<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2007-9176</journal-id>
<journal-title><![CDATA[Iztapalapa. Revista de ciencias sociales y humanidades]]></journal-title>
<abbrev-journal-title><![CDATA[Iztapalapa. Rev. cienc. soc. humanid.]]></abbrev-journal-title>
<issn>2007-9176</issn>
<publisher>
<publisher-name><![CDATA[Universidad Autónoma Metropolitana, a través de la Unidad Iztapalapa, División de Ciencias Sociales y Humanidades]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2007-91762018000100163</article-id>
<article-id pub-id-type="doi">10.28928/revistaiztapalapa/842018/aot1/arellanogaultd</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Corrupción ¿calle de una sola vía? La internalización del soborno en empresas en México]]></article-title>
<article-title xml:lang="en"><![CDATA[Corruption, a one-way street? Internalization of bribery in Mexican Companies]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Arellano Gault]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Centro de Investigación y Docencia Económicas A.C. (CIDE)  ]]></institution>
<addr-line><![CDATA[Ciudad de México ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2018</year>
</pub-date>
<volume>39</volume>
<numero>84</numero>
<fpage>163</fpage>
<lpage>190</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2007-91762018000100163&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2007-91762018000100163&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2007-91762018000100163&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen En un país que sufre de corrupción sistémica, la interacción entre empresas y servidores públicos suele estar permeada por diversos actos que pueden ir desde el soborno a la captura del Estado por actores privados poderosos. Es decir, la corrupción es una calle de doble vía donde gobierno y empresas se refuerzan mutuamente, incluso a través de acuerdos y negociaciones. Por medio de una encuesta a empresas privadas en una ciudad mexicana y luego de un conjunto de entrevistas a profundidad en dos de ellas, este artículo muestra cómo las empresas construyen rutinas y soluciones internas que les permitan atender la demanda de soborno por parte de los servidores públicos. En otras palabras, las empresas crean procesos internos estables y organizados para pagar los sobornos como un acto normalizado. A partir de un estudio empírico se aporta al debate en la literatura sobre corrupción que aduce que esta (en este caso, en su lógica de soborno), más que ser un acto aislado de individuos, es una relación social que tiende a normalizarse y racionalizarse. Estos hallazgos respaldan la discusión de que para entender el fenómeno de la corrupción es necesario vincular tanto las perspectivas de los individuos corruptos como aquella que la observa como un fenómeno social de intercambios, favores y reciprocidades.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract In a country that suffers from systemic corruption, the interaction between companies and public servants is usually permeated by diverse acts that can go from bribery to the capture of the state by powerful private actors. That is, corruption is a two-way street where government and companies reinforce themselves. Through a survey of private companies in a Mexican city and after a series of in-depth interviews in two of them, this article shows how companies build routines and internal solutions that allow them to meet the demand of bribery from public officials. In other words, companies create stable and organized internal processes to pay bribes as a normalized act. Companies, facing requests for bribes, build an organizational process in which diverse internal actors participate and justify their actions, making these processes normal and stable routines for the company. These findings support the argument that in order to understand the phenomenon of corruption, it is necessary to link both the perspectives of the corrupt individuals and the one that observes it as a social phenomenon of exchanges, favors and reciprocities.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[soborno]]></kwd>
<kwd lng="es"><![CDATA[corrupción]]></kwd>
<kwd lng="es"><![CDATA[administración pública]]></kwd>
<kwd lng="es"><![CDATA[normalización de la corrupción]]></kwd>
<kwd lng="en"><![CDATA[Bribes]]></kwd>
<kwd lng="en"><![CDATA[Corruption]]></kwd>
<kwd lng="en"><![CDATA[Public sector and administration]]></kwd>
<kwd lng="en"><![CDATA[Normalization of corruption]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ananad]]></surname>
<given-names><![CDATA[Vikas]]></given-names>
</name>
<name>
<surname><![CDATA[Ashforth]]></surname>
<given-names><![CDATA[Blake]]></given-names>
</name>
<name>
<surname><![CDATA[Joshi]]></surname>
<given-names><![CDATA[Mahendra]]></given-names>
</name>
<name>
<surname><![CDATA[Martini]]></surname>
<given-names><![CDATA[Perry]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Business as usual: the acceptance and perpetuation of corruption in organizations]]></article-title>
<source><![CDATA[Academy of Management Executive]]></source>
<year>2004</year>
<volume>18</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>39-55</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ainslie]]></surname>
<given-names><![CDATA[George]]></given-names>
</name>
</person-group>
<source><![CDATA[Breaking-down of will]]></source>
<year>2001</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arellano]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Corrupción como proceso organizacional: comprendiendo la lógica de la desnormalización de la corrupción]]></article-title>
<source><![CDATA[Contaduría y Administración]]></source>
<year>2017</year>
<numero>62</numero>
<issue>62</issue>
<page-range>810-26</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arellano]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
</person-group>
<source><![CDATA[¿Podemos reducir la corrupción en México?]]></source>
<year>2012</year>
<publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[Centro de Investigación y Docencia Económicas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ashforth]]></surname>
<given-names><![CDATA[Blake]]></given-names>
</name>
<name>
<surname><![CDATA[Gioia]]></surname>
<given-names><![CDATA[Dennis]]></given-names>
</name>
<name>
<surname><![CDATA[Robinson]]></surname>
<given-names><![CDATA[Sandra]]></given-names>
</name>
<name>
<surname><![CDATA[Treviño]]></surname>
<given-names><![CDATA[Linda]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reviewing organizational corruption]]></article-title>
<source><![CDATA[Academy of Management Review]]></source>
<year>2008</year>
<volume>33</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>670-84</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ashforth]]></surname>
<given-names><![CDATA[Blake]]></given-names>
</name>
<name>
<surname><![CDATA[Ananad]]></surname>
<given-names><![CDATA[Vikas]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The normalization of corruption in organizations]]></article-title>
<source><![CDATA[Research in Organizational Behavior]]></source>
<year>2003</year>
<numero>25</numero>
<issue>25</issue>
<page-range>1-52</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bargh]]></surname>
<given-names><![CDATA[John]]></given-names>
</name>
<name>
<surname><![CDATA[Chartrand]]></surname>
<given-names><![CDATA[Tanya]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The unbearable automaticity of being]]></article-title>
<source><![CDATA[American Psychologist]]></source>
<year>1999</year>
<volume>54</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>462-79</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Benson]]></surname>
<given-names><![CDATA[Michael]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Denying the guilty mind: accounting for involvement in a white-collar crime]]></article-title>
<source><![CDATA[Criminology]]></source>
<year>1985</year>
<numero>23</numero>
<issue>23</issue>
<page-range>583-607</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Berger]]></surname>
<given-names><![CDATA[Peter]]></given-names>
</name>
<name>
<surname><![CDATA[Luckman]]></surname>
<given-names><![CDATA[Thomas]]></given-names>
</name>
</person-group>
<source><![CDATA[La construcción social de la realidad]]></source>
<year>1978</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Amorrortu]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Blundo]]></surname>
<given-names><![CDATA[Giorgio]]></given-names>
</name>
<name>
<surname><![CDATA[Olivier]]></surname>
<given-names><![CDATA[Jean Pierre]]></given-names>
</name>
<name>
<surname><![CDATA[Arifari]]></surname>
<given-names><![CDATA[N. B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Everyday corruption and the state. Citizens and public officials in Africa]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Reino Unido ]]></publisher-loc>
<publisher-name><![CDATA[Zed Books]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bratsis]]></surname>
<given-names><![CDATA[Peter]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The construction of corruption, or rules of separation and illusions of purity in bourgeois societies]]></article-title>
<source><![CDATA[Social Text]]></source>
<year>2003</year>
<volume>77</volume>
<numero>21-24</numero>
<issue>21-24</issue>
<page-range>9-33</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bourdieu]]></surname>
<given-names><![CDATA[Pierre]]></given-names>
</name>
</person-group>
<source><![CDATA[Sobre el estado. Cursos en el College de France (1989-1992)]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Barcelona ]]></publisher-loc>
<publisher-name><![CDATA[Anagrama]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chibnall]]></surname>
<given-names><![CDATA[Steven]]></given-names>
</name>
<name>
<surname><![CDATA[Saunders]]></surname>
<given-names><![CDATA[Peter]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Worlds apart: notes on the social reality of corruption]]></article-title>
<source><![CDATA[The British Journal of Sociology]]></source>
<year>1977</year>
<volume>28</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>138-54</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Conklin]]></surname>
<given-names><![CDATA[John]]></given-names>
</name>
</person-group>
<source><![CDATA[Business crime in America]]></source>
<year>1977</year>
<publisher-loc><![CDATA[Englewood ]]></publisher-loc>
<publisher-name><![CDATA[Prentice-Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Costas]]></surname>
<given-names><![CDATA[Jana]]></given-names>
</name>
<name>
<surname><![CDATA[Grey]]></surname>
<given-names><![CDATA[Christopher]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bringing secrecy into de the open: towards a theorization of the social processes of organizational secrecy]]></article-title>
<source><![CDATA[Organization Studies]]></source>
<year>2014</year>
<volume>35</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>1423-47</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cressey]]></surname>
<given-names><![CDATA[Donald]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Why managers commit fraud]]></article-title>
<source><![CDATA[Australian and New Zealand Journal of Criminology]]></source>
<year>1986</year>
<numero>19</numero>
<issue>19</issue>
<page-range>195-209</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felps]]></surname>
<given-names><![CDATA[Will]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[Terence]]></given-names>
</name>
<name>
<surname><![CDATA[Byington]]></surname>
<given-names><![CDATA[Eliza]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How, when, and why bad apples spoil the barrel: negative group members and dysfunctional groups]]></article-title>
<source><![CDATA[Research in Organizational Behavior]]></source>
<year>2006</year>
<numero>27</numero>
<issue>27</issue>
<page-range>175-222</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Festinger]]></surname>
<given-names><![CDATA[Leon]]></given-names>
</name>
</person-group>
<source><![CDATA[A Theory of cognitive dissonance]]></source>
<year>1957</year>
<publisher-loc><![CDATA[Stanford ]]></publisher-loc>
<publisher-name><![CDATA[Stanford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fisman]]></surname>
<given-names><![CDATA[Raymond]]></given-names>
</name>
<name>
<surname><![CDATA[Miguel]]></surname>
<given-names><![CDATA[Edward]]></given-names>
</name>
</person-group>
<source><![CDATA[Economic gangsters]]></source>
<year>2008</year>
<publisher-loc><![CDATA[Princeton ]]></publisher-loc>
<publisher-name><![CDATA[Princeton University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fleming]]></surname>
<given-names><![CDATA[Peter]]></given-names>
</name>
<name>
<surname><![CDATA[Zyglidopoulos]]></surname>
<given-names><![CDATA[Stelios]]></given-names>
</name>
</person-group>
<source><![CDATA[Charting corporate corruption]]></source>
<year>2009</year>
<publisher-loc><![CDATA[Northampton ]]></publisher-loc>
<publisher-name><![CDATA[Edward Elgar]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gambetta]]></surname>
<given-names><![CDATA[Diego]]></given-names>
</name>
</person-group>
<source><![CDATA[The Sicilian mafia]]></source>
<year>1993</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[Harvard University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Geis]]></surname>
<given-names><![CDATA[Gilbert]]></given-names>
</name>
<name>
<surname><![CDATA[Meier]]></surname>
<given-names><![CDATA[Robert]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The white-collar ofender]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Touch]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Psychology of crime and criminal justice]]></source>
<year>1979</year>
<publisher-loc><![CDATA[Prospect Heights ]]></publisher-loc>
<publisher-name><![CDATA[Waveland Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gigerenzer]]></surname>
<given-names><![CDATA[Gerd]]></given-names>
</name>
</person-group>
<source><![CDATA[Bounded rationality: the adaptive toolbox]]></source>
<year>2002</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goffman]]></surname>
<given-names><![CDATA[Erwin]]></given-names>
</name>
</person-group>
<source><![CDATA[La presentación de la persona en la vida cotidiana]]></source>
<year>1983</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Amorrortu]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Heywood]]></surname>
<given-names><![CDATA[Paul]]></given-names>
</name>
</person-group>
<source><![CDATA[Routledge Handbook of political corruption]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Oxford ]]></publisher-loc>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Houba]]></surname>
<given-names><![CDATA[Harold]]></given-names>
</name>
<name>
<surname><![CDATA[Bolt]]></surname>
<given-names><![CDATA[Wilko]]></given-names>
</name>
</person-group>
<source><![CDATA[Credible threats in negotiations. A game-theoretic approach]]></source>
<year>2002</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Kluwer Academic Publishers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<collab>INEGI</collab>
<source><![CDATA[Encuesta Nacional de Victimización de Empresas (ENVE) 2014. Principales Resultados]]></source>
<year>2014</year>
<publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[INEGI]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<collab>INEGI</collab>
<source><![CDATA[Encuesta Nacional de Calidad e Impacto Gubernamental (ENCIG) 2013, Principales resultados]]></source>
<year>2014</year>
<publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[INEGI]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<collab>INEGI</collab>
<source><![CDATA[Censo Económico 2014. Resultados definitivos]]></source>
<year>2014</year>
<publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[INEGI]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Johnston]]></surname>
<given-names><![CDATA[Michael]]></given-names>
</name>
</person-group>
<source><![CDATA[Syndromes of corruption]]></source>
<year>2005</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kunda]]></surname>
<given-names><![CDATA[Gideon]]></given-names>
</name>
</person-group>
<source><![CDATA[Engineering culture]]></source>
<year>1992</year>
<publisher-loc><![CDATA[Filadelfia ]]></publisher-loc>
<publisher-name><![CDATA[Temple University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kish-Gephart]]></surname>
<given-names><![CDATA[Jennifer]]></given-names>
</name>
<name>
<surname><![CDATA[Harrison]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
<name>
<surname><![CDATA[Klebe Treviño]]></surname>
<given-names><![CDATA[Linda]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bad apples, bad cases, and bad barrels: meta-analytic evidence about sources of unethical decisions at work]]></article-title>
<source><![CDATA[Journal of Applied Psychology]]></source>
<year>2010</year>
<volume>95</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lerner]]></surname>
<given-names><![CDATA[Jennifer]]></given-names>
</name>
<name>
<surname><![CDATA[Tetlock]]></surname>
<given-names><![CDATA[Philip]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Accounting for the effects of accountability]]></article-title>
<source><![CDATA[Psychological Bulletin]]></source>
<year>1999</year>
<volume>125</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>255-75</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Loyens]]></surname>
<given-names><![CDATA[Kim]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Rule bending by morally disengaged detectives: an ethnographic study]]></article-title>
<source><![CDATA[Police Practice and Research]]></source>
<year>2014</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>62-74</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Noonan]]></surname>
<given-names><![CDATA[John]]></given-names>
</name>
</person-group>
<source><![CDATA[Bribes, The intellectual history of a moral idea]]></source>
<year>1984</year>
<publisher-loc><![CDATA[Berkeley ]]></publisher-loc>
<publisher-name><![CDATA[University of California Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Persson]]></surname>
<given-names><![CDATA[Anna]]></given-names>
</name>
<name>
<surname><![CDATA[Rothstein]]></surname>
</name>
<name>
<surname><![CDATA[Teorell]]></surname>
<given-names><![CDATA[Jan]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Why Anticorruption Reforms Fail-Systemic Corruption as a Collective Action Problem]]></article-title>
<source><![CDATA[Governance]]></source>
<year>2013</year>
<volume>26</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>449-71</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pinto]]></surname>
<given-names><![CDATA[Jonathan]]></given-names>
</name>
<name>
<surname><![CDATA[Leana]]></surname>
<given-names><![CDATA[Carrie]]></given-names>
</name>
<name>
<surname><![CDATA[Pil]]></surname>
<given-names><![CDATA[Frits]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Corrupt organizations or organizations of corrupt individuals? two types of organization-level corruption]]></article-title>
<source><![CDATA[Academy of Management Review]]></source>
<year>2008</year>
<numero>33</numero>
<issue>33</issue>
<page-range>685-709</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rothstein]]></surname>
<given-names><![CDATA[Bo]]></given-names>
</name>
<name>
<surname><![CDATA[Teorell]]></surname>
<given-names><![CDATA[Jan]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[What is quality of government? A theory of impartial governmental institutions]]></article-title>
<source><![CDATA[Governance]]></source>
<year>2008</year>
<volume>21</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>165-90</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<collab>Secretaría de Desarrollo Económico (SEDECO)</collab>
<source><![CDATA[Reporte económico de la Ciudad de México]]></source>
<year>2015</year>
<publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[Gobierno de la Ciudad de México]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Scott]]></surname>
<given-names><![CDATA[James]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The analysis of corruption in developing countries]]></article-title>
<source><![CDATA[Comparative Studies in Society and History]]></source>
<year>1969</year>
<volume>11</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>315-41</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sekerka]]></surname>
<given-names><![CDATA[Leslie]]></given-names>
</name>
<name>
<surname><![CDATA[Zolin]]></surname>
<given-names><![CDATA[Roxanne]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Rule-Bending: Can Prudential Judgment Affect Rule Compliance and Values in the Workplace?]]></article-title>
<source><![CDATA[Public Integrity]]></source>
<year>2007</year>
<volume>9</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>225-43</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Simon]]></surname>
<given-names><![CDATA[Herbert]]></given-names>
</name>
</person-group>
<source><![CDATA[Administrative behavior]]></source>
<year>1947</year>
<publisher-loc><![CDATA[Chicago ]]></publisher-loc>
<publisher-name><![CDATA[Chicago University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sykes]]></surname>
<given-names><![CDATA[Gresham]]></given-names>
</name>
<name>
<surname><![CDATA[Matza]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Techniques of neutralization: a theory of delinquency]]></article-title>
<source><![CDATA[American Sociological Review]]></source>
<year>1957</year>
<numero>22</numero>
<issue>22</issue>
<page-range>664-70</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="">
<collab>Transparencia Internacional</collab>
<source><![CDATA[Corruption perception Index 2016]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Weber]]></surname>
<given-names><![CDATA[Max]]></given-names>
</name>
</person-group>
<source><![CDATA[Economía y sociedad]]></source>
<year>1964</year>
<edition>2</edition>
<publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[Fondo de Cultura Económica]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zerubavel]]></surname>
<given-names><![CDATA[Eviatar]]></given-names>
</name>
</person-group>
<source><![CDATA[The elephant in the room. Silence and denial in everyday life]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Oxford ]]></publisher-loc>
<publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
