplow, L. 2013. Competition Policy and Price Fixing. Princeton, NJ: Princeton University Press.Google Scholar
Klein, T. 2019. “Autonomous Algorithmic Collusion: Q-Learning under Sequential Pricing.” Working Paper.CrossRefGoogle Scholar
Kühn, K. U., and Tadelis, S.. 2018. “The Economics of Algorithmic Pricing: Is Collusion Really Inevitable?” Working Paper.Google Scholar
Luca, M., and Zervas, G.. 2016. “Fake It Till You Make It: Reputation, Competition, and Yelp Review Fraud.” Management Science 62, No. 12: 3412–27.CrossRefGoogle Scholar
Macaulay, S. 1963. “Non-contractual Relations in Business: A Preliminary Study.” American Sociological Review 28, No. 1: 5567.CrossRefGoogle Scholar
Maskin, E., and Tirole, J.. 1988. “A Theory of Dynamic Oligopoly, II: Price Competition, Kinked Demand Curves, and Edgeworth Cycles.” Econometrica 56, No. 3: 571–99.CrossRefGoogle Scholar
Mayzlin, D., Dover, Y., and Chevalier, J.. 2014. “Promotional Reviews: An Empirical Investigation of Online Review Manipulation.” American Economic Review 104, No. 8: 2421–55.CrossRefGoogle Scholar
Mehra, S. K. 2016. “Antitrust and the Robo-Seller: Competition in the Time of Algorithms.” Minnesota Law Review 100: 1323–75.Google Scholar
Miklos-Thal, J., and Tucker, C.. 2019. “Collusion by Algorithm: Does Better Demand Prediction Facilitate Coordination between Sellers?Management Science 65, no. 4: 1552–61.CrossRefGoogle Scholar
Milgrom, P., and Roberts, J.. 1990. “Rationalizability, Learning, and Equilibrium in Games with Stochastic Complementarities.” Econometrica 58, No. 6: 1255–77.CrossRefGoogle Scholar
Mukherjee, A. B., Wang, Liu J., Glance, N., and Jindal, N.. 2011. “Detecting Group Review Spam.” ACM Proceedings of the 20th International Conference Companion on World Wide Web: 93–4.CrossRefGoogle Scholar
Porter, R., and Zona, J.. 1999. “Ohio School Milk Markets: An Analysis of Bidding.” RAND Journal of Economics 30: 263–88.CrossRefGoogle Scholar
Riley, A., and Sokol, D. D.. 2015. “Rethinking Compliance.” Journal of Antitrust Enforcement 3: 3157.CrossRefGoogle Scholar
Rotemberg, J., and Saloner, G.. 1986. “A Supergame-Theoretic Model of Price Wars during Booms.” American Economic Review 76, No. 3: 390407.Google Scholar
Salcedo, B. 2015. “Pricing Algorithms and Tacit Collusion.” Working paper.Google Scholar
Schinkel, M. P., and Spiegel, Y.. 2017. “Can Collusion Promote Sustainable Consumption and Production?International Journal of Industrial Organization 53: 371–98.CrossRefGoogle Scholar
Schwalbe, U. 2018. “Algorithms, Machine Learning, and Collusion.” Working Paper.CrossRefGoogle Scholar
Sokol, D. D. 2017. “Antitrust Compliance.” In The Oxford Handbook of Strategy Implementation, eds. Hitt, Michael A., Jackson, Susan E., Carmona, Salvador, Bierman, Leonard, Shalley, Christina E., and Wright, Mike, 155–76. New York: Oxford University Press.Google Scholar
Tesauro, G., and Kephart, J. O.. 2002. “Pricing in Economies Using Multi-agent Q-learning.” Autonomous Agents and Multi-agent Systems 5: 289304.CrossRefGoogle Scholar
Tirole, J. 1996. “A Theory of Collective Reputations (with Applications to the Persistence of Corruption and to Firm Quality).” Review of Economic Studies 63, No. 1: 122.CrossRefGoogle Scholar
Waltman, L., and Kaymak, U.. 2008. “Q-learning Agents in a Cournot Oligopoly Model.” Journal of Economic Dynamics and Control 32: 3275–93.CrossRefGoogle Scholar
Wilson, N., and O’Connor, J.. 2019. “Reduced Demand Uncertainty and the Sustainability of Collusion: How AI Could Affect Competition.” Working Paper.CrossRefGoogle Scholar
Williamson, Oliver. 1983. “Credible Commitments: Using Hostages to Support Exchange.” American Economic Review 73, No. 4: 519–40.Google Scholar
American Health Information Management Association (AHIMA). 2004. The State of HIPAA Privacy and Security Compliance. http://bok.ahima.org/PdfView?oid=23016.Google Scholar
American Health Information Management Association (AHIMA). 2006. The State of HIPAA Privacy and Security Compliance. http://bok.ahima.org/doc?oid=100517#.XW05lpNKiT8.Google Scholar
Anthony, Denise L., Appari, Ajit, and Johnson, M. Eric. 2014. “Institutionalizing HIPAA Compliance: Organizations and Competing Logics in U.S. Health Care.” Journal of Health and Social Behavior 55: 108–24.CrossRefGoogle ScholarPubMed
Anthony, Denise L., and Stablein, Timothy. 2016. “Privacy in Practice: Professional Discourse about Information Control in Health Care.” Journal of Health Organization and Management 30:207–26.CrossRefGoogle ScholarPubMed
Carrion, Inmaculada, Aleman, Jose Luis Fernandez, and Toval, Ambrosio. 2011. “Assessing the HIPAA Standard in Practice: PHR Privacy Policies.” Annual Conference of the IEEE EMBS 33 (August–September): 2380–3.Google Scholar
Cavusoglu, Huseyin, Cavusoglu, Hasan, Son, Jai-Yeol, and Benbasat, Izak. 2015. “Institutional Pressures in Security Management: Direct and Indirect Influences on Organizational Investment in Information Security Control Resources.” Information and Management 52: 385400.CrossRefGoogle Scholar
Drolet, Brian C., Marwaha, Jayson S., Hyatt, Brad, Blazar, Phillip E., and Lifchez, Scott D.. 2017. “Electronic Communication of Protected Health Information: Privacy, Security, and HIPAA Compliance.” Journal of Hand Surgery 42, No. 6 (June): 411–16.CrossRefGoogle ScholarPubMed
Freundlich, Robert E., Freundlich, Katherine L., and Drolet, Brian C.. 2018. “Pagers, Smartphones, and HIPAA: Finding the Best Solution for Electronic Communication of Protected Health Information.” Journal of Medical Systems 42:9.CrossRefGoogle Scholar
Lye, Carolyn T., Forman, Howard P., Gao, Ruiyi, Daniel, Jodi G., Hsiao, Allen L., Mann, Marilyn K., deBronkart, Dave, Campos, Hugo O., and Krumholz, Harlan M.. 2018. “Assessment of US Hospital Compliance with Regulations for Patients’ Requests for Medical Records.” JAMA Open Network (October 5): 112.CrossRefGoogle Scholar
McKnight, Randall, and Franko, Orrin. 2016. “HIPAA Compliance with Mobile Devices Among ACGME Programs.” Journal of Medical Systems 40, No. 5 (May): 129.CrossRefGoogle ScholarPubMed
Paasche-Orlow, Michael, Brancati, Frederick L., Taylor, Holly A., Jain, Sumati, Pandit, Anjali, and Wolf, Michael S.. 2013. “Readability of Consent Form Templates: A Second Look.” IRB: Ethics and Human Research 35, No. 4 (July–August): 1219.Google ScholarPubMed
United States Department of Health and Human Services (HHS). 2016. Individuals’ Right Under HIPAA to Access Their Health Information 45 CFR § 164.524. www.hhs.gov/hipaa/for-professionals/privacy/guidance/access/index.html.Google Scholar
United States Department of Health and Human Services (HHS). 2018. Report to Congress on HIPAA Privacy, Security, and Breach Notification Rule Compliance for Calendar Years 2015, 2016, and 2017. www.hhs.gov/sites/default/files/compliance-report-to-congress-2015–2016–2017.pdf.Google Scholar
United States Department of Health and Human Services (HHS). 2019. HIPAA Compliance and Enforcement. www.hhs.gov/hipaa/for-professionals/compliance-enforcement/index.html.Google Scholar
Yaraghi, Niam, and Gopal, Ram D.. 2018. “The Role of HIPAA Omnibus Rules in Reducing the Frequency of Medical Data Breaches: Insights from an Empirical Study.” Milbank Quarterly 96, No. 1: 144–66.CrossRefGoogle ScholarPubMed
Ayres, Ian, and Braithwaite, John. 1992. Responsive Regulation: Transcending the Deregulation Debate. Oxford University Press.Google Scholar
Chrai, Suffly S., and Burd, Michelle. 2004. “Consent Decrees: Effects on Consumers, Companies, and Investors.” Pharmaceutical Technology 28: 168–82.Google Scholar
Deloitte Center for Regulatory Strategy, Americas. 2019. Leading in Times of Change: Life Sciences Regulatory Outlook 2019, www2.deloitte.com/content/dam/Deloitte/us/Documents/regulatory/us-insurance-regulatory-outlook-2019.pdf.Google Scholar
Glicksman, Robert L., and Earnhart, Dietrich. 2015. “Coercive vs. Cooperative Enforcement: Effect of Enforcement Approach on Environmental Management.” International Review of Law & Economy 42: 135–46.Google Scholar
Goldstein, Wendy C., and Snyder, Lynn Shapiro. 2003. “The OIG’s Draft Compliance Guidance for Pharmaceutical Manufacturers: One More Compliance ‘Script’ for the Healthcare Industry.” Food and Drug Law Institute Update 2630.Google Scholar
Green, Michael D. 1997. “Statutory Compliance and Tort Liability: Examining the Strongest Case.” University of Michigan Journal of Legal Reform 30: 461510.Google Scholar
Hale, Andrew, Borys, David, and Adams, Mark. 2011. “Regulatory Overload: A Behavioral Analysis of Regulatory Compliance.” Working Paper No. 11–47, Mercatus Center: George Mason University, 131.Google Scholar
Hans, Mohit, and Gupta, Suresh Kumar. 2018. “Comparative Evaluation of Pharmacovigilence Regulation of the United States, United Kingdom, Canada, India, and the Need for Global Harmonized Practices.” Perspectives in Clinical Research 9(4): 170–4.Google Scholar
Hindin, David A., and Silberman, D.. 2016. “Designing More Effective Rules and Permits.” George Washington Journal of Energy and Environmental Law 7: 103–23.Google Scholar
Miller, Jennifer E., Wilenzick, Marc, Ritcey, Nolan, Ross, Joseph S., and Mello, Michelle M.. 2017. “Measuring Clinical Trial Transparency: An Empirical Analysis of Newly Approved Drugs and Large Pharmaceutical Companies.” British Medical Journal Open 7: e017917. https://bmjopen.bmj.com/content/7/12/e017917.Google ScholarPubMed
Niedelman, Steven M. 2005. “Remarks at the Food and Drug Law Institute’s 48th Annual Conference.” Food and Drug Law Journal 60: 117.Google ScholarPubMed
Noah, Lars. 2000. “Rewarding Regulatory Compliance: The Pursuit of Symmetry in Products Liability.” Georgetown Law Journal 88: 2147–65.Google ScholarPubMed
Olson, Mary K. 1995. “Regulatory Discretion Among Competing Industries: Inside the FDA.” Journal of Law, Economics and Organization 11: 379405.Google Scholar
Olson, Mary K. 1996. “Substitution in Regulatory Agencies: FDA Enforcement Alternatives.” Journal of Law, Economics and Organization 12: 376407.CrossRefGoogle Scholar
Olson, Mary K. 1999. “Agency Rulemaking, Political Influences, Regulation, and Industry Compliance.” Journal of Law, Economics and Organization 15: 573601.CrossRefGoogle Scholar
Page, Robert A. Jr. et al. 2015. “Sustainability and Stratified Noncompliance in the Pharmaceutical Industry.” Journal of International Business Disciplines 1: 1840.Google Scholar
Poska, Richard, and Graham, Ballard. 2009. “FDA 483 Responses-Suggestions for Industry.” Journal of Validation Technology 5762.Google Scholar
Prayle, Andrew P., Hurly, Matthew N., and Smyth, Alan R.. 2012. “Compliance with Mandatory Reporting of Clinical Trials Results on ClinicalTrials.gov: Cross Sectional Study.” British Medical Journal Open 344: d7373. www.bmj.com/content/bmj/344/bmj.d7373.full.pdf.CrossRefGoogle ScholarPubMed
Rabin, Robert L. 2000. “Reassessing Regulatory Compliance.” Georgetown Law Journal 88: 2147–65.Google ScholarPubMed
Sclar, David, and Keilty, Gary. 2012. “Sunshine and Strategy: Managing and Monitoring Compliance with PPACA’s Sunshine Provisions – Evolving Legal Requirements and Operational Considerations.” Health Lawyer 24: 1424.Google Scholar
Tyler, Ralph S. 2013. “The Goals of FDA Regulation and the Challenges of Meeting Them.” Health Matrix 22: 423–6.Google Scholar
Wiktorowicz, Mary E. 2003. “Emergent Patterns in the Regulation of Pharmaceuticals: Institutions and Interests in the United States, Canada, Britain and France.” Journal of Health Politics, Policy, and Law 28(4): 615–58.CrossRefGoogle ScholarPubMed
Arlen, Jennifer, and Kraakman, Reinier. 1997. “Controlling Corporate Misconduct: An Analysis of Corporate Liability Regimes.” New York University Law Review 72:687779.Google Scholar
Arlen, Jennifer, and Buell, Samuel W.. 2020. “The Law of Corporate Investigations and the Global Expansion of Corporate Criminal Liability.” University of Southern California Law Review 93:697761.Google Scholar
Baer, Miriam H. 2009. “Governing Corporate Compliance.” Boston College Law Review 50:9491019.Google Scholar
Blundell-Wignall, Adrian, and Roulet, Caroline. 2017. “Foreign Direct Investment, Corruption and the OECD Anti-Bribery Convention.” www.oecd-ilibrary.org/finance-and-investment/foreign-direct-investment-corruption-and-the-oecd-anti-bribery-convention_9cb3690c-en.Google Scholar
Brewster, Rachel, and Dryden, Christine. 2018. “Building Multilateral Anticorruption Enforcement: Analogies between International Trade and Anti-Bribery Law.” Virginia Journal of International Law 57:221–62.Google Scholar
Brunelle, Emmanuelle. 2018. “French Anti-Corruption Agency Provides Guidance on Sapin II Compliance.” Freshfields Bruckhaus Deringer LLP. https://www.lexology.com/library/detail.aspx?g=d9d485e0-48e8-45ca-9e3b-1b1b443f2415.Google Scholar
Choi, Stephen J., and Davis, Kevin E.. 2014. “Foreign Affairs and Enforcement of the Foreign Corrupt Practice Act.” Journal of Empirical Legal Studies 11:409–45.CrossRefGoogle Scholar
Christensen, Hans B., Maffett, Mark G., and Rauter, Thomas. 2019. “Policeman for the World: US Enforcement of Foreign Corruption Regulation and Corporate Investment Policies.” https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3349272.CrossRefGoogle Scholar
Cole, Jeremy, and Roberts, Michael. 2011. “Changes in UK Corruption Enforcement – The Bribery Act of 2010.” Hogan Lovells LLP. https://www.lexology.com/library/detail.aspx?g=2688ffe3-2aa3-4076-9701-768ea64d78f8.Google Scholar
Consero Group. 2017. “Corporate Compliance & Ethics Report.” www.consero.com/august-2017-corporate-compliance-ethics-report/.Google Scholar
Cuervo-Cazurra, Alvaro. 2006. “Who Cares About Corruption?Journal of International Business Studies 37:807–22.CrossRefGoogle Scholar
Davis, Kevin E. 2019. Between Impunity and Imperialism: The Regulation of Transnational Bribery. New York: Oxford University Press.CrossRefGoogle Scholar
Dell, Gillian, and Andrew, McDevitt. 2018. “Exporting Corruption, Progress Report 2018: Assessing Enforcement of the OECD Anti-Bribery Convention.” www.transparency.lt/wp-content/uploads/2018/09/TI_Exporting-Corruption-Report_2018.pdf.Google Scholar
Desio, Paula (Deputy General Counsel, US Sentencing Commission). “An Overview of the Organizational Guidelines.” www.ussc.gov/sites/default/files/pdf/training/organizational-guidelines/ORGOVERVIEW.pdf (accessed December 11, 2020).Google Scholar
D’Souza, Anna. 2012. “The OECD Anti-Bribery Convention: Changing the Currents of Trade.” Journal of Development Economics 97:7387.CrossRefGoogle Scholar
English, Stacey, and Hammond, Susannah. 2017. “Cost of Compliance.” Thomson Reuters. https://legal.thomsonreuters.com/content/dam/ewp-m/documents/legal/en/pdf/reports/cost-of-compliance-2017.pdf.Google Scholar
Ford, Christie, and Hess, David. 2009. “Can Corporate Monitorships Improve Corporate Compliance?Journal of Corporation Law 34:679737.Google Scholar
Gilbert, Jo-Anne, and Sharman, J. C.. 2014. “Turning a Blind Eye to Bribery: Explaining Failures to Comply with the International Anti-corruption Regime.” Political Studies 64:7489.CrossRefGoogle Scholar
Heimann, Fritz, Földes, Ádám, and Coles, Sophia. 2015. “Exporting Corruption, Progress Report 2015: Assessing Enforcement of the OECD Convention on Combatting Foreign Bribery.” https://issuu.com/transparencyinternational/docs/2015_exportingcorruption_oecdprogre.Google Scholar
Holtmeier, Jay. 2015. “A Case for Measured Coordination among Multiple Enforcement Authorities.” Fordham Law Review 84:493523.Google Scholar
Jensen, Nathan M., and Malesky, Edmund J.. 2018. “Nonstate Actors and Compliance with International Agreements: An Empirical Analysis of the OECD Anti-Bribery Convention.” International Organization 72:3369.CrossRefGoogle Scholar
Kroll. 2018. “Anti-Bribery and Corruption Benchmarking Report” (April 1). www.kroll.com/en-us/abc-report.Google Scholar
Martinez, Veronica Root. 2019. “The Outsized Influence of the FCPA?Illinois Law Review 2019:1205–25.Google Scholar
Martinez, Veronica Root. 2020. “Complex Compliance Investigations.” Columbia Law Review 120:249307.Google Scholar
Meshell, Gary B. 2017. “Turning the Regulatory Challenges of Cloud Computing into Competitive Advantage” (October) IBM Security. https://hosteddocs.ittoolbox.com/cloud-regulatory-advantage.pdf.Google Scholar
Root, Veronica. 2017. “Coordinating Compliance Incentives.” Cornell Law Review 102:1003–85.Google Scholar
Spahn, Elizabeth K. 2012. “Multijurisdiction Bribery Law Enforcement: The OECD Anti-Bribery Convention.” Virginia Journal of International Law 53:152.Google Scholar
Spencer, Jennifer, and Gomez, Carolina. 2011. “MNEs and Host Country Corruption.” Strategic Management Journal 32:280300.CrossRefGoogle Scholar
Stephan, Paul B. 2012. “Regulatory Competition and Anticorruption Law.” Virginia Journal of International Law 53:5370.Google Scholar
Sykes, Alan, and Pearlman, Rebecca L.. 2017. “The Political Economy of the Foreign Corrupt Practices Act: An Explanatory Analysis.” Journal of Legal Analysis 9:153–82.Google Scholar
Tokar, Dylan. 2020. “AB InBev Taps Machine Learning to Root Out Corruption” (January 17), Wall Street Journal. https://www.wsj.com/articles/ab-inbev-taps-machine-learning-to-root-out-corruption-11579257001.Google Scholar
Trzcinski, Leah M. 2013. “The Impact of the Foreign Corrupt Practices Act on Emerging Markets: Company Decision-Making in a Regulated World.” New York University Journal of International Law & Politics 45:1201–85.Google Scholar
Warin, Joseph, Diamant, Michael, and Root, Veronica. 2011. “Somebody’s Watching Me: FCPA Monitorships and How They Can Work Better.” University of Pennsylvania Journal of Business Law 13:321–81.Google Scholar
Yeung, Karen. 2004. Securing Compliance: A Principled Approach. Portland: Oxford.Google Scholar
Zeume, Stefan. 2017. “Bribes and Firm Value.” Review of Financial Studies 30:1457–89.CrossRefGoogle Scholar
Ablon, L., Heaton, P., Lavery, D., and Romanosky, S. 2016. Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information. Santa Monica, CA: RAND Corporation.CrossRefGoogle Scholar
Acemoglu, D., Malekian, A., and Ozdaglar, A. 2016. “Network Security and Contagion.” Journal of Economic Theory 166: 536–85.CrossRefGoogle Scholar
Acquisti, A., Friedman, A., and Telang, R. 2006. “Is There a Cost to Privacy Breaches? An Event Study.” Proceedings of the 3rd International Conference on Intelligent Systems (ICIS).Google Scholar
Akerlof, G. 1970. “The Market for Lemons: Quality Uncertainty and the Market Mechanism.” Quarterly Journal of Economics 84: 488500.CrossRefGoogle Scholar
Anderson, R. 2001. “Why Information Security Is Hard – An Economic Perspective.” Proceedings of the 17th Annual Computer Security.Google Scholar
Anderson, R. J., and Moore, T. 2006. “The Economics of Information Security.” Science 314: 610–13.CrossRefGoogle ScholarPubMed
Arcuri, M. C., Brogi, M., and Gandolfi, G. 2014. “The Effect of Information Security Breaches on Stock Returns: Is the Cyber Crime a Threat to Firms?” European Financial Management Association Meeting, Rome.Google Scholar
Beautement, A., Becker, I., Parkin, S., Krol, K., and Sasse, M. A. (2016). “Productive Security: A Scalable Methodology for Analysing Employee Security Behaviours.” Proceedings of the Symposium on Usable Privacy and Security (SOUPS) (253–70).Google Scholar
Benaroch, M. 2017. “Real Options Models for Proactive Uncertainty: Reducing Mitigations and Applications in Cybersecurity Investment Decisionmaking.” Information Systems Research, forthcoming. 10.1287/isre.2017.0714.Google Scholar
Buckman, J., Hashim, M. J., Woutersen, T., and Bockstedt, J. (2019). “Fool Me Twice? Data Breach Reductions Through Stricter Sanctions.” Working paper, https://ssrn.com/abstract=3258599.Google Scholar
Campbell, K., Gordon, L. A., Loeb, M. P., and Zhou, L. 2003. “The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market.” Journal of Computer Security 11(3): 431–48.CrossRefGoogle Scholar
Cannon, D. M., and Kessler, L. 2007. “Danger–Corporate Data Breach!Journal of Corporate Accounting & Finance 18(5): 41–9.CrossRefGoogle Scholar
Calo, R. 2015. “Robotics and the Lessons of Cyberlaw.” California Law Review 103(3): 513–63.Google Scholar
Cao, Y., Xiao, C., Cyr, B., Zhou, Y., Park, W., Rampazzi, S., Chen, Q. A., Fu, K., and Mao, Z. M. 2019. “Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving.” Proceedings of the 26th ACM Conference on Computer and Communications Security (ACM CCS), November.CrossRefGoogle Scholar
Cavusoglu, H., Mishra, B., and Raghunathan, S. 2004. “The Effect of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers.” International Journal of Electronic Commerce 9(1): 70104.CrossRefGoogle Scholar
Chai, S., Kim, M., and Rao, H. R. 2011. “Firms’ Information Security Investment Decisions: Stock Market Evidence of Investors’ Behavior.” Decision Support Systems 50(4): 651–61.CrossRefGoogle Scholar
Chatterjee, C., and Sokol, D. D. 2019. “Don’t Acquire a Company Until You Evaluate Its Data Security.” Harvard Business Review. https://hbr.org/2019/04/dont-acquire-a-company-until-you-evaluate-its-data-security.Google Scholar
Chen, J. V., Li, H. C., Yen, D. C., Bata, K. V. 2012. “Did IT Consulting Firms Gain When Their Clients Were Breached?Computers in Human Behavior 28(2): 456–64.CrossRefGoogle Scholar
Chronopoulos, M., Panaousis, E., and Grossklags, J. 2018. “An Options Approach to Cybersecurity Investment.” IEEE Access 6: 12175–86.CrossRefGoogle Scholar
Collins, J. D., Sainato, V. A., and Khey, D. N. 2011. “Organizational Data Breaches 2005–2010: Applying SCP to the Healthcare and Education Sectors.” International Journal of Cyber Criminology 5(1): 794810.Google Scholar
Cummins, J. D., Lewis, C. M., and Wei, R.. 2006. “The Market Value Impact of Operational Loss Events for US Banks and Insurers.” Journal of Banking & Finance 30(10): 2605–34.CrossRefGoogle Scholar
Garg, A., Curtis, J., and Halper, H. 2003. “Quantifying the Financial Impact of IT Security Breaches.” Information Management and Computer Security 11(2): 7483.CrossRefGoogle Scholar
Gartner. 2019. “Gartner Says IT Security Spending to Hit $124B in 2019.” www.darkreading.com/2019-security-spending-outlook/d/did/1333826?image_number=2.Google Scholar
Goel, S., and Shawky, H. A. 2009. “Estimating the Market Impact of Security Breach Announcements on Firm Values.” Information & Management 46(7): 404–10.CrossRefGoogle Scholar
Gordon, L. A., Loeb, M. P., and Zhou, L. 2011. “The Impact of Information Security Breaches: Has There Been a Downward Shift in Costs?Journal of Computer Security 19(1): 3356.CrossRefGoogle Scholar
Gordon, L. A., Loeb, M. P., Lucyshyn, W., and Zhou, L. 2018. “Empirical Evidence on the Determinants of Cybersecurity Investments in Private Sector Firms.” Journal of Information Security 9(2): 133–53.CrossRefGoogle Scholar
Hilary, G., Segal, B., and Zhang, May H. 2016. “Cyber-Risk Disclosure: Who Cares?” Georgetown McDonough School of Business Research Paper No. 2852519.CrossRefGoogle Scholar
Hinz, O., Nofer, M., Schiereck, D., and Trillig, J. 2015. “The Influence of Data Theft on the Share Prices and Systematic Risk of Consumer Electronics Companies.” Information & Management 52(3): 337–47.CrossRefGoogle Scholar
Hovav, A., and D’Arcy, J. 2003. “The Impact of Denial-of-Service Attack Announcements on the Market Value of Firms.” Risk Management and Insurance Review 6(2): 97121.CrossRefGoogle Scholar
Jacobs, J., Romanosky, S., Edwards, B., Roytman, M., and Adjerid, I. 2019. “Exploit Prediction Scoring System (EPSS).” https://i.blackhat.com/USA-19/Thursday/us-19-Roytman-Predictive-Vulnerability-Scoring-System-wp.pdf.Google Scholar
Jensen, M. C., and Meckling, W. H. (1976). “Theory of the Firm: Managerial Behaviour, Agency Costs and Ownership Structure.” Journal of Financial Economics 3(4): 305–60.CrossRefGoogle Scholar
Jin, G. Z. 2019. “Artificial Intelligence and Consumer Privacy.” in The Economics of Artificial Intelligence: An Agenda, edited by Agrawal, Ajay, Goldfarb, Avi, and Gans, Joshua. Chicago: University of Chicago Press.Google Scholar
Kannan, K., Rees, J., and Sridhar, S. 2007. “Market Reactions to Information Security Breach Announcements: An Empirical Analysis.” International Journal of Electronic Commerce 12(1): 6991.CrossRefGoogle Scholar
Ko, M., and Dorantes, C. 2006. “The Impact of Information Security Breaches on Financial Performance of the Breached Firms: An Empirical Investigation.” Journal of Information Technology Management 17(2): 1322.Google Scholar
Ko, M., Osei-Bryson, K. M., and Dorantes, C. 2009. “Investigating the Impact of Publicly Announced Information Security Breaches on Three Performance Indicators of the Breached Firms.” Information Resources Management Journal (IRMJ) 22(2): 121.CrossRefGoogle Scholar
Kovenock, D., and Roberson, B. 2018. “The Optimal Defense of Networks of Targets.” Economic Inquiry 56(4): 21952211.CrossRefGoogle Scholar
Libicki, M. C., Ablon, L., and Webb, T. 2015. “The Defender’s Dilemma: Charting a Course Toward Cybersecurity.” Technical Report Research Report 1024, RAND Corporation.Google Scholar
Mangelsdorf, M. E. 2017. What Executives Get Wrong About Cybersecurity. MIT Sloan Management Review 58(2): 22.Google Scholar
Mitra, S., and Ransbotham, S. 2015. “Information Disclosure and the Diffusion of Information Security Attacks.” Information Systems Research 26(3): 565–84.CrossRefGoogle Scholar
Modi, S. B., Wiles, M. A., and Mishra, S. 2015. “Shareholder Value Implications of Service Failures in Triads: The Case of Customer Information Security Breaches.” Journal of Operations Management 35: 2139.CrossRefGoogle Scholar
Moore, T., Moore, D., and Chang, F. 2016. “Identifying How Firms Manage Cybersecurity Investment.” In 15th Workshop on the Economics of Information Security (WEIS).Google Scholar
Mulligan, D. K., and Bamberger, K. A. 2016. “Public Values, Private Infrastructure and the Internet of Things: The Case of Automobiles.” Journal of Law & Economic Regulation 9(1): 744.Google Scholar
NACD (2017). Director’s Handbook on Cyber-Risk Oversight. www.nacdonline.org/insights/publications.cfm?ItemNumber=10687.Google Scholar
Pirounias, S., Mermigas, D., and Patsakis, C. 2014. “The Relation Between Information Security Events and Firm Market Value, Empirical Evidence on Recent Disclosures: An Extension of the GLZ Study.” Journal of Information Security and Applications 19(4): 257–71.CrossRefGoogle Scholar
Romanosky, Sasha. 2016. “Examining the Costs and Causes of Cyber Incidents.” Journal of Cybersecurity 2(2): 121–35.Google Scholar
Romanosky, S., Telang, R., and Acquisti, A. 2011. “Do Data Breach Disclosure Laws Reduce Identity Theft?Journal of Policy Analysis and Management 30(2): 256–86.CrossRefGoogle Scholar
Romanosky, S., Hoffman, D., and Acquisti, A. 2014. “Empirical Analysis of Data Breach Litigation.” Journal of Empirical Legal Studies 11(1): 74104.CrossRefGoogle Scholar
Rothrock, R. A., Kaplan, J., and Van der Oord, F., 2018. “The Board’s Role in Managing Cybersecurity Risks.” MIT Sloan Management Review 59(2) (Winter): 1215.Google Scholar
Slotwiner, D. J., Deering, F., Fu, K., Russo, A. M., Walsh, M. N., and Van Hare, G. F. 2018. “Cybersecurity Vulnerabilities of Cardiac Implantable Electronic Devices.” Heart Rhythm 15(7) (May): e61e67.CrossRefGoogle ScholarPubMed
Solomon, Michael G., and Chapple, M. 2005. Information Security Illuminated. Burlington, MA: Jones & Bartlett Learning.Google Scholar
Solove, Daniel J., and Citron, Danielle K. 2018. “Risk and Anxiety: A Theory of Data Breach Harms.” Texas Law Review 96: 737–86.Google Scholar
Sombatruang, N., Onwuzurike, L., Sasse, M. A., and Baddeley, M. 2019. “Factors Influencing Users to Use Unsecured Wi-Fi Networks: Evidence in the Wild.” WiSec 2019 – Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks, 203–14. http://dx.doi.org/10.1145/3317549.3323412.CrossRefGoogle Scholar
Spanos, G., and Angelis, L. 2016. “The Impact of Information Security Events to the Stock Market: A Systematic Literature Review.” Computers & Security 58: 216–29.CrossRefGoogle Scholar
Telang, R., and Wattal, S. 2007. “An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price.” IEEE Transactions on Software Engineering 33(8): 544–57.CrossRefGoogle Scholar
Thales. 2017. “2017 Thales Data Threat Report: Trends in Encryption and Data Security (Financial Services Edition).” https://dtr-fin.thalesesecurity.com/.Google Scholar
Yayla, A. A., and Hu, Q. 2011. “The Impact of Information Security Events on the Stock Value of Firms: The Effect of Contingency Factors.” Journal of Information Technology 26(1): 6077.CrossRefGoogle Scholar
Athey, Susan, and Imbens, Guido W.. 2017. ‘The State of Applied Econometrics: Causality and Policy Evaluation’. Journal of Economic Perspectives 31, no. 2: 332. DOI: 10.1257/jep.31.2.3.CrossRefGoogle Scholar
Berry, Donald A. 2008. ‘The Science of Doping’. Nature 454, no. 7205: 692. DOI: 10.1038/454692a.CrossRefGoogle ScholarPubMed
Cisyk, Jeffrey. 2020. ‘Impacts of Performance-Enhancing Drug Suspensions on the Demand for Major League Baseball’. Journal of Sports Economics 21, no. 4: 391419. DOI: 10.1177/1527002520906529.CrossRefGoogle Scholar
Cisyk, Jeffrey, and Courty, Pascal. 2017. ‘Do Fans Care about Compliance to Doping Regulations in Sports? The Impact of PED Suspension in Baseball’. Journal of Sports Economics 18, No. 4: 323–50. DOI: 10.1177/1527002515587441.CrossRefGoogle Scholar
Connor, James, Woolf, Jules, and Mazanov, Jason. 2013. ‘Would They Dope? Revisiting the Goldman Dilemma’. British Journal of Sports Medicine 47, No. 11: 697700. DOI: 10.1136/bjsports-2012-091826.CrossRefGoogle ScholarPubMed
de Hon, Olivier, Kuipers, Harm, and van Bottenburg, Maarten. 2015. ‘Prevalence of Doping Use in Elite Sports: A Review of Numbers and Methods’. Sports Medicine 45, No. 1: 5769. DOI: 10.1007/s40279-014-0247-x.CrossRefGoogle ScholarPubMed
Delanghe, Joris R., Maenhout, Thomas M., Speeckaert, M. M., and De Buyzere, Marijn L.. 2014. ‘Detecting Doping Use: More Than an Analytical Problem’. Acta Clinica Belgica 69, No. 1: 25–9. DOI: 10.1179/0001551213Z.0000000009.CrossRefGoogle ScholarPubMed
Goldman, Bob, Bush, Patricia J., and Klatz, Ronald. 1984. Death in the Locker Room: Steroids and Sports. London: Century.Google Scholar
Hermann, Aaron, and Henneberg, Maciej. 2014. ‘Anti-doping Systems in Sports Are Doomed to Fail: A Probability and Cost Analysis’. Journal of Sports Medicine & Doping 4, No. 5: 148. DOI: 10.4172/2161-0673.1000148.Google Scholar
Isenmann, Eduard, Ambrosio, Gabriella, Joseph, Jan Felix, Mazzarino, Monica, de la Torre, Xavier, Zimmer, Philipp, Kazlauskas, Rymantas et al. 2019. ‘Ecdysteroids as Non-conventional Anabolic Agent: Performance Enhancement by Ecdysterone Supplementation in Humans’. Archives of Toxicology 93, No. 7: 110. DOI: 10.1007/s00204-019-02490-x.g.CrossRefGoogle ScholarPubMed
Kayser, Bengt, Mauron, Alexandre, and Miah, Andy. 2007. ‘Current Anti-doping Policy: A Critical Appraisal’. BMC Medical Ethics 8, No. 1: 2. DOI: 10.1186/1472-6939-8-2.CrossRefGoogle ScholarPubMed
Maennig, Wolfgang. 2014. ‘Inefficiency of the Anti-doping System: Cost Reduction Proposals’. Substance Use & Misuse 49, No. 9: 1201–5. DOI: 10.3109/10826084.2014.912065.CrossRefGoogle ScholarPubMed
Mazanov, Jason, and Connor, James. 2010. ‘Rethinking the Management of Drugs in Sport’. International Journal of Sport Policy 2, No. 1: 4963. DOI: 10.1080/19406941003634032.CrossRefGoogle Scholar
Mazanov, Jason, Huybers, Twan, and Connor, James. 2011. ‘Qualitative Evidence of a Primary Intervention Point for Elite Athlete Doping’. Journal of Science and Medicine in Sport 14, No. 2: 10610. DOI: 10.1016/j.jsams.2010.06.003.CrossRefGoogle ScholarPubMed
Mitchell, George John. 2007. ‘Report to the Commissioner of Baseball of an Independent Investigation into the Illegal Use of Steroids and Other Performance Enhancing Substances by Players in Major League Baseball’.Google Scholar
Møller, Verner. 2016. ‘The Road to Hell Is Paved with Good Intentions – A Critical Evaluation of WADA’s Anti-doping Campaign’. Performance Enhancement & Health 4, no. 3–4: 111–15. DOI: 10.1016/j.peh.2016.05.001.CrossRefGoogle Scholar
Mountjoy, Margo, Miller, Stuart, Vallini, Matteo, Foster, Jeremy, and Carr, James. 2017. ‘International Sports Federation’s Fight to Protect the Clean Athlete: Are We Doing Enough in the Fight against Doping?British Journal of Sports Medicine 51: 12411242. DOI: 10.1136/bjsports-2017-097870.CrossRefGoogle ScholarPubMed
Müller, Rudhard Klaus. 2010. ‘History of Doping and Doping Control’. Doping in Sports: Biochemical Principles, Effects and Analysis 195: 1–23. DOI: 10.1007/978-3-540-79088-4_1.Google Scholar
Overbye, Marie, Knudsen, Mette Lykke, and Pfister, Gertrud. 2013. ‘To Dope or Not to Dope: Elite Athletes’ Perceptions of Doping Deterrents and Incentives.’ Performance Enhancement & Health 2, no. 3: 11934. DOI: 10.1016/j.peh.2013.07.001.CrossRefGoogle Scholar
Pielke, Roger. 2018. ‘Assessing Doping Prevalence Is Possible: So What Are We Waiting For?Sports Medicine 48, No. 1: 207–9. DOI: 10.1007/s40279-017-0792-1.CrossRefGoogle ScholarPubMed
Pitsch, Werner. 2009. ‘“The Science of Doping” Revisited: Fallacies of the Current Anti-doping Regime’. European Journal of Sport Science 9, No. 2: 8795. DOI: 10.1080/17461390802702309.CrossRefGoogle Scholar
Pitsch, Werner, and Emrich, Eike. 2011. ‘The Frequency of Doping in Elite Sport: Results of a Replication Study’. International Review for the Sociology of Sport 47, No. 5: 559580. DOI: 10.1177/1012690211413969.CrossRefGoogle Scholar
Rosen, Sherwin. 1981. ‘The Economics of Superstars’. American Economic Review 71, No. 5: 845–58. www.jstor.org/stable/1803469.Google Scholar
Ulrich, Rolf, Pope, Harrison G., Cléret, Léa, Petróczi, Andrea, Nepusz, Tamás, Schaffer, Jay, Kanayama, Gen, Comstock, R. Dawn, and Simon, Perikles. 2018. ‘Doping in Two Elite Athletics Competitions Assessed by Randomized-Response Surveys’. Sports Medicine 48, No. 1: 211–19. DOI: 10.1007/s40279-017-0765-4.CrossRefGoogle ScholarPubMed
Van Reeth, Daam. 2013. ‘TV Demand for the Tour de France: The Importance of Stage Characteristics versus Outcome Uncertainty, Patriotism, and Doping’. International Journal of Sport Finance 8, No. 1: 3960.Google Scholar
Vlad, Robert Alexandru, Hancu, Gabriel, Popescu, Gabriel Cosmin, and Lungu, Ioana Andreea. 2018. ‘Doping in Sports, a Never-Ending Story?Advanced Pharmaceutical Bulletin 8, No. 4: 529. DOI: 10.15171/apb.2018.062.CrossRefGoogle ScholarPubMed
World Anti-Doping Agency. 2019. ‘Athlete Biological Passport Operating Guidelines’. www.wada-ama.org/en/resources/athlete-biological-passport/athlete-biological-passport-abp-operating-guidelines.Google Scholar
Altenburger, K., and Ho, D. E. (2019) “Can Silicon Valley Save Food Safety? Maybe, but Not with Online Reviews Alone,” Food Safety News, www.foodsafetynews.com/2019/01/can-silicon-valley-save-food-safety-maybe-but-not-with-online-reviews-alone/.Google Scholar
Baldwin, R. (1990) “Why Rules Don’t Work.” Modern Law Review 53: 321–37. https://doi.org/10.1111/j.1468–2230.1990.tb01815.x.CrossRefGoogle Scholar
Baldwin, R. (1995) Rules and Government. Oxford: Clarendon Press.Google Scholar
Barbera, F., and Audifredi, S. (2012). “In Pursuit of Quality: The Institutional Change of Wine Production Market in Piedmont.” Sociologia Ruralis 52: 311–31, https://doi.org/10.1111/j.1467–9523.2012.00567.x.CrossRefGoogle Scholar
Blanc, F. (2018a) From Chasing Violations to Managing Risks: Origins, challenges and evolutions in regulatory inspections. Cheltenham, UK: Edward Elgar Publishing.CrossRefGoogle Scholar
Blanc, F. (2018b) “Tools for Effective Regulation: Is ‘More’ Always ‘Better’?European Journal of Risk Regulation, 9, no. 3: 465–82, https://doi.org/10.1017/err.2018.19.CrossRefGoogle Scholar
Blanc, F., and Cola, G. (2017) “Inspections, Risks and Circumstances: Historical Development, Diversity of Structures and Practices in Food Safety.” Studi Parlamentari e di Politica Costituzionale 3–4: 73–4.Google Scholar
Blanc, F., Macrae, D., and Ottimofiore, G. (2015) Understanding and Addressing the Risk Regulation Reflex: Lessons from International Experience in Dealing with Risk, Responsibility and Regulation. Netherlands Ministry of Interior and Kingdom Relations. www.government.nl/documents/reports/2015/01/21/understanding-and-addressing-the-risk-regulation-reflex.Google Scholar
Brooks, S., Elliott, C. T., Spence, M. et al. (2017) “Four Years Post-Horsegate: An Update of Measures and Actions Put in Place Following the Horsemeat Incident of 2013.” Sci Food 1, no. 5, https://doi.org/10.1038/s41538-017–0007-z.Google ScholarPubMed
Better Regulation Task Force (BRTF). (1999) Regulation and Small Firms: a Progress Report. London: Better Regulation Task Force. Cabinet Office Publications & Publicity Team. http://www.brc.gov.uk/.Google Scholar
Cheng, C. (2017) The Politics of Food Safety: Detection and Perceptions of Food Safety Problems in China, PhD dissertation, Duke University, https://dukespace.lib.duke.edu/dspace/bitstream/handle/10161/14527/Cheng_duke_0066D_14036.pdf?sequence=1&isAllowed=y.Google Scholar
Coppin, C. A., and High, J. C. (1999) The Politics of Purity: Harvey Washington Wiley and the Origins of Federal Food Policy. Ann Arbor: University of Michigan Press.CrossRefGoogle Scholar
Corini, A., van der Meulen, B., Kets, F., Ottimofiore, G., and Blanc, F. (2017) “Enforcement of EU Food Law.” In Law Enforcement by EU Authorities – Implications for Political and Judicial Accountability, edited by Scholten, M. and Luchtman, M., 195220. Cheltenham, UK: Edward Elgar Publishing. https://doi.org/10.4337/9781786434630.00014.CrossRefGoogle Scholar
Diver, C. S. (1983) “The Optimal Precision of Administrative Rules.” Yale Law Journal 93, no. 1: 65109. https://doi.org/10.2307/796245.CrossRefGoogle Scholar
Fagotto, E. (2015). “Are We Being Served? The Relationship between Public and Private Food Safety Regulation.” In The Changing Landscape of Food Governance, edited by Havinga, Tetty, van Waarden, Frans, and Casey, Donal, 201–22. Cheltenham, UK: Edward Elgar. https://doi.org/10.4337/9781784715410.00022.Google Scholar
Fairman, R. and Yapp, C. (2004) The Evaluation of Effective Enforcement Approaches for Food Safety in SMEs. University of London: King’s College.Google Scholar
Ferrières, M. (2005) Sacred Cow, Mad Cow: A History of Food Fears. Translated by Gladding, Jody. New York: Columbia University Press.Google Scholar
Flynn, D. (2019) “Report Details Most Common Violations at FDA-Regulated Food Facilities.” Food Safety News, www.foodsafetynews.com/2019/01/can-silicon-valley-save-food-safety-maybe-but-not-with-online-reviews-alone/.Google Scholar
Food Standards Agency. (2001) Task Force on the Burdens of Food Regulations on Small Food Businesses. Food Standards Agency, London.Google Scholar
Food Standards Agency. (2019) Annual Report on Local Authority Food Law Enforcement, www.food.gov.uk/news-alerts/news/fsa-publishes-latest-annual-report-on-local-authority-food-law-enforcement.Google Scholar
Fuller, E., Bankiewicz, U., Davies, B., Mandalia, D., and Stocker, B. (2019) “The Food and You Survey,” Wave 5, Combined Report for England, Wales and Northern Ireland, Food Standard Agency and NatCean Social Research, UK.Google Scholar
Genn, H. (1993) “Business Responses to the Regulation of Health and Safety in England.” Law and Policy 15, no. 3: 219–233.CrossRefGoogle Scholar
Giuliani, A., Lorenzoni, G., and Visentin, M. (2015) “New Wines in New Bottles: The ‘Renaissance’ of the Italian Wine Industry.” Industry and Innovation 22, no. 8: 729–52, https://doi.org/10.1080/13662716.2015.1114914.CrossRefGoogle Scholar
Gunningham, N. (2002) “Regulating Small and Medium Sized Enterprises.” Journal of Environmental Law 14, no. 1: 3–32.CrossRefGoogle Scholar
Gunningham, N. (2015) “Compliance, Deterrence and Beyond.” In Compliance and Enforcement in Environmental Law, edited by Paddock, Lee. Cheltenham, UK: Edward Elgar Publishers – SSRN RegNet Research Paper No. 2015/87, https://ssrn.com/abstract=2646427 or https://doi.org/10.2139/ssrn.264642.Google Scholar
Hansson, S. O. (2017) “Science Denial as a Form of Pseudoscience.” Studies in History and Philosophy of Science Part A, 63: 3947, https://doi.org/10.1016/j.shpsa.2017.05.002.CrossRefGoogle ScholarPubMed
Henson, S. and Heasman, M. (1998) “Food Safety Regulation and the Firm: Understanding the Compliance Process.” Food Policy 23, no. 1: 9–23.CrossRefGoogle Scholar
Hutter, B. H., and Amodu, T. (2008) Risk Regulation and Compliance: Food Safety in the UK. London: London School of Economics and Political Science.Google Scholar
Hutter, B.M., and Jones, C. (2007) “From Government to Governance: External Influences on Business Risk Management.” International Journal of Regulation and Governance 1, no. 1: 27–45.CrossRefGoogle Scholar
Hodges, C. (2015) Law and Corporate Behaviour. London: Hart/Beck Bloomsbury Publishing.Google Scholar
Hodges, C., and Steinholtz, R. (2017) Ethical Business Practice and Regulation. London: Hart/Beck Bloomsbury Publishing.Google Scholar
Jaffee, S., Henson, S., Unnevehr, L., Grace, D., and Cassou, E. (2019) “The Safe Food Imperative: Accelerating Progress in Low- and Middle-Income Countries.” Agriculture and Food Series. Washington, DC: World Bank.CrossRefGoogle Scholar
Kahneman, D., Slovic, D., and Tversky, A. (1982) Judgment under Uncertainty: Heuristics and Biases. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
McKean, J. D. (2001) “The Importance of Traceability for Public Health and Consumer Protection.” Revue Scientifique et Technique (International Office of Epizootics) 20, no. 2: 363–71, https://doi.org/10.20506/rst.20.2.1280.Google ScholarPubMed
Manion, S. (2012) “A Science-Based Endeavor: Interpreting Contamination Prevention in the Food Safety Modernization Act.” Penn State Law Review 117: 537–62. www.pennstatelawreview.org/117/2/117–2-Comment_Manion.pdf.Google Scholar
Marks, A. B. (2016) “A New Governance Recipe for Food Safety Regulation.” Loyola University Chicago Law Journal 47, no. 3, https://ssrn.com/abstract=2802860.Google Scholar
OECD (Organisation for Co-operation and Economic Development). (2000) Reducing the Risk of Policy Failure: Challenges for Regulatory Compliance, www.oecd.org/regreform/regulatory-policy/1910833.pdf.Google Scholar
Ogus, A. (1994) Regulation: Legal Form and Economic Theory. Oxford: Clarendon Press.Google Scholar
Purnhagen, K. (2014) “The Virtue of Cassis De Dijon 25 Years Later – It Is Not Dead, It Just Smells Funny.” In Varieties of European Economic Law and Regulation, edited by Purnhagen, Kai and Rott, Peter. Dordrecht: Springer.CrossRefGoogle Scholar
Sadilek, A., Kautz, H., DiPrete, L., Labus, B., Portman, E., Teitel, J., and Silenzio, V. (2017) “Deploying nEmesis: Preventing Foodborne Illness by Data Mining Social Media.” AI Magazine 38, no. 1: 3748, https://doi.org/10.1609/aimag.v38i1.2711.CrossRefGoogle Scholar
Schomberg, J. P., Haimson, O. L., Hayes, G. R., and Anton-Culver, H. (2016) “Supplementing Public Health Inspection via Social Media.” PloS one 11, no. 3, https://doi.org/10.1371/journal.pone.0152117.CrossRefGoogle ScholarPubMed
Simon, P. A., Leslie, P., Run, G., Jin, G. Z., Reporter, R., Aguirre, A., and Fielding, J. E. (2005) “Impact of Restaurant Hygiene Grade Cards on Foodborne-Disease Hospitalizations in Los Angeles County.” Journal of Environmental Health 67, no. 7: 32–6, www.ncbi.nlm.nih.gov/pubmed/15794461.Google ScholarPubMed
Tyler, T. R. (2003) “Procedural Justice, Legitimacy, and the Effective Rule of Law.” Crime and Justice 30: 283357.CrossRefGoogle Scholar
Van der Meulen, B. M. (2013) “The Structure of European Food Law.” Laws 2, no. 2: 6998, https://doi.org/10.3390/laws2020069.CrossRefGoogle Scholar
Van der Meulen, S., Boin, G., Bousoula, I., Conte-Salinas, N., Paganizza, V., Montanari, F., Rodriguez Fuentes, V., and van der Meulen, B. (2015) “Fighting Food Fraud.” European Food and Feed Law Review 10, no. 1: 213.Google Scholar
Vickers, I., James, P., Smallbone, D. and Baldock, R. (2005) “Understanding Small Firm Responses to Regulation.” Policy Studies 26, no. 2: 149–169.CrossRefGoogle Scholar
Wagstaff, D. J. (1986) “Public Health and Food Safety: A Historical Association.” Public Health Reports, 101, no. 6, www.ncbi.nlm.nih.gov/pmc/articles/PMC1477676/pdf/pubhealthrep00180-0062.pdf.Google ScholarPubMed
Watts, R., Burgess, K., and Joiner, S. (2019) “Food Hygiene Ratings: Councils Struggle to Keep Up with Restaurant Inspections,” The Times, October 15, www.thetimes.co.uk/article/food-hygiene-ratings-councils-struggle-to-keep-up-with-restaurant-inspections-spg9w8735.Google Scholar
Yapp, C., and Fairman, R. (2006) “Factors Affecting Food Safety Compliance within Small and Medium-Sized Enterprises: Implications for Regulatory and Enforcement Strategies.” Food Control 17: 4251, https://doi.org/10.1016/j.foodcont.2004.08.007.CrossRefGoogle Scholar
Young, J. H. (1985) “The Pig That Fell into the Privy: Upton Sinclair’s The Jungle and the Meat Inspection Amendments of 1906.” Bulletin of the History of Medicine 59, no. 4: 467–80.Google ScholarPubMed
Young, J. H. (1989) Pure Food: Securing the Federal Food and Drugs Act of 1906. Princeton: Princeton University Press.CrossRefGoogle Scholar
Asbed, Greg, and Hitov, Steve. 2017. “Preventing Forced Labor in Corporate Supply Chains. The Fair Food Program and Worker-Driven Social Responsibility.” Wake Forest Law Review 52:497531.Google Scholar
Barrientos, Stephanie. 2008. “Contract Labor: The Achilles Heel of Corporate Codes in Commercial Value Chains.” Development & Change 39(6):977–90.CrossRefGoogle Scholar
Barrientos, Stephanie, and Smith, Sally. 2007. “Do Workers Benefit from Ethical Trade? Assessing Codes of Labour Practice in Global Production Systems.” Third World Quarterly 28(4):713–29.CrossRefGoogle Scholar
Bartley, Tim. 2007. “Institutional Emergence in an Era of Globalization: The Rise of Transnational Private Regulation of Labor and Environmental Conditions,” American Journal of Sociology 113(2):297351.CrossRefGoogle Scholar
Blair, Margaret M., Williams, Cynthia A., and Lin, Li-Wen. 2008. “The New Role for Assurance Services in Global Commerce.” Journal of Corporations Law 33(2): 325–60.Google Scholar
Blowfield, Michael E., and Dolan, Catherine S.. 2008. “Stewards of Virtue? The Ethical Dilemma of CSR in African Agriculture.” Development & Change 39(1):123.CrossRefGoogle Scholar
Caro, Felipe, Chintapalli, Prashant, Rajaram, Kuman, and Tang, Chris S.. 2018. “Improving Supplier Compliance through Joint and Shared Audits with Collective Penalty.” Manufacturing and Service Operations Management 20(2):363–80.CrossRefGoogle Scholar
Casey, Roseann. 2006. “Meaningful Change – Raising the Bar in Supply Chain Workplace Standards.” Corporate Social Responsibility Initiative, Working paper No. 29. Cambridge, MA: John F. Kennedy School of Government, Harvard University.Google Scholar
Clarke, Thomas, and Boersma, Martjin. 2017. “The Governance of Global Value Chains: Unresolved Human Rights, Environmental and Ethical Dilemmas in the Apple Supply Chain.” Journal of Business Ethics 143(1):111–31.CrossRefGoogle Scholar
Corona, Carlos, and Randhawa, Ramandeep S.. 2010. “The Auditor’s Slippery Slope: An Analysis of Reputational Incentives.” Management Science 56(6):924–37.CrossRefGoogle Scholar
Courville, Sasha. 2003. “Social Accountability Audits: Challenging or Defending Democratic Governance?Law & Policy 25(3):269–97.CrossRefGoogle Scholar
Deloitte. 2014. “Deloitte’s 2014 Global Outsourcing and Insourcing Survey.” Accessed May 23, 2019. www2.deloitte.com/content/dam/Deloitte/us/Documents/strategy/us-2014-global-outsourcing-insourcing-survey-report-123114.pdf.Google Scholar
Distelhorst, Greg, and Locke, Richard M.. 2018. “Does Compliance Pay? Social Standards and Firm-Level Trade.” American Journal of Political Science 62(3):695711.CrossRefGoogle Scholar
Distelhorst, Greg, Locke, Richard M., Pal, Timea, and Samel, Hiram. 2015. “Production Goes Global, Compliance Stays Local: Private Regulation in the Global Electronics Industry.” Regulation & Governance 9:224–42.CrossRefGoogle Scholar
Drucker, Peter. 1998. Peter Drucker on the Profession of Management. Boston: Harvard Business School Press.Google Scholar
Egels-Zandén, Niklas. 2007. “Suppliers’ Compliance with MNCs’ Codes of Conduct: Behind the Scenes at Chinese Toy Suppliers.” Journal of Business Ethics 75(1):4562.CrossRefGoogle Scholar
Esbenshade, Jill. 2001. “The Social Accountability Contract: Private Monitoring from Los Angeles to the Global Apparel Industry.” Labour Studies Journal 26(1):98120.CrossRefGoogle Scholar
Gould, Daniella. 2005. “The Problem with Supplier Audits.” Corporate Responsibility Management 2(1):24–9.Google Scholar
Holliday, Ian. 2005. “Doing Business with Rights Violating Regimes Corporate Social Responsibility and Myanmar’s Military Junta.” Journal of Business Ethics 61:329–42.CrossRefGoogle Scholar
Islam, Muhammad Azizul, Deegan, Craig, and Gray, Rob. 2018. “Social Compliance Audits and Multinational Corporation Supply Chain: Evidence from a Study of the Rituals of Social Audits.” Accounting and Business Research 48(2):190224.CrossRefGoogle Scholar
Jiang, Bin. 2009. “Implementing Supplier Codes of Conduct in Global Supply Chains: Process Explanations from Theoretical and Empirical Perspectives.” Journal of Business Ethics 85(1):7792.CrossRefGoogle Scholar
Khan, Farzad Rafi, and Lund-Thomsen, Peter. 2011. “CSR as Imperialism: Towards a Phenomenological Approach to CSR in the Developing World.” Journal of Change Management 11(1): 7390.CrossRefGoogle Scholar
Koenig-Archibugi, Mathias. 2017. “Does Transnational Private Governance Reduce or Displace Labor Abuses? Addressing Sorting Dynamics Across Global Supply Chains.” Regulation and Governance 11:343–52.CrossRefGoogle Scholar
Konefal, Jason, and Hatanaka, Maki. 2011. “Enacting Third-Party Certification: A Case Study of Science and Politics in Organic Shrimp Certification.” Journal of Rural Studies 27:125–33.CrossRefGoogle Scholar
LeBaron, Genevieve, and Lister, Jane. 2015. “Benchmarking Global Supply Chain: The Power of the ‘Ethical’ Audit Regime.” Review of International Studies 41:905–24.CrossRefGoogle Scholar
LeBaron, Genevieve, Lister, Jane, and Dauvergne, Peter. 2017. “The New Gatekeeper: Ethical Audits as a Mechanism of Global Value Chain Governance.” In The Politics of Private Transnational Governance. by Contract, eds. Claire Cutler, A. and Dietz, Thomas, 97114. London: Routledge.CrossRefGoogle Scholar
Lin, Li-Wen. 2009. “Legal Transplants through Private Contracting: Codes of Vendor Conduct in Global Supply Chains as an Example.” American Journal of Comparative Law 57:711–44.CrossRefGoogle Scholar
Lin-Hi, Nick, and Blumberg, Igor. 2017. “The Power(lessness) of Industry Self-Regulation to Promote Responsible Labor Standards: Insights from the Chinese Toy Industry.” Journal of Business Ethics 143:789805.CrossRefGoogle Scholar
Locke, Richard, Amengual, Matthew, and Mangla, Akshay. 2009. “Virtue Out of Necessity? Compliance, Commitment, and the Improvement of Labor Conditions in Global Supply Chains.” Politics and Society 37(3):319–51.CrossRefGoogle Scholar
Lund-Thomsen, Peter. 2008. “The Global Sourcing and Codes of Conduct Debate: Five Myths and Five Recommendations.” Development and Change 39(6):1005–18.CrossRefGoogle Scholar
Mares, Radu. 2018. “Corporate Transparency Laws: A Hollow Victory?Netherlands Quarterly of Human Rights 36(2):189213.CrossRefGoogle Scholar
McAllister, Lesley K. 2012. “Regulation by Third-Party Verification.” Boston College Law Review 53(1):164.Google Scholar
McAllister, Lesley K. 2014. “Harnessing Private Regulation.” Michigan Journal of Environmental & Administrative Law 3(2):291419.Google Scholar
Meidinger, Errol. 2019. “Governance Interactions in Sustainable Supply Chain Management.” In Transnational Business Governance Interactions: Enhancing Regulatory Capacity, Ratcheting Up Standards, and Empowering Marginalized Actors, eds. Wood, Stepan, Schmidt, Rebecca, Meidinger, Errol, Eberlein, Burkard, and Abbott, Kenneth. Cheltenham and Northampton, UK: Edward Elgar.Google Scholar
Moore, Lynda, de Silva, Indrani, and Hartmann, Sara. 2012. “An Investigation into the Financial Return on Corporate Social Responsibility in the Apparel Industry.” Journal of Corporate Citizenship 45:105–22.Google Scholar
Mueller, Martin, Gomes dos Santos, Virginia, and Seuring, Stegan. 2009. “The Contribution of Environmental and Social Standards towards Ensuring Legitimacy in Supply Chain Governance.” Journal of Business Ethics 89(4):509–23.CrossRefGoogle Scholar
Nadvi, Khalid, and Raj-Reichert, Gale. 2015. “Governing Health and Safety at Lower Tiers of the Computer Industry Global Value Chain.” Regulation & Governance 9:243–58.CrossRefGoogle Scholar
O’Rourke, Dara. 2000. “Monitoring the Monitors: A Critique of PricewaterhouseCoopers (PwC) Labor Monitoring.” https://nature.berkeley.edu/orourke/PDF/pwc.pdf.Google Scholar
O’Rourke, Dara. 2003. “Outsourcing Regulation: Analyzing Nongovernmental Systems of Labor Standards and Monitoring.” Policy Studies Journal 31:129.CrossRefGoogle Scholar
Parella, Kishanthi. 2014. “Outsourcing Corporate Accountability.” Washington Law Review 89(3):747818.Google Scholar
Sarfaty, Galit A. 2015. “Shining Light on Global Supply Chains.” Harvard International Law Journal 56(2):419–63.Google Scholar
Schrempf, Judith. 2011. “Nokia Siemens Networks: Just Doing Business – or Supporting an Oppressive Regime?Journal of Business Ethics 103:95110.CrossRefGoogle Scholar
Short, Jodi, Toffel, Michael, and Hugill, Andrea. 2016. “Monitoring Global Supply Chains.” Strategic Management Journal 37:1878–97.CrossRefGoogle Scholar
Simons, Penelope, and Macklin, Audrey. 2014. The Governance Gap: Extractive Industries, Human Rights, and the Home State Advantage. London: Routledge.CrossRefGoogle Scholar
Tsai, Chang-hsien, and Wu, Yen-nung. 2018. “What Conflict Mineral Rules Tell Us about the Legal Transplantation of Corporate Social Responsibility Standards without the State: From the United Nations to the United States to Taiwan.” Northwestern Journal of Law & Business 38:233–84.Google Scholar
Vogel, David. 2010. “The Private Regulation of Global Corporate Conduct: Achievements and Limitations.” Business Society 49(1):6887.CrossRefGoogle Scholar
Wettstein, Florian. 2012. “Silence as Complicity: Elements of a Corporate Duty to Speak Out against the Violation of Human Rights.” Business Ethics Quarterly 22(1):3761.CrossRefGoogle Scholar
Zenker, Julia. 2018. “Made in Misery: Mandating Supply Chain Labor Compliance.” Vanderbilt Journal of Transnational Law 51:297331.Google Scholar
Ayres, Ian, and Braithwaite, John. 1992. Responsive Regulation: Transcending the Deregulation Debate. New York: Oxford University Press.Google Scholar
Benson, Michael, and Madensen, Tamara. 2007. ‘Situational Crime Prevention and White-Collar Crime’. In International Handbook of Corporate and White Collar Crime, edited by Pontell, H. and Geis, G., 609–26. New York: Springer.Google Scholar
Bernaz, Nadia. 2017. ‘An Analysis of the ICC Office of the Prosecutor’s Policy Paper on Case Selection and Prioritization from the Perspective of Business and Human Rights’. Journal of International Criminal Justice 15(3): 527–42.CrossRefGoogle Scholar
Bilchitz, David. 2016. ‘The Necessity for a Business and Human Rights Treaty’. Business and Human Rights Journal 1: 203–27.CrossRefGoogle Scholar
Bleker-van Eijk, Sylvie, and Houben, Raf A. M.. 2017. Compliance and Integrity Management: Theory and Practice. Alphen aan den Rijn: Wolters Kluwer.Google Scholar
Blitt, R. C. 2012. ‘Beyond Ruggie’s Guiding Principles on Business and Human Rights: Charting an Embracive Approach to Corporate Human Rights Compliance’. Texas International Law Journal 48: 33.Google Scholar
Braithwaite, John. 2011. ‘The Essence of Responsive Regulation’. University of British Columbia Law Review 44(3): 475520.Google Scholar
Braithwaite, John, Charlesworth, Hilary and Soares, Adérito. 2012. Networked Governance of Freedom and Tyranny: Peace in Timor-Leste. Canberra: ANU E Press.Google Scholar
Brants, Chrisje. 2007. ‘Gold Collar Crime’. In International Handbook of White-Collar Crime, edited by Geis, Gilbert and Pontell, Henry, 309–26. New York: Springer.Google Scholar
Buhmann, Karin. 2016. ‘Public Regulators and CSR: The ‘Social Licence to Operate’ in Recent United Nations Instruments on Business and Human Rights and the Juridification of CSR’. Journal of Business Ethics 136: 699714.CrossRefGoogle Scholar
Buhmann, Karin. 2020. ‘National Contact Points under OECD’s Guidelines for Multinational Enterprises: Institutional Diversity Affecting Assessments of the Delivery of Access to Remedy’. In Accountability, International Business Operations, and the Law: Providing Justice for Corporate Human Rights Violations in Global Value Chains, edited by Enneking, Liesbeth, Giesen, Ivo, Schaap, Anne-Jetske, Ryngaert, Cedric, Kristen, François and Roorda, Lucas, 3959. New York: Routledge.Google Scholar
Burchard, Christoph. 2010. Ancillary and Neutral Business Contributions to ‘Corporate–Political Core Crime’: Initial Enquiries Concerning the Rome Statute. Journal of International Criminal Justice 8(3): 919–46.CrossRefGoogle Scholar
Bush, Jonathan A. 2009. ‘The Prehistory of Corporations and Conspiracy in International Criminal Law: What Nuremberg Really Said’. Columbia Law Review 109(5): 10941262.Google Scholar
Cerone, John. 2016. ‘A Taxonomy of Soft Law: Stipulating a Definition’. In Tracing the Roles of Soft Law in Human Rights, edited by Lagoutte, Stéphanie, Gammeltoft-Hansen, Thomas and Cerone, John, 1526. Oxford: Oxford University Press.CrossRefGoogle Scholar
Charlesworth, Hilary. 2017. ‘A Regulatory Perspective on the International Human Rights System’. In Regulatory Theory: Foundations and Applications, edited by Drahos, Peter, 357–74. Acton ACT, Australia: ANU Press.Google Scholar
Chen, Hui, and Soltes, Eugene. 2018. ‘Why Compliance Programs Fail: And How to Fix Them’. Harvard Business Review 96(2): 116–25.Google Scholar
Connor, Tim, and Haines, Fiona. 2013. ‘Networked Regulation as a Solution to Human Rights Abuse in Global Supply Chains? The Case of Trade Union Rights Violations by Indonesian Sports Shoe Manufacturers’. Theoretical Criminology 17: 197214.CrossRefGoogle Scholar
De Hoon, Marieke. 2017. ‘The Future of the International Criminal Court: On Critique, Legalism and Strengthening the ICC’s Legitimacy’. International Criminal Law Review 17: 591614.CrossRefGoogle Scholar
Deva, Surya. 2012. Regulating Corporate Human Rights Violations: Humanizing Business. New York: Routledge.CrossRefGoogle Scholar
Dubash, Navroz K., and Morgan, Bronwen. 2013. The Rise of the Regulatory State of the South: Infrastructure and Development in Emerging Economies. Oxford: Oxford University Press.CrossRefGoogle Scholar
Durbin, Andrea, and Welch, Carol. 2002. ‘The Environmental Movement and Global Finance’. In Civil Society and Global Finance, edited by Scholte, Jan Aart and Schnabel, Albrecht, 213–27. New York: Routledge.Google Scholar
Fasterling, Björn. 2019. ‘Whose Responsibilities? The Responsibility of the ‘Business Enterprise’ to Respect Human Rights’. In Accountability, International Business Operations, and the Law: Providing Justice for Corporate Human Rights Violations in Global Value Chains, edited by Enneking, Liesbeth, Giesen, Ivo, Schaap, Anne-Jetske, Ryngaert, Cedric, Kristen, François and Roorda, Lucas, 1837. New York: Routledge.CrossRefGoogle Scholar
Garrett, Allison D. 2008. ‘The Corporation as Sovereign’. Maine Law Review 60(1): 130–64.Google Scholar
Garrett, Brandon L. 2014. Too Big to Jail: How Prosecutors Compromise with Corporations. Cambridge, MA: Harvard University Press.CrossRefGoogle Scholar
Gobert, James, and Punch, Maurice. 2003. Rethinking Corporate Crime. London: Butterworths.Google Scholar
Green, Penny, and Ward, Tony. 2004. State Crime: Governments Violence and Corruption. London: Pluto Press.Google Scholar
Gunningham, Neil, Grabosky, Peter and Sinclair, David. 1998. Smart Regulation: Designing Environmental Policy. Oxford: Clarendon Press.Google Scholar
Hayman, G. 2009. ‘Corruption and Bribery in the Extractive Industries’. In Transparency International Global Corruption Report 2009: Corruption and the Private Sector, edited by Zinnbauer D., Dobson, R. and Despota, K., 54–56. Cambridge: Cambridge University Press.Google Scholar
Hughes, Graham. 1958. ‘Criminal Omissions’. Yale Law Journal 67(4): 590638.CrossRefGoogle Scholar
Huisman, Wim. 2010. Business as Usual? Corporate Involvement in International Crimes. The Hague: Eleven International Publishing.Google Scholar
Huisman, Wim, Karstedt, Susanne and van Baar, Annika. In press. ‘The Involvement of Corporations in Atrocity Crimes’. In Oxford Handbook on Atrocity Crimes, edited by Barbara Hola, Hollie N. Brehm and Maartje van Weerdesteijn. Oxford: Oxford University Press.Google Scholar
Huisman, Wim, and Sidoli, Daniel. 2019. ‘Corporations, Human Rights and the Environmental Degradation-Corruption Nexus’. Asia Pacific Journal of Environmental Law 22(1): 6692.CrossRefGoogle Scholar
Huisman, Wim, and van Sliedregt, Elies. 2010. ‘Rogue Traders – Dutch Businessmen and International Crimes’. Journal of International Criminal Justice 8: 803–28.CrossRefGoogle Scholar
Huisman, Wim, and van Erp, Judith. 2013. ‘Opportunities for Environmental Crime: A Test of Situational Crime Prevention Theory’. British Journal of Criminology 53(6): 11781200.CrossRefGoogle Scholar
Hutter, Bridget M., and Jones, Clive J.. 2006. Business Risk Management Practices: The Influence of State Regulatory Agencies and Non-State Sources. London School of Economics and Political Science.Google Scholar
Kaleck, Wolfgang, and Saage-Maaß, Miriam. 2010. ‘Corporate Accountability for Human Rights Violations Amounting to International Crimes: The Status Quo and Its Challenges’. Journal of International Criminal Justice 8: 699724.CrossRefGoogle Scholar
Karpoff, Jonathan M., Lott, John R. and Wehrly, Eric W.. 2005. ‘The Reputational Penalties for Environmental Violations: Empirical Evidence’. Journal of Law and Economics 68: 653–75.