U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • PMC10513331

Logo of plosone

Exploring the path to corruption–An informed grounded theory study on the decision-making process underlying corruption

Muhammad untung manara.

1 Department of Work and Social Psychology, Maastricht University, Maastricht, Limburg, The Netherlands

2 Department of Psychology, University of Merdeka Malang, Malang, East Java, Indonesia

Annika Nübold

Suzanne van gils.

3 Department of Communication and Culture, BI Norwegian Business School, Oslo, Norway

Fred R. H. Zijlstra

Associated data.

Data cannot be shared publicly because of legal and ethical reasons. The data contains sensitive data which could be potentially identifying. Making data publicly available would violate the agreement the authors have with the participants. However, data are available upon request from the Research Data Management Team of the Faculty of Psychology and Neuroscience, Maastricht University (contact via ln.ytisrevinuthcirtsaam@npf-tnemeganamatad ) for researchers who meet the criteria for access to confidential data.

Past corruption research at the individual level has mainly focused on demographics, personality, attitudes, or morality related variables. Until now, only a few studies have focused on the intra -individual psychological mechanisms of corruption. Building on normative decision-making theory, the present study attempts to shed further light on the internal mechanisms that lead to the decision that corruption is a viable path. Following an informed grounded theory approach, we conducted semi-structured interviews with 38 Indonesian prisoners who have been convicted of corruption. Guided by a multi-step decision-making process, including problem recognition, information search, and evaluation of the information, our results revealed unique insights into individuals’ considerations that led to corruption. We elaborate on interrelations between these stages and explore new forms of corrupt decision-making elements within this process. Theoretical implications for corruption research and the practical implications for anti-corruption programs of these findings are discussed.

Introduction

Corruption remains one of the biggest and most pressing problems in many countries around the globe. Corruption can be defined as "misuse of an organizational position or authority for personal or organizational (or subunit) gain, where misuse in turn refers to departures from accepted societal norms" [ 1 ]. Every year, trillions of dollars—or more than 5% of the global gross domestic product—are lost due to corruption [ 2 ]. Moreover, data from the global corruption barometer [ 3 ] revealed that one in four people around the world reported that they had to engage in bribery in order to access public services. Thus, the United Nations has identified corruption as the biggest obstacle in their efforts to achieve the 2030 Sustainable Development Goals, which include the eradication of poverty and the improvement of education quality, health, and infrastructure.

Due to its complex nature and its severe impact on organization and society, corruption has been studied by various disciplines such as anthropology, economics, sociology, law, political science, organizational science, and social psychology [ 4 ]. In the present study, we are particularly interested in the internal psychological mechanisms leading to corrupt acts and, thus, we will adopt a micro-level perspective to explore drivers of corruption. Specifically, this study looks at corruption from a psychological perspective (i.e., decision-making). Although the corruption literature at the micro-level has explored the effects of both individual and situational factors on corruption, such as personality [ 5 – 7 ], goals and attitudes [ 8 ], gender [ 9 ], ethical climate [ 10 ], ethical leadership [ 6 ], and social norms [ 11 – 13 ], there is still scarce research focusing on the cognitive intra -individual processes preceding an individual’s decision to engage in corruption. This is surprising, since the literature on other unethical behaviors (e.g., cheating, lying, and dishonesty) has provided some evidence that intra-individual cognitive processes, such as intuitive thinking can explain why people engage in these unethical behaviors [ 14 – 17 ]. Furthermore, decision-making processes leading to corruption as a specific sub-form of unethical behavior have, with one exception [ 8 ], not been studied yet [ 18 ]. Furthering our knowledge in this area is important, however, as research has indicated that corrupt behavior is typically a process that is not automatic, but requires thought and consideration [ 8 ]. Understanding how individuals think before they engage in corruption is crucial since such knowledge could provide important insights for designing corruption prevention programs. Our results may inform such programs and allow them to take into account what aspects individuals typically consider when they finally choose to engage in corruption.

Furthermore, although insights from initial studies have advanced our understanding of the intra-individual antecedents of unethical and corrupt actions in organizations, these models paid little attention to the reasons and means that drive the decision to engage in such behaviors in the first place. A better understanding of the underlying cognitive-motivational processes (e.g., goal formation, information processing) would allow us to not only describe, but also explain such decisions, which could then bolster anti-corruption programs. In order to find answers to the questions of why and how individuals come to the conclusion that corruption is the best way to reach their goals, we particularly aim to explore the internal cognitive-motivational processes underlying corruption. In doing so, we draw on normative decision-making theory [ 19 ] and particularly the decision-making model by Engel, Blackwell [ 20 ] and use this as a guiding framework.

In the present study, we adopt a qualitative approach using informed grounded theory [ 21 ]. While the original version of grounded theory [ 22 ] emphasizes pure induction without any prior theoretical knowledge and perceptions, informed grounded theory acknowledges the advantage of pre-existing theories to guide researchers in exploring specific phenomena [ 21 ]. This approach is particularly suited for our study because we draw on the decision-making model [ 20 ] to guide our exploration of the aspects of decision-making in the data collection and data analysis processes. We will discuss this approach in more detail below.

This study involves a sample of individuals who have been convicted of corruption in Indonesia. Indonesia is an example of a highly corrupt country, as ranked by the Corruption Perception Index (CPI) issued by Transparency International [ 23 ]. In this index, low-ranked countries tend to have a high level of corruption, characterized by weak standards of integrity among public officials, a bad judicial system, and little transparency about public expenditure. Our sample is exceptional as there has been little research involving corrupt actors themselves, due to the immoral and illegal nature of corrupt behavior [ 24 ]. In the present study, we interviewed 38 imprisoned convicts of corruption, offering us a unique perspective on the intrapersonal thoughts and feelings or behaviors that eventually led to the corrupt action.

In summary, the present study advances the literature on corruption in three important ways. First, this study provides new insights into the psychological mechanisms of corruption by applying a general decision-making framework that goes beyond moral decision-making theories [e.g., 25, 26] and initial work on decision-making leading to corruption [ 8 ]. In this way, we further our understanding of corruption as a rational decision-making process. Second, by adopting a qualitative, informed grounded theory approach [ 21 ], the present study answers calls for more diverse approaches in corruption research, such as qualitative interviews with real-life offenders [ 8 ]. This is particularly valuable given that most corruption studies to date [ 8 , 11 , 27 , 28 ] have entailed lab experiments and did not involve the actors of corruption themselves, thus lacking ecological validity. Finally, shedding light on corrupt behavior by applying a decision-making approach is also valuable from a practical perspective. Understanding the nature of the cognitive-evaluative processes that lead to corrupt behavior enables policymakers to craft interventions that target those key processes more precisely (and potentially all at once), making anti-corruption programs more powerful and effective.

Theoretical background

How has ethical/moral decision-making been studied thus far.

The psychological literature has typically taken a micro-level perspective to study unethical or immoral behavior in organizations. Many ethical decision-making studies [e.g., 29] have focused on understanding the role of two factors for unethical decision-making, often called "bad apples and bad barrels." Bad apples represent individual factors (e.g., cognitive moral development and locus of control), while bad barrels represent organizational factors (e.g., reward systems and outcome expectancy). While this stream of literature has made great contributions regarding the predictive power of individual and contextual factors for moral decisions, it has not explicitly investigated ethical decisions as a dynamic process comprising different cognitive stages.

In contrast, models of moral decision-making, such as the model proposed by Hannah, Avolio [ 26 ], usually do take into account the psychological processes that are involved in moral actions. The model is based on four psychological mechanisms: moral sensitivity, moral judgment, moral motivation, and moral action. Moral sensitivity refers to the process of identifying the moral problem, interpreting the situation, and identifying various options in order to address the problem. Moral judgment is the process by which the person determines what the most appropriate course of action is. Moral motivation is concerned with the process that increases commitment to a given action. Finally, moral action refers to the decision to engage in a certain behavior in order to address the moral problem. Although Hannah and colleagues’ model [ 26 ] supports the idea that moral decision-making follows a certain sequence of stages before being translated into behavior, it strongly focuses on the moral content of a situation and the potential reactions to it. The model does not explicitly acknowledge more typical cognitive mechanisms that may drive such judgments and actions (e.g., goal formation or information processing).

Furthermore, although unethical and immoral behavior share conceptual similarities with corruption, they also differ from it in several ways. The concept of unethical behavior subsumes a broad range of behaviors that violate widely accepted (societal) moral norms such as lying, cheating, and stealing [ 30 ]. Corruption, which can be seen as one specific form of unethical behavior, additionally includes the misuse of power or authority in an organizational context with far-reaching negative effects, not only on organizations, but society as a whole. The abuse of power is thus essential to distinguishing corruption from other forms of unethical behavior. Although every behavior that violates certain norms has different characteristics and may well follow a different decision-making process [ 31 , 32 ], scholars have yet to explore whether decision-making in corruption follows the same proposed stages as other forms of norm-violating actions (e.g., unethical and immoral behavior).

As one exception, a study by Rabl and Kühlmann [ 8 ] has examined decision- making in the context of corruption. Their proposed model represents a combination of the Model of Effortful Decision-Making and Enactment (MEDME) [ 33 ] and the Theory of Planned Behavior (TPB) [ 34 ]. According to this model, individuals go through two processes before engaging in a corrupt action: firstly, the overall desire and intention to achieve a goal; secondly, the desire and intention to achieve a goal through corrupt action. While this model is valuable for understanding how corrupt action may be initiated by goal striving and intentions, it remains unclear why individuals consider corruption to be a suitable means of achieving their goals in the first place (i.e., how the decision to engage in corrupt behavior is formed). Thus, we are missing the important link between the intention to achieve a goal and the desire and ultimate decision to achieve the goal through corrupt action is missing.

Benefits of a general decision-making model to study corruption

In order to find out how the cognitive-motivational decision-making process leads to corruption, we draw on normative decision-making theory [ 19 ] and particularly the decision-making model by Engel, Blackwell [ 20 ]. This model describes how individuals make their decisions in a rational way by elaborating on different stages of the decision-making process. This basic model of consumer decision-making has been widely used in marketing research [ 35 ]. This model typically explains that there are some stages before consumers chose a specific product: namely, problem recognition, information search, and evaluation. The approach is particularly well suited for shedding light on the questions of why and how individuals conclude that corruption is the best means for reaching their goals or solving their problems. Thus, it goes beyond current decision-making models of immoral behavior [ 26 ] and initial research on corrupt decisions [ 8 ]. In contrast to the moral decision-making models discussed above [ 26 , 29 ], the model proposed by Engel, Blackwell [ 20 ] is not limited to particular aspects of decision-making such as moral and specific goals. Thus, the model is more appropriate for the present study because we want to focus on more than just the moral aspects of the decision-making process. To that end, the present study utilizes an informed grounded theory design [ 21 ] in order to explore the decision-making process underlying corruption. Using the general decision-making model as a theoretical framework will hopefully reveal new or even contradictory insights. By abstaining from moral aspects, this study may minimize social desirability bias in the data collection process because it can avoid feelings of being judged as participants are not specifically concerned with the question whether the corruption they engaged in is moral or immoral.

The chosen model [ 20 ] consists of four stages: problem recognition, information search, evaluation, and choice (see Fig 1 ). Problem recognition involves processes related to identifying and being aware of a problem. The problem is recognized when individuals detect a discrepancy between the current state and a certain desired state [ 36 ]. For example, an employee might receive a very low salary (current state), but yearns to buy a house for their family (desired state). The desired state thus becomes a goal that the individual hopes to achieve via a certain behavior [ 37 ].

An external file that holds a picture, illustration, etc.
Object name is pone.0291819.g001.jpg

Once the ’problem’ and corresponding goal have been identified, individuals move to the second stage: information search . This stage includes activities focused on finding potential ways to solve the previously identified problem and reach one’s goal. In relation to the previous example, the employee may search for information about the various options available for earning the money to buy a house (e.g., borrowing money from the bank, saving their income, or engaging in corruption). According to Hoyer and MacInnis [ 35 ], individuals use a range of information sources when looking for ways to satisfy a certain goal. Sources may include internal sources (e.g., prior knowledge) or external sources (e.g., the internet or colleagues). The content of information is the type of information that an individual obtains before deciding to take action: for example, the costs and benefits associated with a particular solution. When individuals try to obtain information, they may focus on only one specific type of information and elaborate on its attributes, or they could search for several alternative pieces of information [ 38 ]. In the case of corruption, an individual could search for information about what is actually understood to constitute corruption, what the risks of getting caught are, or what penalties could be expected as a result of engaging in corrupt action. Information search has, to date, received meager attention in the corruption literature or in general research on unethical behavior. For instance, it is not included in the corrupt action model developed by Rabl and Kühlmann [ 8 ], nor models of moral/ethical decision-making [ 26 , 29 ]. However, research from other fields has shown that the source and content of information are both important elements in the decision-making process [ 36 ]. Thus, models related to corruption need to incorporate this factor.

Once individuals have gained a certain amount of information on how to achieve their goal, the evaluation stage follows. This stage is concerned with processes in which individuals compare and contrast the different options to find out what the best option is [ 35 ]. In this stage, individuals examine the information about the attributes of the different options that they have gathered [ 36 ]. In relation to our previous example, employees will examine which option is the best for achieving their goal of buying a house; for example, whether borrowing money from the bank, saving money, or engaging in corruption will be the easiest, quickest, or safest option. This stage overlaps with the stage of moral judgment in the literature on moral decision-making [ 26 ], which refers to mental processes that determine what action is the most appropriate one to take. However, in those models, little (or no) attention has been given to the underlying reasons behind the conclusion that corruption is the best solution. Exploring the reasons that drove convicts of corruption to see corruption as an adequate solution to their ’problem’ is essential for understanding underlying motives behind corrupt action.

The last stage in the process is choice . In this stage, individuals choose corruption as the best option among various alternatives. In the corruption literature, there are several classifications of corruption, e.g., individual versus interpersonal corruption [ 39 ] or individual versus organizational corruption [ 18 ]. Since corruption is a complex phenomenon, there is no universal classification of corruption, however. Examples of corrupt behavior include bribery (giving some form of benefit in exchange for preferential treatment), embezzlement (taking or converting money, property or other valuables of public/organizational funds for personal benefit), and favoritism (misuse of authority to favor family, friends, or one’s own party) [ 40 ]. Asking individuals convicted of corruption about their concrete actions and thought processes may therefore lead to new, more psychology-oriented insights and potentially the discovery of additional (sub-) forms of corruption.

Aims of the present study and research questions

Using the normative decision-making model [ 20 ] as a framework alongside a qualitative approach (i.e., informed grounded theory) [ 21 ], our study explores each stage of the decision-making process for corruption (i.e., problem recognition, information search, evaluation, and choice). We aim to advance the current literature on the decision-making around unethical, immoral, and corrupt behavior [ 8 , 26 , 29 ]. This literature has largely ignored the reasons (i.e., goals) and means (i.e., information processes and evaluation thereof) that drive individuals’ conclusion that corruption is the best option for achieving their personal and professional goals. Based on the theoretical model by Engel, Blackwell [ 20 ], we formulated the following research questions:

Research question 1 : What are the specific goals that individuals convicted of corruption wanted to achieve when engaging in corruption?

Research question 2a : What type of information content did individuals convicted of corruption search for before they decided to engage in corruption?

Research question 2b : Which sources did individuals convicted of corruption consider when searching for information?

Research question 3 : What aspects of the different options to act did individuals convicted of corruption consider when they eventually chose corruption as a solution to a specific problem?

Research question 4 : Which concrete behaviors did individuals convicted of corruption engage in that eventually led to a sentence of corruption and their subsequent imprisonment?

In this qualitative study, we used an informed grounded theory approach [ 21 ] to answer the above research questions. Grounded theory is especially appropriate for research topics about which little is yet known [ 22 ]. This approach allows researchers to describe phenomena in a detailed way [ 41 ] and is especially useful when studying processes [ 42 ]. By connecting stages within a process [ 43 ], grounded theory allows for the emergence of a new theory and provides insight into the processes between categories. As the decision-making process of corruption has not been investigated yet, and we aim to study decision-making as a process, grounded theory is particularly appropriate for our study.

There are different variants of grounded theory [see for an overview, 44 , 45 ]. In classic grounded theory, the researcher should delay conducting a literature review until the end of the data analysis [ 22 , 46 ]. The reasoning behind this delay is to keep the researcher free and open to discovering theory from the data and avoiding bias, such as forcing data into a pre-existing theory that may not fit the data. Delaying the literature review in classical grounded theory is based on the ontological assumption of an objective reality [ 22 ] which can best be discovered by researchers if they are free from pre-existing knowledge [ 22 , 42 ]. A popular later version of grounded theory, constructivist grounded theory [ 47 ], takes a different, relativist ontological, perspective that assumes that there is no objective reality, but that realities are socially constructed. Therefore, this perspective assumes that individuals cannot avoid their pre-existing knowledge when constructing reality [ 44 ]. Building upon this perspective, Thornberg [ 21 ] proposed informed grounded theory that is rooted in constructivist grounded theory but particularly emphasizes how a literature review can aid researchers and benefit the grounded theory research process. Thus, according to Thornberg [ 21 ], informed grounded theory represents a research process that is grounded in data by grounded theory methods, while being informed by existing research and theoretical frameworks. Rather than considering existing research and theoretical frameworks as obstacles for developing theory from the data, informed grounded theory considers them as sources of inspiration and tools to help a researcher focus on specific aspects and phenomena.

This study adopted an informed grounded theory approach [ 21 ] to explore the decision-making process underlying corruption. We draw on the normative decision-making model [ 20 ] as a theoretical framework. Therefore, the development of grounded theory in the current study is based on the decision-making model by Engel, Blackwell [ 20 ]. Following that model, we identified aspects of four different stages of the decision-making underlying corruption: goal, information search, evaluation, and behavior. In order to identify the aspects of each stage, we constructed codes, concepts, and theories that were grounded in the data by applying grounded theory methods [ 21 , 41 ]. We considered the existing corruption literature as important insights to identify new potential concepts or theories in every stage of the decision-making process underlying corruption. Therefore, the development of the decision-making model underlying corruption in this study is based on the decision-making model on newly collected data and considers the existing corruption literature to analyze aspects within the decision-making process.

Participants

In order to better understand the decision-making process underlying corruption, we studied individuals who had experience with corruption and had been sentenced for their corrupt behavior. Our participants were individuals convicted of corruption in Indonesia. Indonesia’s corruption perception index (CPI) scores are consistently below 50 on a scale of 0 (being the most corrupt) to 100 (being the least corrupt) [ 23 ] indicating a high incidence of reported corruption cases. Almost every day, the Indonesian media reports about corruption cases, ranging from the regional level to the national level. After the Suharto era, political power in Indonesia became decentralized, leading to a spread of corruption particularly at the regional level [ 48 ]. The Corruption Eradication Commission of Indonesia (KPK), for example, reported that at least 32 persons in the position of the head of the regional government were prosecuted and caught in corruption cases between 2015 and 2018 [ 49 ]. Thus, because corruption is deeply ingrained into peoples’ daily lives, studying corruption in this context is particularly relevant. This study was therefore conducted in three regional prisons in Indonesia. Two of the prisons are male prisons, and one is a female prison. Although access to the specific target group (prisoners convicted of corruption) can be considered extremely challenging (in terms of official approval, but also in terms of openly speaking to and establishing rapport with participants), this study benefitted from one of the authors being from Indonesia, making this process feasible.

To gain access to the prisons, we sought a permit letter to conduct interviews by sending a research proposal to the East Java Regional Office of the Ministry of Justice and Human Rights, Indonesia. When the permit was issued, we brought it to the regional prisons with individuals convicted of corruption. In each prison, the prison authority appointed a public officer to interact with the first author. The first author explained the research proposal, including the characteristics of the study participants. A separate room was provided for interview processes in the prisons, to ensure that conversations would not be overheard by the other prisoners or guards. Each participant who meets the inclusion criteria was called by the public officer to the room to answer the interview questions. The interviews were conducted from May 2017 until August 2017.

The researcher interviewed each participant privately, face to face, using the prison’s provided room. Before the interview began, participants were informed about the research including the research context, the purpose of the study, as well as confidentiality of the research process. Then, the written informed consent was signed by each participant who agreed to participate in this study. Participation in this study was fully voluntary. Even though the invited participants were in prison, they had the option to refuse to participate in the interview without any negative consequences. In this study, three invited individuals declined to participate in the interview process.

In grounded theory, the principle of ’theoretical saturation’ is used to justify the sample size. Theoretical saturation refers to the point in the data collection and coding process at which no additional new conceptual categories emerge [ 22 ]. Throughout the 38 interviews that we collected in three prisons in Indonesia, our coding dictionary stabilized further and further (while we continuously acknowledged the criteria of conceptual depth suggested by Nelson [ 50 ], until we felt that, within the last interviews, a point of data saturation was reached. The participants included 27 men and 11 women who were between 32 and 73 years old ( M = 51.7, SD = 9.4) at the time of the interview. Most participants were educated individuals (i.e., 15 participants had a bachelor degree, 13 held a master degree, three were doctors, seven had a senior high school degree, and the rest had obtained another educational level). In terms of organizational employment, 26 participants had worked for public organizations, while 12 had been employed in private organizations. Participants held a variety of positions at the time that they had engaged in corruption (e.g., principal, company owner, lecturer, regional government head, secretary, treasurer, broker, and tax officer). Furthermore, 22 participants had been in a leadership position, while 16 had been subordinates without any supervisory responsibility.

Data collection

We employed semi-structured interviews to explore the specific decision-making stages that individuals engaged in before deciding to behave corruptly. The interview guide was developed based on the stages of the normative decision-making process [ 20 ] described above. We attempted to find information on the four main stages of this process. In line with grounded theory, the interview questions were changed and adapted during the process of interviewing based on the insights gained from the previous interviews [ 22 ]. For example, the question about the goal that participants wanted to achieve was revised from “What was your goal when you made that decision?” to “What was the benefit for you of carrying out that behavior?” in order to maximize insights into participants’ goals for engaging in corrupt behavior (see S1 Appendix for examples of questions in the interview guide).

All interviews were conducted by the first author, who is a native Indonesian. Having an interviewer who is the same nationality of the interviewees is beneficial for helping participants feel comfortable and allowing them to talk in their native language [ 51 , 52 ]. Likewise, the shared background can incline participants to feel greater trust toward the interviewer, which is crucial when talking about their unethical behaviors [ 51 , 52 ].

Because corruption is very delicate topic, we tried to minimize any types of undesirable treatment effects and participant reactions [ 51 , 52 ]. To this end, we started the interview by expressing empathy for their situation. We began the interview by asking participants about their behavior that led them to prison instead of using the term corruption in order to minimize social desirability bias. To create a safe environment for participants where they could honestly and openly discuss their experiences, we carefully ensured their confidentiality and privacy during the process of data collection. Participants were encouraged to talk about their experiences related to the behavior for which they had been convicted as openly as possible. Most of them were enthusiastic about participating in the interview. They were thankful for being heard and enjoyed being able to talk about their experiences, their coping mechanisms with the prison situation, and their personal opinion about the court decisions with a researcher. After the interview, participants completed a demographic questionnaire. All responses to the interview questions were recorded with an audio recorder (average duration was 45 minutes per participant). The internal ethical review committee at the authors’ home university in Europe approved the procedure of this study.

Data analysis

Following Wilhelmy and colleagues [ 53 ], we transcribed the interview data until nearly reaching saturation (i.e., until the number of new categories decreased significantly). Thus, we transcribed 23 interviews; the remaining 15 interviews were coded directly from the audio files. As suggested by Urquhart [ 43 ], the data obtained from the interviews was coded in the original language (Indonesian). It has been recommended that researchers use the original language as far along in the analysis process as possible, in order to capture the experiences of participants in an unbiased way and avoid loss of meaning [ 54 ]. Thus, we did not translate the complete interviews; for illustrative purposes, we only translated the codes and the corresponding excerpts from the transcripts. The coding was conducted by two coders (i.e., the first author and a research assistant) who are native Indonesians with excellent English skills. The first author trained the research assistant in three one-hour sessions. This training included how to assign a code to the text and organize categories. Since not all authors had mastered the Indonesian language, our team discussions revolved around the material (codes and excerpts) that was translated into English.

For the data analysis, we followed the three steps specified by grounded theory: open coding, axial coding, and theoretical coding [ 41 ]. Coding is a process of deriving and developing concepts from the data at hand [ 41 ]. Coding can be done word by word, phrase by phrase, sentence by sentence, or paragraph by paragraph [ 41 ]. Following Wilhelmy and colleagues [ 53 ], we coded each possible element that we considered worthy of coding, that is, single words, sentences, or whole paragraphs. Constant comparative analysis, which is the analytic process of comparing different pieces of data and looking for similarities and differences [ 41 ] occurred in the three coding steps. The constant comparative analysis was conducted based on the informed grounded theory approach [ 21 ]. In this process, we considered the existing literature and how this could be used to identify and label new categories [ 55 ]. Through all the coding processes, we made use of the coding software MAXQDA 2018.

First, in the open coding stage, we analyzed and coded the raw data. The purpose of this coding step is to understand the essence of what is being expressed in the raw data and assign a conceptual name (code) to describe that understanding [ 41 ]. Following the procedure described by Corbin and Strauss [ 41 ], the two coders independently coded the data and then met to compare and discuss the differences in their individual coding. Following previous grounded theory studies [ 53 , 56 , 57 ], we used a coding dictionary to facilitate the coding process. The coding dictionary is an evolving system of categories that is continually modified (e.g., new codes are added; some codes are changed) based on constant comparison between new codes and existing codes [ 56 ]. The two coders recorded their consensus on the appropriate use of code in the coding dictionary.

Second, in the axial coding stage, we organized codes into categories in order to elevate them to a more abstract level that is relevant for the research questions [ 43 ]. The purpose of this process is to find higher-level concepts called themes [ 41 ]. We constantly compared the codes to codes that had already been classified into categories or subcategories based on their similarities and differences. For example, all codes related to corrupt behavior could be categorized using the main code behavior , which covered possible subcategories such as bribery, embezzlement, favoritism, and manipulation of information. At this stage, the two coders also met to discuss differences in their reasoning for classifying sub-codes into main codes. These categorizations were documented in the coding dictionary.

The third and final step is theoretical coding . In this stage, the goal is to link various categories to a core category and reveal an underlying theory [ 41 , 43 ]. A core category is a conceptual idea that could cover all other categories and represent the core theme of the research topic [ 41 ]. In order to investigate the relationships between our categories, we compared categories to each other and discussed the links between them [ 43 ]. In this process, we tried to identify categories that occurred together across each stage of the decision-making process. For example, we tried to discover whether any specific goal or information search activity was related to a certain type of corrupt behavior. To reveal these relationships, we used the code relations browser tool of the MAXQDA 2018. This tool is able to identify the relationships between codes by examining codes that were reported together by the participants. Finally, we integrated our findings, identified core categories and links between categories, and developed a diagram that illustrates our emerging theory, grounded in the data [ 41 ].

The aim of this study was to shed further light on the decision-making processes of individuals who had been sentenced for corruption. Following the normative perspective on decision-making [ 20 ], we first explored the last stage of the decision-making process, that is, participants’ behaviors that had been identified as corrupt and for which they had been sentenced. We then proceeded with the first three stages: the goals that our participants wanted to achieve by engaging in corruption; the information that they searched for before deciding to engage in corruption, and the aspects that they considered when choosing corruption as a solution to a certain problem. We chose this specific order, as we first wanted to familiarize participants with the interview setting and the topic [ 58 ] and let them explain their point of view before asking more detailed questions about their underlying motives and considerations. Fig 2 presents an overview of our findings. In Table 1 , we provide more detailed information about higher-level categories (axial codes), and lower-level categories (open codes).

An external file that holds a picture, illustration, etc.
Object name is pone.0291819.g002.jpg

In relation to behavior, we found seven categories that we then organized into two broad categories. The first covers behaviors that represent typical types of corruption in the literature (i.e., embezzlement, bribery, manipulation of information, and favoritism). The second is behaviors that are not generally considered to be typical examples of corruption that we will call atypical types of corruption (i.e., behaviors related to assisting the corruption process, behaviors associated with the false application of policy/administrative procedure, and participants’ perception of being the victim of a conspiracy). Regarding participants’ goals, the data analysis revealed three different categories: personal goals, organizational goals, and social goals. In terms of the information search stage, we explored two types of information content that participants searched for before deciding to engage in corrupt behavior: corruption-focused and open content. Corruption-focused content is a category of information that only focuses on the attributes of corruption as a behavioral option, whereas open content is a category that focuses on alternative options. Participants searched for information by considering several information sources, namely: intrapersonal sources, interpersonal sources, and impersonal sources. Finally, participants chose corruption as a solution to a specific problem because of two main reasons, which we labeled pull and push reasons. Pull reasons include decisions to participate in corruption that were motivated by a positive or normative evaluation of the corrupt behavior itself, e.g., not considering the behavior to be corrupt, or considering the behavior to be ’safe’, an easy solution to the problem, or as accepted and enacted by others. On the other hand, push reasons referred to participants’ decisions to participate in corrupt behavior because others (e.g., authorities) had involved them in the process of corruption or because their corrupt behavior was considered to be the only solution to a problem.

Considering that corruption is a complex phenomenon and takes on various forms in different contexts [ 59 ], we describe our findings on the decision-making process based on the category of corrupt behavior that we found. For every corruption category, we describe the specific behavior and the associated decision-making stages (i.e., goals, information search, and evaluation aspects).

Typical types of corruption

This category refers to those typical forms of corruption that have already been identified in the literature. This category includes behaviors like bribery, embezzlement, favoritism, and manipulation of information. Bribery is a behavior that involves offering someone money, services, or other valuables in exchange for preferential treatment [ 13 ]. As can be seen in Table 1 , the data analysis showed a number of bribery behaviors. For example, a school principal said:

I was only coordinating them . The thing was , in the circle of the Ministry of A , if we want to get some projects , we have to be bold , giving some [money] to individuals in the head office . So , every budget needs their approval . (Participant 6)

Embezzlement is characterized by taking or converting money, property, or other valuables for personal benefit [ 40 ]. For example, a tax officer reported: " I took it [the money] all . They did not know that . They only knew the data… From the individuals’ taxes , I gathered it . Then I made the false report " (Participant 10). In the data analysis, we also explored behaviors categorized as favoritism : the misuse of authority to favor certain individuals [ 60 ]. An example of behavior that could be categorized as favoritism is giving a loan intended for poor people to ineligible people, i.e., people who are not poor. Finally, manipulation of information refers to the intended or unintended abuse of (access to) information, such as cheating, violation of secrecy rules, disregarding the confidentiality of information, or concealing information [ 60 ]. For instance, some of our participants reported that they had engaged in behaviors such as falsifying a document, the creditor’s identity, or a financial report.

Participants who engaged in typical forms of corruption were mostly ’active’ decision makers and, thus, responsible for their behavior. They had different positions in their organization, such as school principal, tax officer, manager and secretary of an empowerment program, village head, and government official. They reported a variety of goals underlying their corrupt behaviors, including personal, organizational, and social goals. The majority of them either explicitly or implicitly reported personal goals underlying their corrupt behaviors. For example, a tax official said that he took much money from the tax account for his personal benefit: " First of all , honestly , I bought a house for my wife . I bought it for 800 million [rupiah] , taken from that account " (Participant 10). The personal goals were not only related to money, but also to psychological benefits, such as a boost of self-esteem. For instance, a treasurer of the village empowerment program who manipulated the financial report said: " The point is , what I wanted , was to get the acknowledgment that I was able to do it , to do a good job " (Participant 32). She also stated that she manipulated the financial report to reach a social goal, namely for the village’s sake, as she said: " I only wanted to get the grant again , so the village gets the grant , that was my intention , even though , maybe , I took the wrong way " (Participant 32). Besides that, some other participants reported that organizational goals motivated them to engage in corruption, such as goals related to organizational reputation, organizational profit, and employee compensation (e.g., passing on the benefits arising from the corrupt action to the employees).

In terms of the information search process, all participants who engaged in typical forms of corruption made social comparisons before they finally acted corruptly. They typically searched for information about how other people, particularly their colleagues, behaved in the same situation. For example, a school principal who engaged in bribery stated: " There were several [schools] . I knew the other public schools did it [bribery] as well . I have a colleague . He was the one who told me that the others got the projects in the same way " (Participant 6). Some of the other participants engaging in typical forms of corruption also searched for information regarding the best procedure for engaging in corruption. In addition, some participants engaging in typical forms of corruption had searched for information on the safety and the legal consequences of their behavior. For instance, a tax officer who engaged in embezzlement told us, " Beforehand , I was , huh !… I have read all the books about corruption , I have read the news… how long the sentence would be if I get arrested " (Participant 10). Besides self-knowledge, informal relationships, and impersonal sources, colleagues from the other organizations were the most common information source who participants in this category consulted for information related to corrupt behavior.

Regarding the evaluation aspects of their decision, participants in this category chose corruption as a solution to a specific problem because of several reasons. The reason most frequently cited by participants was that they had considered the behavior to be safe. They made sure that the behavior would not create any problems for them in the future and would not lead to them getting caught. Participants commonly evaluated the behavior as safe based on their own prior experience or on information they had received from close others. For instance, a manager of an empowerment program who engaged in favoritism reported: " It was because in the first , second , third , and fourth-year , it was okay; there were no issues . Even in 2007 , I got the award , sir . So , I continued to dare to do so " (Participant 33). A branch manager of a national company who engaged in embezzlement similarly said:

In my organization , many other individuals did it [took the money] for their own sake , but nobody went to jail . It encouraged me; nobody got caught . Maybe many individuals took more [money] than me , the director maybe , but all of them were free . (Participant 21)

Most of these participants also reported additional reasons, such as considering the corrupt behavior as common and enacted by many others, as an easy solution to the problem, or even as the only solution to a problem.

Atypical types of corruption

Assisting the corruption process.

One of the behaviors that participants described—assisting the corruption process—is not commonly studied in the literature. This behavior captures participants who reported that they had only contributed in a minor way to the whole corruption process. This category was the most common behavior reported by participants. It includes lending the name of one’s company to a corrupt project, providing the signature on a document, assisting the money transfer process, or managing events within the program that had been used for one’s corrupt actions (see Table 1 ). This category of behaviors does not define participants as an active or driving force of corruption, but rather as facilitators who contribute to a certain part of the corruption process. The majority of participants of this category were regular employees in their organization, such as a treasurer, lecturer, teacher, general affairs staff, or a third-party who was involved in the corruption process (e.g., villagers; a construction company director). Some participants reported that, at the time, they were unaware that their behavior had contributed to the corruption process. For example, a university treasurer said:

I did not know , I was also not involved in the project team . I was not involved at all . I was just asked by the rector [to issue the money] , and of course , I did so because I was the treasurer of the rector . If I would not have done it , it would have meant that I did not do my job right . (Participant 29)

Some participants who had assisted the corruption process, particularly those who were not aware that their activities related to corrupt actions, trusted others’ (e.g., their leader’s or colleagues’) decisions. Therefore, the evaluative aspects underlying their corrupt behaviors were mainly push reasons, such as following the instructions of others, their leader approving their behaviors, and others being held responsible for their behaviors. For example, a villager who signed the documents (related to corrupt projects) without knowing the details of these documents reported: " It was an educational institution , I thought [they] were more aware of the details of what’s being processed , and I thought there wouldn’t be any problem . They would not deceive a villager like me , who had a good intention " (Participant 2). Logically, participants in this category did not search for much information before they took action.

Other participants in this category engaged in information search before they assisted the corrupt behaviors, especially those who were aware that their behaviors were relevant for the corrupt process. The content of information that participants in this category searched for was similar to those who engaged in typical forms of corruption, such as social comparisons and safety issues. The most considered aspect of these participants was whether their behavior would be safe to do. For example, the head of the institute for research and community service at a private university who was involved in a bribery process said:

From 1 . 75 billion [rupiah] , 70% was paid back . It means that what my university used was only 30% . However , the report should sum up to 100% … Other [universities] refused [such a project] because the money that should be paid back was too huge . My institution was small , and therefore interested [in the project] to have funding [for research] . (Participants 16)

Before he finally engaged in corrupt behavior, he searched for information among his colleagues on whether this would be a problem or not: " Yeah [I did search for information] , whether it was safe or not . Many said it was safe . It was the governor’s program " (Participants 16). He also asked for his manager’s approval and compared his situation to other organizations:

Yes , I think it was quite a lot [of information] . First , I went to the dean , and then , I asked the other universities that had frequently dealt with this kind of project . All of them agreed… The fund deductions from the government project were common . All of them understood this . (Participant 16)

In sum, some participants who assisted or were involved in the corruption process were aware that their activities were corrupt, while others were not. Their decision-making process differed accordingly. The former group engaged in extensive information search before committing to the corrupt process, while the latter largely avoided this stage.

Applying policy/administrative procedures incorrectly

Among the atypical forms of corrupt behaviors, applying policy/administrative procedures incorrectly covers behaviors that deviate from the standard procedures or policy regulations that apply in a certain context. An example of this type of behavior is the acquisition of land without a proper appraisal process. A district head reported:

I was sentenced because I did not follow the proper appraisal procedure [in the land acquisition] . However , we had asked for an appraisal process at the tax office , but they never processed it . Then , we just had a consensus meeting [to determine the price of the land] . (Participant 24)

Another example stems from a manager of a regional government company who invested organizational money in a way that deviated from the organizational vision: " I , as a manager , was considered as violating the procedure , spending the money was not according to the budget plan " (Participant 14). Interestingly, most of the participants in this category were in a position of power in their organization, such as district heads, a managing director of a public company, a village head, a school director, and a school principal. Thus, they had more insights, authority and, thus, opportunities to apply policy and administrative procedures in an incorrect way.

Some participants in this category reported social and organizational goals motivating their behavior, such as improving public facilities and increasing organizational income. However, most of these participants also reported personal goals, including their career, self-esteem, and personal income. These participants mostly searched for information about the legality of the behavior before they finally engaged in the activities that led them to jail. They mostly searched for that information in regulation documents or asked a higher authority, such as the board committee. Therefore, most of the participants in this category did not consider their behavior to be corruption.

Perceiving oneself as a victim of conspiracy

Several participants reported that they were victims of the ‘real actor of corruption’ and his/her political motives. For instance, a secretary of the farming organization said:

I was convicted of violating the corruption law , but in reality , it was not like that… In short , I was hindered from participating in the political contestation [regional senator election] . I was trapped with the CSR [Corporate Social Responsibility] program . I managed the CSR program for a public company… Finally , this program was corrupted based on political motives to make me go to jail . (Participant 9)

In terms of hierarchy, participants in this category mostly had a high-level position in their organization, including a village head, branch manager of a bank, NGO founder, businessman, and a manager of a regional public company. Participants in this category mostly reported that they had a conflict of interest with people who had more power and higher authority. For instance, a village head told her story:

I participated [as an incumbent] in the village head election . In that process , my competitor cheated . The regency head appointed this guy [as the elected village head] … and I took legal action against the regency head [for his decision] … I won the judicial process , and the court asked the regency head to annul the election result . But the regency head appealed to a higher court . However , the higher court rejected his appeal . Finally , the regency head said , “search for any type of mistake that she made [that could be considered violating the law] . ” I knew this from someone who joined the meeting… Then I was sued by the prosecutor for corruption with regard to the building project . (Participant 30)

These participants did not consider their actions as corrupt behavior or unethical behavior in general. For example, when we asked, “what behavior of yours was regarded as violating the law?”, a secretary of a farming organization reported:

I managed 2 . 3 billion [rupiah] from a farming company in the form of rice seeds , fertilizers , and the cost of the farm activities . The fund was from the CSR program of a public company . In the end , we failed to harvest because of the poor quality of the seeds , and we were asked to pay back the fund . We could not pay the money back…It was not corruption . (Participant 9)

Regarding the goal formulation, participants in this category did not report any personal interests underlying the behavior that they engaged in. Instead, they reported social goals. For instance, the secretary of a farming organization claimed: “ I did this for social reasons . I did not get any salary for that . I even used my own money for that program ” (Participant 9). Similar to participants who applied policy/administrative incorrectly, these participants believed that their behaviors were not corrupt and did not violate any regulations. For example, a credit analyst in a public bank said: “ We had all of the requirements for that [giving a loan to a businessman] . In terms of regulations , it was not possible to be regarded as violating any regulations ” (Participant 17). Finally, most of these participants did not search for any information, as they had engaged in the respective behavior (which they regarded as legal) many times before.

In the present study, we set out to explore the intra-individual cognitive-motivational decision-making processes underlying corruption. We took an informed grounded theory approach [ 21 ] while using a general decision-making model [ 20 ] to guide our study. Our findings complement previous models of unethical decision making [e.g., 25, 26] and corrupt action [ 8 ]. While these studies have primarily focused on the actor’s moral awareness and judgment, or on the ability to solve one’s problem with corruption per se, our study focuses on the why and how , i.e., the cognitive-motivational stages that occur before individuals conclude that corruption is the best option to reach their goals. In this way, we further our understanding of corruption as a rational decision-making process. The detailed analysis of our data revealed some interesting new insights. We identified new categories for each stage of the decision-making process and uncovered previously unconsidered relationships between different aspects of these stages.

Firstly, with regard to corrupt behavior, we found atypical forms of corruption that did not align with the literature’s usual categories, like bribery, embezzlement, manipulation of information, and favoritism [ 40 , 60 ]. These behaviors included applying policy/administrative procedures incorrectly and assisting the corruption process. In addition, some participants perceived themselves to be victims of a conspiracy. In line with the typology of ethical decision outcomes [ 61 ], participants engaged in corruption both intentionally and unintentionally.

For these atypical, mostly unintentional forms of corruption, the decision-making process was followed less consistent than what happens with typical forms. According to those participants, they were not (fully) aware that their actions were illegal and could be considered corrupt. Consequently, they reported fewer personal goals or information search activities, and mostly did not actively decide to engage in the behavior that was then later judged as corrupt as it was part of their everyday behavior or because they blindly relied on the judgment of others. For most of the typical forms of corruption, our qualitative data support the idea that the process leading to corruption does indeed resemble general decision-making models and proceeds through different stages, including the identification of a problem and goal formation, information search, and evaluation of this information. Thus, our findings highlight that corruption may involve a more elaborate decision-making process than previously considered in models of unethical and immoral decision-making [ 26 , 29 ].

Secondly, in the domain of goals, participants not only mentioned their personal and organizational goals [ 1 ] but also a number of what we categorized as social goals. These included helping farmers, improving public facilities, and aiding the general public. Corruption is generally regarded as immoral behavior [ 40 ] used to advance personal and organizational goals [ 1 , 8 ]. However, our findings indicate that corruption can be a means of achieving pro-social and morally sound goals. This aligns with suggestions by De Graaf and Huberts [ 62 ], who proposed that goals like friendship or love, status, and impression management could play a role in corruption.

Thirdly, concerning information search, participants reported both searching for information related to corruption and searching for alternative solutions and advice about whether corruption would be the best solution or not. Participants mainly used interpersonal sources, such as close colleagues, especially from other organizations. This finding emphasizes that corruption is not always performed by an individual in isolation, but often performed by consulting with others [ 39 ]. Thus, scholars may need to take a network perspective [ 4 ] when studying corruption. Furthermore, we found that participants who reported having had a personal goal related to corruption pursued a more elaborate information search process than participants who reported having had social or organizational goals. Logically, the extent of awareness with regard to the corrupt actions determined the amount of information searched for. Less aware participants reported that they signed a document without reading it in detail, acted based on trust in others, or simply carried out a certain behavior without any further consideration of its consequences. In contrast, more aware participants reported having searched for much more information (e.g., about corruption laws, alternative solutions, and the potentially negative consequences of getting caught). This result suggests that contextual factors (e.g., task type, time pressure, hierarchical structures) can determine whether individuals engage in more or less information search and, thus, rational or intuitive corruption [ 63 ].

Finally, in the evaluation stage, we identified what we labeled as push and pull reasons for engaging in corrupt behavior. Push reasons which have not been identified in the literature so far were associated with participants not being aware of the corrupt character of their actions. Participants felt pushed to engage in these behaviors because they trusted and obeyed authorities (i.e., engaged in corruption because their supervisor involved them in the corruption process). Furthermore, they may have considered corruption as the only solution to a problem, highlighting the role of contextual and systemic pressures in encouraging corrupt decisions. These findings align with the notion that corrupt behavior is influenced by not only individual aspects, but also situational, organizational, and environmental aspects [ 59 , 64 , 65 ]. Pull reasons corresponded to previously reported positive motivations for corruption, such as perceived behavioral control and attitude toward corruption [ 8 ], risk of disclosure and the size of the bribe [ 66 ], as well as descriptive norms of corruption in or across organizations [ 11 , 67 ]. Most of the participants that engaged in typical forms of corruption and were aware of their acts used rational cost-and-benefit analysis [ 4 , 68 ] (e.g., checking whether they would be caught) to reach a decision.

While pull reasons for corruption fit with the notion that bad people intentionally make bad decisions [ 61 ], the push reasons listed by our participants suggest that scholars should consider the possibility of unintentional corrupt behavior. While we used rational decision-making theory [ 20 ] as a framework for our research, our findings indicated that decision-making in corruption can be both rational and intuitive. This aligns with previous work on unethical behavior and moral decision-making, which has also emphasized rational and intuitive approaches, such as the moral decision-making model [ 25 ] versus the literature on intuitive dishonesty [ 14 ].

Theoretical implications and contributions

This study makes several theoretical contributions. First, we contribute to the literature on corrupt decision-making by further exploring the intra-individual, multi-stage process of corruption that goes beyond the previously identified underlying mechanisms and causes for unethical behavior outlined in ethical, moral, and corrupt decision-making models [ 8 , 26 , 29 ]. By exploring additional aspects at every stage of the decision-making process leading to corruption (e.g., how do individuals search for information?, Why do individuals choose corrupt behavior over another kind of behavior as a solution to a specific problem?) as well as the relationships between them, this research furthers our understanding of the cognitive-motivational mechanisms that lead to corrupt actions. Our study thereby extends previous decision-making models focusing on corruption, such as the corrupt action model [ 8 ] which draws on the Theory of Planned Behavior [ 34 ]. This model explains that corrupt action is driven by the desire and intention to achieve personal and professional goals through corruption [ 8 ]. This desire and intention are affected by several individual factors, including attitudes, subjective norms, and perceived behavioral control [ 8 ]. While the corrupt action model [ 8 ] also focuses on goals, it does not consider other stages that are typically covered in classical decision making theories. Therefore, our study provides a valuable alternative model for explaining the decision-making process underlying corruption. For example, we explored the information process aspects that were not addressed in the corrupt action model [ 8 ] and other ethical decision-making models [ 26 , 29 ]. We found that individuals searched for information regarding the safety and legality of their actions, and compared how others behaved in the same situation. Furthermore, our findings extend previous studies that focus on personal and organizational causes of corruption [ 5 – 7 ]. This research has for example explored the interaction effect of ethical leadership and followers’ dark personality trait Machiavellianism on corruption. This study found that ethical leadership could reduce followers’ corruption, particularly when followers’ trait Machiavellianism is low [ 6 ]. Consistent with those findings, our study found that some participants engaged in corruption because they followed unethical instructions from their leader, indicating the important role leaders may play in followers’ corrupt behavior.

Second, using an informed grounded theory approach [ 21 ] and interviewing a sample of individuals who had actually been convicted of corruption enriches our understanding of how real-life actors of corruption came to the decision to act corruptly in greater conceptual depth. Most corruption studies have failed to generalize their findings to real-life contexts, as they are mostly conducted in laboratory settings with student samples and using scenarios or games [ 28 ]. By investigating the process of corruption with actual convicts of corruption, we were, for example, able to discover atypical forms of corruption (e.g., assisting the corruption process) alongside affirming more typical types (e.g., bribery). We also found that participants engaged in corruption because of push reasons, such as getting involved in corruption by following the instructions of one’s supervisor. Thus, the findings of our qualitative approach with real-life actors add to the external validity of corruption research and provide a deeper understanding of the mechanisms involved in making such decisions. Future studies may build on these findings and investigate the corruption process with a stronger systemic perspective (e.g., with social network analysis) that accounts for the dynamic interplay between active and passive actors and the associated intra- and interpersonal mechanisms. Previous corruption studies applying a network approach have indicated that corruption involves multiple actors [ 69 , 70 ]. Each actor within the network has a different role, engages in different activities, and has individual connections [ 69 ]. Analyzing the intra-individual decision-making processes within such a corrupt network may further our understanding of the interplay between intra- and inter-individual factors in corrupt decision-making processes.

Practical implications and contributions

Our findings may help decision-makers in designing anti-corruption interventions or developing new policies. More specifically, our model provides detailed information about the stages of goal identification, information search, evaluation, and corrupt actions, in addition to the interrelations between these stages. Our results show that the type of corruption the person engaged in determines the decision-making process underlying corrupt behavior. For example, the most frequently reported reason for why participants engaged in bribery was that it was common practice. On the other hand, the most frequently mentioned reason for why participants applied policy/administrative procedures incorrectly was because they did not consider their behavior to be corrupt. Thus, decision-makers should tailor their interventions to the unique aspects of decision-making involved in a specific form of corruption [ 71 ], rather than utilize a one-size-fits-all solution.

It is important to note that participants who engaged in typical forms of corruption most often considered the issue of safety. Most of the participants concluded that their behavior was safe and that they would not be caught. They came to this conclusion based on their consultation with others and on their own prior experiences. This finding is consistent with the idea that the ethical climate within an organization plays a crucial role in ethical decision-making [ 72 ]. Specifically, individuals are more likely to behave corruptly when they work in a context where unethical behavior (e.g., corruption) is not punished, but is instead a socially accepted norm. Based on these findings, we emphasize the importance of considering the ethical climate when designing intervention programs to reduce or prevent corruption.

Another of our findings that may prove useful for policymakers is that some participants believed that their behavior was not corrupt. This indicates that they did not know which behaviors can and cannot be classified as corrupt. Consequently, we highlight the importance of distributing information about corruption laws in order to increase individuals’ awareness and understanding of what is and is not legal. In addition, interventions need to strengthen individuals’ personal responsibility for their own actions, their vigilance toward doubtful supervisory behaviors, and their self-esteem for withstanding orders from authorities that they are critical about. These may be useful complementary strategies in addition to fostering an ethical climate in organizations. Increasing awareness, vigilance, and self-responsibility in individual actors may also help to reduce automatic responding. Following a dual process logic, people could be encouraged to engage in more effortful information processing before proceeding with corruption. This could help to prevent people from unintentionally engaging in corrupt processes due to a restricted decision-making process, as described above.

Study limitations

Despite the contributions that this study makes, as outlined above, it also has several limitations. One such limitation is that our participants were all from Indonesia. It is possible that the results for individuals from other countries (e.g., Western countries in North America or Europe) will differ because previous studies have shown that corruption in one country is related to cultural aspects [ 73 ]. Furthermore, our participants’ corrupt behavior was only enacted at a regional level, and we did not investigate corrupt behavior at a national level. Including acts of corruption at a national level might have given us a more comprehensive understanding of large-scale acts of corruption (e.g., grand corruptions). Nevertheless, our sample was still quite diverse and included both men and women who worked in different types of organizations (private/public) and in a variety of positions (e.g., principal, lecturer, and regional government head, secretary, treasurer, and tax officer). In addition to the heterogeneity of our sample, the fact that we collected data until reaching theoretical saturation [ 22 ] helped to ensure that our insights may generalize to other samples and contexts.

Another potential limitation of our study design is that participants reported their corrupt behavior retrospectively. Because corruption is a socially undesirable act, it can create cognitive dissonance (i.e., discomfort arising from the idea that one is a good person but has committed a bad act). Therefore, we cannot rule out the possibility that participants engaged in retrospective rationalization in order to reduce cognitive dissonance [ 74 ], leading them to reframe their past corrupt behaviors as normal and acceptable [ 1 ]. Specifically, the denial of responsibility–one form of rationalization where individuals view circumstances beyond their control as responsible for their corrupt actions [ 74 ]–may explain why several participants reported that they only contributed in a small way to the corruption process, were victims of a conspiracy, simply followed orders, or did not have any other choice. In summary, we cannot rule out the possibility that cognitive reappraisal and justification processes influenced participants’ answers, such that they did not accurately reflect their original decision-making processes at the time of their corrupt involvement. However, in an attempt to limit this kind of desirability bias, we ensured complete confidentiality during the research process in order to make participants feel safe and allow them to talk honestly about their experiences [ 75 ]. Furthermore, as many participants in our sample did report intentional corrupt behaviors and did not deny responsibility, we believe that our findings may rather reflect an empirical reality rather than simply retrospective rationalization. Nonetheless, future studies should examine the decision-making process more directly and with less delay to avoid the issue of retrospection bias (e.g., in an event sampling study, if possible). Finally, we acknowledge that our intra-personal decision making focused approach may have limited the range of possible underlying mechanisms for corruption that could be identified in our research. Research in adjacent disciplines such as law, social psychology, or sociology could fruitfully employ our method to identify discipline specific mechanisms that could extend the model presented in this research.

Supporting information

S1 appendix, acknowledgments.

The authors thank Ika N. Listyanti and Muhammad S. Muntafi for additional assistance.

Funding Statement

This study was supported by LPDP (Lembaga Pengelola Dana Pendidikan/Indonesian Endowment Fund for Education) 20160822048894. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.

Data Availability

  • PLoS One. 2023; 18(9): e0291819.

Decision Letter 0

28 Apr 2023

PONE-D-23-05981Exploring the path to corruption – An informed grounded theory study on the decision-making process underlying corruptionPLOS ONE

Dear Dr. Manara,

Thank you for submitting your manuscript to PLOS ONE. After careful consideration, we feel that it has merit but does not fully meet PLOS ONE’s publication criteria as it currently stands. Therefore, we invite you to submit a revised version of the manuscript that addresses the points raised during the review process.

I recommend that it should be revised taking into account the changes requested by the reviewers. Since the requested changes include valuable and constructive reviews, I would like to give you a chance to revise your manuscript. The revised manuscript will undergo the next round of review by same reviewers.

Please submit your revised manuscript by Jun 12 2023 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at  gro.solp@enosolp . When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Please include the following items when submitting your revised manuscript:

  • A rebuttal letter that responds to each point raised by the academic editor and reviewer(s). You should upload this letter as a separate file labeled 'Response to Reviewers'.
  • A marked-up copy of your manuscript that highlights changes made to the original version. You should upload this as a separate file labeled 'Revised Manuscript with Track Changes'.
  • An unmarked version of your revised paper without tracked changes. You should upload this as a separate file labeled 'Manuscript'.

If you would like to make changes to your financial disclosure, please include your updated statement in your cover letter. Guidelines for resubmitting your figure files are available below the reviewer comments at the end of this letter.

If applicable, we recommend that you deposit your laboratory protocols in protocols.io to enhance the reproducibility of your results. Protocols.io assigns your protocol its own identifier (DOI) so that it can be cited independently in the future. For instructions see: https://journals.plos.org/plosone/s/submission-guidelines#loc-laboratory-protocols . Additionally, PLOS ONE offers an option for publishing peer-reviewed Lab Protocol articles, which describe protocols hosted on protocols.io. Read more information on sharing protocols at https://plos.org/protocols?utm_medium=editorial-email&utm_source=authorletters&utm_campaign=protocols .

We look forward to receiving your revised manuscript.

Kind regards,

Baogui Xin, Ph.D.

Academic Editor

Journal requirements:

When submitting your revision, we need you to address these additional requirements.

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming. The PLOS ONE style templates can be found at

https://journals.plos.org/plosone/s/file?id=wjVg/PLOSOne_formatting_sample_main_body.pdf and

https://journals.plos.org/plosone/s/file?id=ba62/PLOSOne_formatting_sample_title_authors_affiliations.pdf

2. Please provide additional details regarding participant consent. In the ethics statement in the Methods and online submission information, please ensure that you have specified (1) whether consent was informed and (2) what type you obtained (for instance, written or verbal, and if verbal, how it was documented and witnessed). If your study included minors, state whether you obtained consent from parents or guardians. If the need for consent was waived by the ethics committee, please include this information.

If you are reporting a retrospective study of medical records or archived samples, please ensure that you have discussed whether all data were fully anonymized before you accessed them and/or whether the IRB or ethics committee waived the requirement for informed consent. If patients provided informed written consent to have data from their medical records used in research, please include this information.

3. In your Data Availability statement, you have not specified where the minimal data set underlying the results described in your manuscript can be found. PLOS defines a study's minimal data set as the underlying data used to reach the conclusions drawn in the manuscript and any additional data required to replicate the reported study findings in their entirety. All PLOS journals require that the minimal data set be made fully available. For more information about our data policy, please see http://journals.plos.org/plosone/s/data-availability .

Upon re-submitting your revised manuscript, please upload your study’s minimal underlying data set as either Supporting Information files or to a stable, public repository and include the relevant URLs, DOIs, or accession numbers within your revised cover letter. For a list of acceptable repositories, please see http://journals.plos.org/plosone/s/data-availability#loc-recommended-repositories . Any potentially identifying patient information must be fully anonymized.

Important: If there are ethical or legal restrictions to sharing your data publicly, please explain these restrictions in detail. Please see our guidelines for more information on what we consider unacceptable restrictions to publicly sharing data: http://journals.plos.org/plosone/s/data-availability#loc-unacceptable-data-access-restrictions . Note that it is not acceptable for the authors to be the sole named individuals responsible for ensuring data access.

We will update your Data Availability statement to reflect the information you provide in your cover letter.

[Note: HTML markup is below. Please do not edit.]

Reviewers' comments:

Reviewer's Responses to Questions

Comments to the Author

1. Is the manuscript technically sound, and do the data support the conclusions?

The manuscript must describe a technically sound piece of scientific research with data that supports the conclusions. Experiments must have been conducted rigorously, with appropriate controls, replication, and sample sizes. The conclusions must be drawn appropriately based on the data presented.

Reviewer #1: Partly

Reviewer #2: Yes

2. Has the statistical analysis been performed appropriately and rigorously?

Reviewer #1: N/A

3. Have the authors made all data underlying the findings in their manuscript fully available?

The PLOS Data policy requires authors to make all data underlying the findings described in their manuscript fully available without restriction, with rare exception (please refer to the Data Availability Statement in the manuscript PDF file). The data should be provided as part of the manuscript or its supporting information, or deposited to a public repository. For example, in addition to summary statistics, the data points behind means, medians and variance measures should be available. If there are restrictions on publicly sharing data—e.g. participant privacy or use of data from a third party—those must be specified.

Reviewer #1: No

4. Is the manuscript presented in an intelligible fashion and written in standard English?

PLOS ONE does not copyedit accepted manuscripts, so the language in submitted articles must be clear, correct, and unambiguous. Any typographical or grammatical errors should be corrected at revision, so please note any specific errors here.

Reviewer #1: Yes

5. Review Comments to the Author

Please use the space provided to explain your answers to the questions above. You may also include additional comments for the author, including concerns about dual publication, research ethics, or publication ethics. (Please upload your review as an attachment if it exceeds 20,000 characters)

Reviewer #1: General comment – First, I am pleased to have the opportunity to review this manuscript. This research aims to explore the intra-individual psychological mechanisms of corruption. The topic is very interesting because, in many countries, particularly in developing ones, corruption has been a significant social problem for years. Understanding how corruption occurs contributes to the existing literature and assists decision-makers in designing anti-corruption programs and policies. In general, the authors have successfully identified the research gap, applied the appropriate methodology, conducted solid data analysis, and presented insightful results. However, I believe that the manuscript requires minor revisions before being published in PLOS ONE.

In the following paragraphs, I will list the specific comments on the issues that I have identified after reviewing the manuscript.

Comment 1 – I suggest the authors to use the correct citation format when submitting the manuscript to PLOS ONE. The detailed submission Guidelines can be found at this link: https://journals.plos.org/plosone/s/submission-guidelines .

Comment 2 – The authors have mentioned that the data is not available for download because of some restrictions. I highly recommend that the authors provide the transcriptions of the interviews, as they are excellent endorsement materials to justify the integrity of qualitative research. However, if the data is not available due to some restrictions, such as local laws and regulations, the authors should explain them.

Comment 3 – On p. 3, the authors have mentioned:

“Although the corruption literature at the micro-level has explored the effects of both individual (e.g., personality; 5) and situational factors (e.g., organizational climate; 6) on unethical behavior in organizations, there is still scarce research focusing on the cognitive intra-individual processes preceding an individual's decision to engage in unethical action (e.g., 7).”

I have noticed that only three references are cited. I recommend the authors to enhance the literature review in the introduction section, as this part helps readers to understand the following questions:

1. What is the problem?

2. Why is the problem important?

Without fully understanding these questions, it is hard for readers to comprehend what conflicts or unanswered questions your research addresses.

Comment 4 – On pp. 5-6, the authors have extensively stated the theoretical contributions of their research. From my viewpoint, the authors could further condense and summarise the contributions in the introduction section, leaving more space for explaining them in detail in the discussion section.

Comment 5 – On p.12, the authors have mentioned that there are different variants of grounded theory, which is correctly described. However, I suggest the authors to briefly introduce the characteristics of each main variant of grounded theory, apart from the classical ground theory. For instance, evolved grounded theory (Corbin & Strauss, 2015) and constructivist grounded theory (Charmaz, 2014) are important methodological genres, and each of them is based on different ontological and epistemological assumptions.

Meanwhile, I infer that the approach that the authors implemented (Thornberg, 2012) has some similarities with the constructivist grounded theory (Charmaz, 2014). Therefore, I would like to invite the authors to explain the main differences between the informed grounded theory (Thornberg, 2012) and the constructivist grounded theory (Charmaz, 2014)

Comment 6 – On p.13, the authors have mentioned:

“Our participants were individuals convicted of corruption in Indonesia.”

As a reader, I would like to invite the authors to explain why the convinced informants with Indonesian nationality were chosen in the sampling frame.

Comment 7 – I highly recommend the authors place the section of limitations and future research after the section of practical implications because the current arrangement in the manuscript does not follow the normal logic.

References:

Charmaz, K. (2014). Constructing grounded theory (2nd ed.). Sage.

Corbin, J., & Strauss, A. (2015). Basics of Qualitative Research (4th ed.). SAGE Publications.

Thornberg, R. (2012). Informed Grounded Theory. Scandinavian Journal of Educational Research, 56(3), 243–259. https://doi.org/10.1080/00313831.2011.581686

Reviewer #2: In the manuscript titled ‘Exploring the path to corruption – An informed grounded theory study on the decision-making process underlying corruption’, Authors explore new forms of corrupt decision-making elements within this process. This study contains some interesting findings and are valuable for the understanding of cause for corruption. However, the study still has some flaws. Therefore, MAJOR revision has to be done before this manuscript could be accepted.

(1) As we know, theoretical saturation is very important. The study conducted 38 interviews. Can you tell us whether the theoretical saturation occurred after 38 interviews or in 38 interviews?

(2) The author clearly summarizes the types of corruption, but fails to reveal the underlying causes of corruption. So,it is necessary to further explain the causes of corruption by combining psychological , sociological theories and interview data.

(3)The author puts forward that the goals of corruption includes individual goals, organizational goals and social goals. It will be more meaningful if the author can construct a model of multiple factors leading to corruption through interview data.

6. PLOS authors have the option to publish the peer review history of their article ( what does this mean? ). If published, this will include your full peer review and any attached files.

If you choose “no”, your identity will remain anonymous but your review may still be made public.

Do you want your identity to be public for this peer review? For information about this choice, including consent withdrawal, please see our Privacy Policy .

Reviewer #2: No

[NOTE: If reviewer comments were submitted as an attachment file, they will be attached to this email and accessible via the submission site. Please log into your account, locate the manuscript record, and check for the action link "View Attachments". If this link does not appear, there are no attachment files.]

While revising your submission, please upload your figure files to the Preflight Analysis and Conversion Engine (PACE) digital diagnostic tool,  https://pacev2.apexcovantage.com/ . PACE helps ensure that figures meet PLOS requirements. To use PACE, you must first register as a user. Registration is free. Then, login and navigate to the UPLOAD tab, where you will find detailed instructions on how to use the tool. If you encounter any issues or have any questions when using PACE, please email PLOS at  gro.solp@serugif . Please note that Supporting Information files do not need this step.

Author response to Decision Letter 0

29 Jun 2023

Dear Prof. Baogui Xin,

We would like to thank you for the opportunity to revise and resubmit our manuscript to PLOS ONE, and the valuable feedback we have received. We have substantially revised the manuscript according to your and the reviewers’ comments. In the following, we will present a point by point discussion of how we have dealt with each of the points raised.

Responses to the Comments of the Editor

1. Please ensure that your manuscript meets PLOS ONE's style requirements, including those for file naming.

Response: Thank you for your reminder to follow PLOS ONE’s style requirements. We have now revised the manuscript following the requirements.

Response: Thank you for inviting us to provide further details about this issue. We now have mentioned that participants were informed about the study and the written informed consent was signed by each participant (p.14, line 331-334).

3. In your Data Availability statement, you have not specified where the minimal data set underlying the results described in your manuscript can be found. PLOS defines a study's minimal data set as the underlying data used to reach the conclusions drawn in the manuscript and any additional data required to replicate the reported study findings in their entirety. All PLOS journals require that the minimal data set be made fully available.

Response: Thank you for this suggestion. Corruption is a highly sensitive issue as it is an illegal act. We would like to refrain from making the transcriptions of the interviews publicly accessible as they contain sensitive data such as positions, locations, and types of organizations related to the respective corrupt actions. Although names of individuals and companies have been removed from the transcriptions, readers still can infer and trace people back based on the information from the dialogues in the interview transcriptions. In addition, we informed participants that the research process was treated confidentially including the interview data before they signed the informed consent. This was particularly important for creating trust and rapport, a necessary condition for participants to openly share their experiences. In sum, publicly sharing the full transcriptions does not seem warranted to us as it will violate the agreement with our participants.

However, we have already provided many excerpts and quotes from the transcriptions which are relevant to the study within the paper (i.e., Table 1). In addition, in case additional data is required by other scholars, for example to replicate reported study findings, the transcriptions of the interviews are available upon request. We now explain this in Data Availability Statement.

Responses to the Comments of Reviewer #1

General comment – First, I am pleased to have the opportunity to review this manuscript. This research aims to explore the intra-individual psychological mechanisms of corruption. The topic is very interesting because, in many countries, particularly in developing ones, corruption has been a significant social problem for years. Understanding how corruption occurs contributes to the existing literature and assists decision-makers in designing anti-corruption programs and policies. In general, the authors have successfully identified the research gap, applied the appropriate methodology, conducted solid data analysis, and presented insightful results. However, I believe that the manuscript requires minor revisions before being published in PLOS ONE.

Response: Thank you for your positive feedback. We found it very motivating to read that you deemed our work interesting and relevant.

Response: Thank you for noticing the incorrect citation format. We have now followed the submission guidelines and use the correct citation format.

Response: Thank you for this suggestion. As mentioned in our response to the editor’s comment 3 of the journal requirements above, corruption is a highly sensitive issue and the transcriptions contain sensitive data which potentially allow identifying our participants. We therefore would like to refrain from making our transcripts publicly available. In addition, publicly sharing the transcriptions would violate the agreement we have with participants. We now explain this on Data Availability Statement in the submission system and point to the option that transcriptions of interviews are available upon request.

Response: Thank you for the suggestion. We have extended our literature review considerably and now cite more references regarding the micro-level predictors of corruption (p. 3, lines 55-57). Furthermore, we also added further explanations as to highlight the research gap (i.e., problematize the literature) and explain why it is important to close that gap. For example, we now explain that while the literature on other forms of unethical behavior has emphasized cognitive processes in explaining unethical decisions, the corruption literature has surprisingly not investigated such processes as a mechanism that may explain corruption (p. 3, lines 58-461). Therefore, we want to fill this gap. We also extended why it is important to study such cognitive processes in the last part of the paragraph (lines 65-69) and highlight that our study provides new insights into how and why individuals conclude that corruption is the best option to reach their goals.

Comment 4 – On pp. 5-6, the authors have extensively stated the theoretical contributions of their research. From my viewpoint, the authors could further condense and summarize the contributions in the introduction section, leaving more space for explaining them in detail in the discussion section.

Response: Thank you for your suggestion. We have now further summarized the theoretical contribution part and condensed it into one paragraph. Furthermore, we have added a more detailed discussion of our contributions in the beginning of the discussion section on page 36, lines 687-693.

Meanwhile, I infer that the approach that the authors implemented (Thornberg, 2012) has some similarities with the constructivist grounded theory (Charmaz, 2014). Therefore, I would like to invite the authors to explain the main differences between the informed grounded theory (Thornberg, 2012) and the constructivist grounded theory (Charmaz, 2014).

Response: Thank you for this suggestion. We now explain that informed grounded theory (Thornberg, 2012) has its root in constructive grounded theory (Charmaz, 2014) but that it adds literature review strategies to the grounded theory research process (p. 12, lines 279-282). In addition, we briefly explain the main differences between classical and constructivist grounded theory (p.12, lines 273-279). Finally, to give readers an overview of other variants of grounded theory, we have now added some references which specifically address that issue (p.12, line 269).

Response: Thank you for the invitation to explain why we chose Indonesian participants. We now have explained our reasoning on page 13, lines 305-308. Specifically, we explain that because Indonesia scores high on the corruption index and corruption is deeply ingrained into peoples’ daily lives, studying corruption in this context is particularly relevant. Furthermore, we also explained that although access to the specific target group (prisoners convicted of corruption) can be considered extremely challenging (in terms of official approval, but also in terms of openly speaking to and establishing rapport with participants), this study benefitted from one of the authors being from Indonesia, making this process feasible (p. 14, lines 315-219).

Response: Thank you for the recommendation. We have now placed the section of study limitations after the section of practical implications.

Responses to the Comments of Reviewer #2

In the manuscript titled ‘Exploring the path to corruption – An informed grounded theory study on the decision-making process underlying corruption’, Authors explore new forms of corrupt decision-making elements within this process. This study contains some interesting findings and are valuable for the understanding of cause for corruption. However, the study still has some flaws. Therefore, MAJOR revision has to be done before this manuscript could be accepted.

(1) As we know, theoretical saturation is very important. The study conducted 38 interviews. Can you tell us whether the theoretical saturation occurred after 38 interviews or in 38 interviews?

Response: Thank you for this important question and for noticing this issue. Saturation is known as an important but challenging concept in qualitative research. In line with Braun and Clarke (2021), our understanding is that saturation is not about the number of interviews per se, but about the conceptual depth that is reached based on the data. Throughout the 38 interviews, we continuously acknowledged the criteria of conceptual depth suggested by Nelson (2017) to ensure that we reached saturation: (a) range (i.e., are there multiple examples of concepts in the data?), (b) complexity (i.e., is there a rich network of themes and concepts with complex connections?), (c) subtlety (i.e., have instances of same codes been compared to tease out meaning?), (d) resonance (i.e., can the emerging concepts be connected to existing literature in the area being investigated), and (e) validity (i.e., do the findings seem useful for others?). Furthermore, throughout the 38 interviews, our coding dictionary stabilized further and further, and, although it is difficult to pinpoint the exact moment in time, we agreed that within the last interviews, a point was reached when “further data gathering and analyses add little new to the conceptualization” (Corbin & Strauss, 2008, p. 263). Thus, we do agree that saturation was reached in 38 interviews, rather than after 38 interviews. We now explicitly state this in the manuscript on p. 15 (lines 338-344), along with our strategy and understanding of theoretical saturation.

(2) The author clearly summarizes the types of corruption, but fails to reveal the underlying causes of corruption. So, it is necessary to further explain the causes of corruption by combining psychological, sociological theories and interview data.

Response: Thank you for your suggestion. We agree that discussing and further exploring the underlying causes of corruption is an important endeavor. However, the topic of corruption has been discussed in a wide range of disciplines, such as psychology, sociology, or law, as we mention in the introduction and have added to the discussion. As it is not feasible to cover every possible perspective on underlying reasons for corruption, we chose to explicitly focus on ‘a limited set of mechanisms’ of corruption, namely the intra-personal decision-making process underlying corruption based on the steps of a rational decision-making model (Engel et al., 1986). We have indicated this focus more clearly now at various points in the paper (p. 3, line 52; p. 39, line 768-769). In the decision-making process that we reveal through our interviews, we discovered some important cognitive processes that lead up to corrupt actions, such as the goals that drive individuals to engage in corruption, the information sources they consult, as well as aspects that individuals consider when engaging in corruption. In order to meet your request to broaden our perspective, we now added a discussion on how our findings complement previous models that focus on inter-personal and organizational causes of corruption (p. 39-40, lines 774-793). Previous models, such as the corrupt action model (Rabl & Kühlmann, 2008) focused on desire and intention to achieve goals through corruption and some factors (i.e., attitudes, subjective norms, and perceived behavioral control) that affected such desire and intention. Complementing these models, our study found some important additional underlying mechanisms, for example the insight that some participants considered that their behavior was not corrupt. We also cited earlier research that examined an inter-personal cause of corruption (Manara et al., 2020), which examines the interaction effect of ethical leadership and followers’ trait Machiavellianism (i.e., manipulative personality) on corruption. It also shows that ethical leadership has the power to reduce corruption, particularly when followers’ trait Machiavellianism is low. Adding this research may provide insights into the psychological causes and mechanisms already discussed in the literature.

3)The author puts forward that the goals of corruption includes individual goals, organizational goals and social goals. It will be more meaningful if the author can construct a model of multiple factors leading to corruption through interview data.

Response: Thank you for your suggestion. As we have explained in response to your Comment 2, our paper explored the decision-making process underlying corruption following the decision-making stages of the general decision-making model by (Engel et al., 1986). As we explicitly used this model as a theoretical framework, we focused on those stages and found some interesting aspects for every stage. Although we did not specify multiple factors (i.e., additional predictors equivalent to the position of goals in our model) leading to corruption, we explicitly acknowledge multiple factors leading to corruption by identifying aspects of every single stage that could lead people to engage in corruption. Therefore, we do consider multiple ‘causes’ of corruption, but those are of intra-personal nature. For example, in the evaluation stage, we found that participants considered whether their behaviors would be safe or would be punished. Therefore, independent of the initial goals that people specified for themselves, the perception that corrupt behavior would or would not be punished could lead people to engage in corruption or not. We do believe that exploring those cognitive, intra-personal ‘causes’ is equally valid and important as exploring inter-personal or organizational factors which previous models have considered (e.g., Rabl & Kühlmann, 2008; Treviño, 1986; Trevino & Youngblood, 1990). Thus, our study complements such research in a meaningful way. As discussed above, we have also added a statement in the discussion section acknowledging that other factors could be identified by taking another disciplinary lens to the same method.

Braun, V., & Clarke, V. (2021). To saturate or not to saturate? Questioning data saturation as a useful concept for thematic analysis and sample-size rationales. Qualitative Research in Sport, Exercise and Health, 13(2), 201-216. https://doi.org/10.1080/2159676X.2019.1704846

Charmaz, K. (2014). Constructing grounded theory (2nd ed. ed.). Sage.

Corbin, J., & Strauss, A. (2008). Basics of qualitative research (3 ed.). Sage.

Engel, J. F., Blackwell, R. D., & Miniard, P. W. (1986). Consumer behavior (5 ed.). Dryden.

Manara, M. U., van Gils, S., Nübold, A., & Zijlstra, F. R. H. (2020). Corruption, fast or slow? Ethical leadership interacts with Machiavellianism to influence intuitive thinking and corruption. Frontiers in Psychology, 11, Article 578419. https://doi.org/10.3389/fpsyg.2020.578419

Nelson, J. (2017). Using conceptual depth criteria: addressing the challenge of reaching saturation in qualitative research. Qualitative Research, 17(5), 554-570. https://doi.org/10.1177/1468794116679873

Rabl, T., & Kühlmann, T. M. (2008). Understanding corruption in organizations – Development and empirical assessment of an action model. Journal of Business Ethics, 82(2), 477-495. https://doi.org/10.1007/s10551-008-9898-6

Thornberg, R. (2012). Informed grounded theory. Scandinavian Journal of Educational Research, 56(3), 243-259. https://doi.org/10.1080/00313831.2011.581686

Treviño, L. K. (1986). Ethical decision making in organizations: A person-situation interactionist model. Academy of Management Review, 11(3), 601-617. https://doi.org/10.5465/amr.1986.4306235

Trevino, L. K., & Youngblood, S. A. (1990). Bad apples in bad barrels: A causal analysis of ethical decision-making behavior. Journal of Applied Psychology, 75(4), 378-385. https://doi.org/10.1037/0021-9010.75.4.378

Submitted filename: Response to Reviewers.docx

Decision Letter 1

24 Jul 2023

PONE-D-23-05981R1Exploring the path to corruption – An informed grounded theory study on the decision-making process underlying corruptionPLOS ONE

I recommend that it should be revised taking into account the changes requested by Reviewers. I would like to give you a chance to revise your manuscript. To speed the review process, the manuscript will only be reviewed by the Academic Editor in the next round.

Please submit your revised manuscript by Sep 07 2023 11:59PM. If you will need more time than this to complete your revisions, please reply to this message or contact the journal office at  gro.solp@enosolp . When you're ready to submit your revision, log on to https://www.editorialmanager.com/pone/ and select the 'Submissions Needing Revision' folder to locate your manuscript file.

Journal Requirements:

Please review your reference list to ensure that it is complete and correct. If you have cited papers that have been retracted, please include the rationale for doing so in the manuscript text, or remove these references and replace them with relevant current references. Any changes to the reference list should be mentioned in the rebuttal letter that accompanies your revised manuscript. If you need to cite a retracted article, indicate the article’s retracted status in the References list and also include a citation and full reference for the retraction notice.

1. If the authors have adequately addressed your comments raised in a previous round of review and you feel that this manuscript is now acceptable for publication, you may indicate that here to bypass the “Comments to the Author” section, enter your conflict of interest statement in the “Confidential to Editor” section, and submit your "Accept" recommendation.

Reviewer #1: (No Response)

Reviewer #2: All comments have been addressed

********** 

2. Is the manuscript technically sound, and do the data support the conclusions?

3. Has the statistical analysis been performed appropriately and rigorously?

4. Have the authors made all data underlying the findings in their manuscript fully available?

5. Is the manuscript presented in an intelligible fashion and written in standard English?

6. Review Comments to the Author

Reviewer #1: General comment –I appreciate the effort you have put into revising and improving your manuscript titled "Exploring the path to corruption – An informed grounded theory study on the decision-making process underlying corruption." The revisions you have made in response to the previous round of review have indeed enhanced the overall quality of your work.

That said, upon careful consideration of this current version, I still see some areas that could use a bit more refinement. These are minor issues and mainly pertain to details that would further improve the clarity and completeness of your study. I am confident that you will be able to address these issues swiftly, as they do not fundamentally alter the scientific content of your work. I am looking forward to receiving your revised manuscript and to seeing this important piece of research ready for publication.

Comment 1 – I've reviewed the updated data availability statement as well as your responses to both me and the editor. I understand your concerns about participant confidentiality in the context of your research on corruption, which indeed deals with sensitive issues. This is an important consideration and certainly a challenge when dealing with such a delicate topic.

However, the principles of data availability are central to the progress of science, which include transparency, verification of results, fostering new research, economic responsibility, skill development, and public trust. These principles apply to all fields of research and play a crucial role in maintaining the credibility and reproducibility of scientific work.

While I fully understand your point of view regarding the interview transcripts, perhaps there is an alternative solution to consider. If providing anonymised transcripts of interviews is not feasible due to concerns over possible identification of participants, perhaps you could consider sharing your field notes, if these are available. They could be edited and anonymised to a greater extent than interview transcriptions and may provide sufficient data to allow replication of your findings without breaching confidentiality agreements with your participants.

I would like to emphasize that this suggestion is in line with maintaining the balance between respecting participant confidentiality and upholding the standards of data availability in scientific research.

Comment 2 – While I appreciate the authors' attempt to explain the rationale for including Indonesian informants in the study, I believe the language used in lines 305-308 on page 13 may inadvertently stigmatise a nation. The statement "Indonesia can be considered a corrupt country" is a potentially stigmatising label that may paint an unbalanced picture of the situation in Indonesia. I understand the authors’ intent to emphasize the prevalence of reported corruption cases in Indonesia as an explanation for their choice of sample; however, this framing could be perceived as negative or offensive.

Corruption is a global issue and exists in varying degrees in every country. Using an index score to label an entire country as "corrupt" oversimplifies a complex issue. It would be more accurate and sensitive to refer to Indonesia's corruption perception index (CPI) scores, indicating a high incidence of reported corruption cases, rather than branding the entire nation as "corrupt."

As an alternative, the authors could consider using a more neutral language, such as "Due to the consistently low Corruption Perception Index (CPI) scores and frequent media reports of corruption cases at various levels of government, Indonesia was selected as the focal context for this study." This rephrasing provides the necessary justification for the authors' sample choice while avoiding potentially harmful stereotyping.

Reviewer #2: The authors have adequately addressed comments raised in a previous round of review. In the manuscript,authors explored new forms of corrupt decision-making elements within this process, and discovered some important cognitive processes that lead up to corrupt actions. Although the manuscript has some shortcomings in the innovation of its conclusions, it has some value in the methodology of studying corruption through grounded theory.

7. PLOS authors have the option to publish the peer review history of their article ( what does this mean? ). If published, this will include your full peer review and any attached files.

Author response to Decision Letter 1

Thank you for giving us the opportunity to address some minor revisions. We have adapted our manuscript based on your and the reviewers’ comments. Below are our responses to your and reviewers’ comments and suggestions.

Response: Thank you for reminding us to check our reference list. We have checked our references once more and can conclude that the reference list is complete and correct. We also checked our references through Retraction Watch Database ( http://retractiondatabase.org ) and found no retracted articles in our reference list. While we have been thorough in our search, we appreciate your specific guidance if we would have unadvertedly cited a retracted manuscript.

General comment –I appreciate the effort you have put into revising and improving your manuscript titled "Exploring the path to corruption – An informed grounded theory study on the decision-making process underlying corruption." The revisions you have made in response to the previous round of review have indeed enhanced the overall quality of your work.

Response: Thank you for your positive feedback regarding our revisions. Indeed, we found that your constructive feedback has helped us a lot to improve the quality of our manuscript. We would also like to thank you for providing some additional minor comments on this current version. Please find our responses to your current comments below.

Response: Unfortunately, we did not create any specific “field notes” during our research (please note that this may depend on the qualitative approach taken). We would like to offer to share our coding dictionary in the Supporting Information, however, to adhere to the transparency standards of good research. As we indicated in the manuscript (lines 386-399, p. 17), the interviews were done in the Indonesian language and were coded in original transcripts and audio recordings. Therefore, most of the quotes in the coding dictionary are in the Indonesian language. Some of them were translated into English to let readers who do not speak Indonesian have some impressions about the coding process.

Response: Thank you for noticing that our language in lines 305-308 page 13 potentially stigmatizes the country and could be perceived as negative and offensive. We appreciate the suggested rephrasing sentences to avoid stigmatizing Indonesia as a corrupt country. We have now changed the sentences based on your suggestion (lines 305-307, page 13).

The authors have adequately addressed comments raised in a previous round of review. In the manuscript, authors explored new forms of corrupt decision-making elements within this process, and discovered some important cognitive processes that lead up to corrupt actions. Although the manuscript has some shortcomings in the innovation of its conclusions, it has some value in the methodology of studying corruption through grounded theory.

Response: Thank you for your positive feedback. Your valuable comments have provided important insights for us to enhance our work.

Decision Letter 2

Exploring the path to corruption – An informed grounded theory study on the decision-making process underlying corruption

PONE-D-23-05981R2

We’re pleased to inform you that your manuscript has been judged scientifically suitable for publication and will be formally accepted for publication once it meets all outstanding technical requirements.

Within one week, you’ll receive an e-mail detailing the required amendments. When these have been addressed, you’ll receive a formal acceptance letter and your manuscript will be scheduled for publication.

An invoice for payment will follow shortly after the formal acceptance. To ensure an efficient process, please log into Editorial Manager at http://www.editorialmanager.com/pone/ , click the 'Update My Information' link at the top of the page, and double check that your user information is up-to-date. If you have any billing related questions, please contact our Author Billing department directly at gro.solp@gnillibrohtua .

If your institution or institutions have a press office, please notify them about your upcoming paper to help maximize its impact. If they’ll be preparing press materials, please inform our press team as soon as possible -- no later than 48 hours after receiving the formal acceptance. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information, please contact gro.solp@sserpeno .

Additional Editor Comments (optional):

Acceptance letter

12 Sep 2023

Dear Dr. Manara:

I'm pleased to inform you that your manuscript has been deemed suitable for publication in PLOS ONE. Congratulations! Your manuscript is now with our production department.

If your institution or institutions have a press office, please let them know about your upcoming paper now to help maximize its impact. If they'll be preparing press materials, please inform our press team within the next 48 hours. Your manuscript will remain under strict press embargo until 2 pm Eastern Time on the date of publication. For more information please contact gro.solp@sserpeno .

If we can help with anything else, please email us at gro.solp@enosolp .

Thank you for submitting your work to PLOS ONE and supporting open access.

PLOS ONE Editorial Office Staff

on behalf of

Professor Baogui Xin

IMAGES

  1. (PDF) Corruption in Nigeria a proposal for research

    example of research proposal on corruption

  2. Corruption Essay

    example of research proposal on corruption

  3. (PDF) Corruption in Empirical Research: A Review

    example of research proposal on corruption

  4. (PDF) Regulation and Corruption: claims, evidence and explanations

    example of research proposal on corruption

  5. (DOC) Research Proposal on Corruption

    example of research proposal on corruption

  6. Essays on Corruption

    example of research proposal on corruption

VIDEO

  1. Free Me Research Proposal Kaise Banaye? Free Sources #shorts #shortsfeed #ugcnetjrf

  2. Unraveling the Impact of Corruption on Kenyan Society

  3. How To Write Your PhD Research Proposal

  4. Writing an Essay on Corruption in public life How to write an Essay on Corruption in English

  5. Digital tools for combating corruption

  6. Promoting ethics, preventing corruption

COMMENTS

  1. Exploring the path to corruption–An informed grounded theory

    To gain access to the prisons, we sought a permit letter to conduct interviews by sending a research proposal to the East Java Regional Office of the Ministry of Justice and Human Rights, Indonesia. When the permit was issued, we brought it to the regional prisons with individuals convicted of corruption.