<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0186-1042</journal-id>
<journal-title><![CDATA[Contaduría y administración]]></journal-title>
<abbrev-journal-title><![CDATA[Contad. Adm]]></abbrev-journal-title>
<issn>0186-1042</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Facultad de Contaduría y Administración]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0186-10422017000300810</article-id>
<article-id pub-id-type="doi">10.1016/j.cya.2016.01.005</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Corrupción como proceso organizacional: comprendiendo la lógica de la desnormalización de la corrupción]]></article-title>
<article-title xml:lang="en"><![CDATA[Corruption as an organizational process: Understanding the logic of the denormalization of corruption]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Arellano Gault]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Centro de Investigación y Docencia Económicas  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2017</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2017</year>
</pub-date>
<volume>62</volume>
<numero>3</numero>
<fpage>810</fpage>
<lpage>826</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S0186-10422017000300810&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S0186-10422017000300810&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S0186-10422017000300810&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen El artículo cuestiona los supuestos de la visión individualista de la corrupción y se introduce al contrario una conceptualización más «densa socialmente»: el proceso de normalización de la corrupción. En esta última lógica, se advierte que una definición de corrupción es siempre una definición política e ideológica que intenta imponer una visión determinada de comportamientos «adecuados» de acuerdo a una separación pretendidamente tajante y clara entre las esferas de lo público y lo privado. Se realiza una revisión de parte de la literatura sobre corrupción organizacional, con el fin de comprender cómo las rutinas, procesos y estructuras de socialización propias de la arena organizacional pueden llevar justamente a las personas a «caer en resbaladilla» hacia una dinámica de corrupción. A normalizarla en otras palabras. Se concluye con un llamado a discutir los procesos de desnormalización de la corrupción, como estrategia sustantiva más allá de la visión individualista o moralista del fenómeno.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[This article discusses the basic assumptions of an individualist vision on corruption. A different argument based on &#8220;social density&#8221; of the phenomenon is proposed instead: the process of normalization of corruption. Under this umbrella, corruption is a political concept that looks to impose a particular vision on what are &#8220;right&#8221; behaviors based on a sharp and unrealistic separation of the public and private sphere. A review of the organizational literature on corruption is developed, with the aim of understanding how organizational processes of socialization triggers behaviors that make corrupt acts to appear as &#8220;normal&#8221; under the organizational logic. Persons find themselves in a &#8220;slippery slope&#8221;, generating agreements and social dynamics that are able to produce corrupt logics under the normal life of an organization. A plea for discussing the social processes needed to &#8220;un-normalize&#8221; corruption is defended a conceptualization that goes beyond an individualist and moralist vision of the phenomenon.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Corrupción]]></kwd>
<kwd lng="es"><![CDATA[Corrupción organizacional]]></kwd>
<kwd lng="es"><![CDATA[Socialización]]></kwd>
<kwd lng="es"><![CDATA[Racionalización]]></kwd>
<kwd lng="es"><![CDATA[Estrategias contra la corrupción]]></kwd>
<kwd lng="en"><![CDATA[Corruption]]></kwd>
<kwd lng="en"><![CDATA[Organizational corruption]]></kwd>
<kwd lng="en"><![CDATA[Socialization]]></kwd>
<kwd lng="en"><![CDATA[Rationalization]]></kwd>
<kwd lng="en"><![CDATA[Strategies against corruption]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ackroyd]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Thompson]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Organizational misbehaviour]]></source>
<year>1999</year>
<publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ainslie]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Break-down of will]]></source>
<year>2001</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[Cambrdige University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Business as usual: The acceptance and perpetuation of corruption in organizations]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Anand]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Ashforth]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Joshi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Martini]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Academy of Management Executive]]></source>
<year>2004</year>
<volume>18</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>39-55</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The politics of perception: Use and abuse of transparency international&#8217;s approach to measuring corruption]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Andersson]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Heywood]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Political Studies]]></source>
<year>2009</year>
<volume>57</volume>
<page-range>746-67</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Reformas administrativas y cambio organizacional: hacia el «efecto neto»]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arellano]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Revista Mexicana de Sociología.]]></source>
<year>2010</year>
<volume>2010</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>225-54</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arellano]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[¿Podemos reducir la corrupción en México? Límites y posibilidades de los instrumentos a nuestro alcance]]></source>
<year>2012</year>
<publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[CIDE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The normalization of corruption in organizations]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ashforth]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Anand]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Research in Organizational Behavior]]></source>
<year>2003</year>
<volume>25</volume>
<page-range>1-52</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Re-viewing organizational corruption]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ashforth]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Gioia]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Robinson]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Treviño]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Academy of Management Review]]></source>
<year>2008</year>
<volume>33</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>670-84</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bandura]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Mechanisms of moral disengagement]]></article-title>
<source><![CDATA[Origins of terrorism: Psychologies, ideologies, theologies, states of mind]]></source>
<year>1990</year>
<page-range>161-91</page-range><publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The unbearable automaticity of being]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bargh]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Chartrand]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[American Psychologist]]></source>
<year>1999</year>
<volume>54</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>462-79</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Denying the guilty mind: Accounting for involvement in a white-collar crime]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Benson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Criminology]]></source>
<year>1985</year>
<volume>23</volume>
<page-range>583-607</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Berger]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Luckman]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[La construcción social de la realidad]]></source>
<year>1978</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Amorrortu]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The construction of corruption, or rules of separation and illusions of purity in Burgeois Societies]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bratsis&#8217;F]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Social Text]]></source>
<year>2003</year>
<volume>71</volume>
<page-range>21-4</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Caiden]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Dwivedi]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Jabbra]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Where corruption lives]]></source>
<year>2001</year>
<publisher-loc><![CDATA[Bloomfield ]]></publisher-loc>
<publisher-name><![CDATA[Kumarian Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Worlds apart: Notes on the social reality of corruption]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chibnall]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Saunders]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[The British Journal of Sociology]]></source>
<year>1977</year>
<volume>28</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>138-54</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chugh]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Bazerman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Banaji]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bounded ethicality as a psychological barrier to recognizing conflicts of interest]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Moore]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Moore]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Conflict of interest]]></source>
<year>2005</year>
<page-range>74-95</page-range><publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The hidden costs of organizational dishonesty]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cialdini]]></surname>
<given-names><![CDATA[R. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Pterova]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Goldstein]]></surname>
<given-names><![CDATA[N. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Sloan Management Review]]></source>
<year>2004</year>
<volume>45</volume>
<page-range>67-73</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Conklin]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Business crime in America]]></source>
<year>1977</year>
<publisher-loc><![CDATA[Englewood ]]></publisher-loc>
<publisher-name><![CDATA[Prentice-hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Bringing secrecy into de the open: Towards a theorization of the social processes of organizational secrecy]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Costas]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Grey]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Organization Studies]]></source>
<year>2014</year>
<volume>35</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>1423-47</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Why managers commit fraud]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cressey]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Australian and New Zealand Journal of Criminology]]></source>
<year>1986</year>
<volume>19</volume>
<page-range>195-209</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cyert]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[March]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Teoría de las decisiones económicas de la empresa]]></source>
<year>1965</year>
<publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[Herrero]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Darley]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The dynamics of authority influences in organizations and the unintended action consequences]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Darley]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Messick]]></surname>
<given-names><![CDATA[D. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Tyler]]></surname>
<given-names><![CDATA[T. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Social influences on ethical behavior in organizations]]></source>
<year>2001</year>
<page-range>37-52</page-range><publisher-loc><![CDATA[New Jersey ]]></publisher-loc>
<publisher-name><![CDATA[Erlbaum]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Causes of corruption: Towards a contextual theory of corruption]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Graaf]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Public Administration Review]]></source>
<year>2007</year>
<volume>31</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>39-86</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Graaf]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Wagenaar]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Hoenderboom]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Constructing corruption]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Graaf]]></surname>
<given-names><![CDATA[G. de]]></given-names>
</name>
<name>
<surname><![CDATA[Maravic]]></surname>
<given-names><![CDATA[P. von]]></given-names>
</name>
<name>
<surname><![CDATA[Wagener]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[The good cause. Theoretical perspectives on corruption]]></source>
<year>2010</year>
<page-range>98-114</page-range><publisher-loc><![CDATA[Opladen & Famington Hills ]]></publisher-loc>
<publisher-name><![CDATA[Barbara Budrich Pub]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Eagleman]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Incognito. The secrets lives of the brain]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Vintage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[How, when, and why bad apples spoil the barrel: Negative group members and dysfunctional groups]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Felps]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Byington]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Research in Organizational Behavior]]></source>
<year>2006</year>
<volume>27</volume>
<page-range>175-222</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Festinger]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Theory of cognitive dissonance]]></source>
<year>1957</year>
<publisher-loc><![CDATA[Stanford ]]></publisher-loc>
<publisher-name><![CDATA[Stanford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fleming]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Zyglidopoulos]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Charting corporate corruption]]></source>
<year>2009</year>
<publisher-loc><![CDATA[Northampton ]]></publisher-loc>
<publisher-name><![CDATA[Edward Elgar Pub]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Geis]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Meier]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The white-collar offender]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Touch]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Psychology of crime and criminal justice.]]></source>
<year>1979</year>
<publisher-loc><![CDATA[Prospect Heights ]]></publisher-loc>
<publisher-name><![CDATA[Waveland Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Giddens]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[The constitution of society]]></source>
<year>1984</year>
<publisher-loc><![CDATA[Berkeley ]]></publisher-loc>
<publisher-name><![CDATA[University of California Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gigerenzer]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Bounded rationality: The adaptive toolbox]]></source>
<year>2002</year>
<publisher-loc><![CDATA[Cambridge ]]></publisher-loc>
<publisher-name><![CDATA[MIT Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goffman]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Forms of talk. Philadelphia:]]></source>
<year>1981</year>
<publisher-name><![CDATA[University of Pennsylvania Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goffman]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[La presentación de la persona en la vida cotidiana]]></source>
<year>1983</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Amorrortu]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haller]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Shore]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Corruption. Anthropological perspectives]]></source>
<year>2005</year>
<publisher-loc><![CDATA[Londres ]]></publisher-loc>
<publisher-name><![CDATA[Pluto Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kantorowicz]]></surname>
<given-names><![CDATA[E. t.]]></given-names>
</name>
</person-group>
<source><![CDATA[The king&#8217;s two bodies]]></source>
<year>1957</year>
<publisher-loc><![CDATA[Princeton ]]></publisher-loc>
<publisher-name><![CDATA[Princeton University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Bad apples, bad cases, and bad barrels: Metaanalytic evidence about sources of unethical decisions at work]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kish-Gephart]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Harrison]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Treviñ o]]></surname>
<given-names><![CDATA[L. K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Applied Psychology]]></source>
<year>2010</year>
<volume>95</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kunda]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Engineering culture]]></source>
<year>1992</year>
<publisher-loc><![CDATA[Filadelfia ]]></publisher-loc>
<publisher-name><![CDATA[Temple University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lehrer]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[How we decide]]></source>
<year>2009</year>
<publisher-loc><![CDATA[Boston ]]></publisher-loc>
<publisher-name><![CDATA[Mariner Books]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Accounting for the effects of accountability]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lerner]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Tetlock]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Psychological Bulletin]]></source>
<year>1999</year>
<volume>125</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>255-75</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lifton]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Nazi doctors: Medical killing and the psychology of genocide]]></source>
<year>1986</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Basic]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McLean]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Elkind]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[The smartest guys in the room]]></source>
<year>2004</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Portfolio Trade]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Ethical leadership and the psychology of decision making]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Messick]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Bazerman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Sloan Management Review]]></source>
<year>1996</year>
<volume>37</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>9-22</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Milgram]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Obedience to authority]]></source>
<year>2005</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Printer & Martin]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Why a nudge is not enough: A social identity critique of governance by stealth]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mols]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Haslam]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jetten]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Steffens]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[European Journal of Political Research]]></source>
<year>2014</year>
<volume>54</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>81-98</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Corruption and political development: A cost benefit analysis]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nye]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[American Political Science Review]]></source>
<year>1967</year>
<volume>61</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>417-27</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Defining political corruption]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Philp]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Political Studies]]></source>
<year>1997</year>
<volume>45</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>436-62</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Corrupt organizations or organizations of corrupt individuals? Two types of organization-level corruption]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pinto]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Leana]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Pil]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Academy of Management Review]]></source>
<year>2008</year>
<volume>33</volume>
<page-range>685-709</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rest]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Moral development: Advances in research and theory]]></source>
<year>1986</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Praeger]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rose-Ackerman]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Corruption: A study in political economy]]></source>
<year>1978</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Academic Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rose-Ackerman]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Corruption and conflict of interests]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Auby]]></surname>
<given-names><![CDATA[J-B.]]></given-names>
</name>
<name>
<surname><![CDATA[Breen]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Perroud]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Corruption and conflict of interest. A comparative law approach]]></source>
<year>2014</year>
<page-range>3-11</page-range><publisher-loc><![CDATA[Cheltenham ]]></publisher-loc>
<publisher-name><![CDATA[Edward Elgar]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The sociology of secrets and of secrets societies]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Simmel]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[American Journal of Sociology]]></source>
<year>1906</year>
<volume>11</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>441-98</page-range></nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Simon]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Administrative behavior]]></source>
<year>1947</year>
<publisher-loc><![CDATA[Chicago ]]></publisher-loc>
<publisher-name><![CDATA[Chicago University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Simon]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Thompson]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Smithburg]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Public administration]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Transaction Publishers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sissener]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Anthropological perspectives on corruption]]></source>
<year>2001</year>
<numero>5</numero>
<issue>5</issue>
<publisher-loc><![CDATA[Bergen ]]></publisher-loc>
<publisher-name><![CDATA[Chr. Michelsen Institute]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Staub]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[The roots of evil: The origins of genocide and other group violence]]></source>
<year>1989</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Cambridge University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Techniques of neutralization: A theory of delinquency]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sykes]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Matza]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[American Sociological Review]]></source>
<year>1957</year>
<volume>22</volume>
<page-range>664-70</page-range></nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Turse]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Killing everything that moves: The real American war in Vietnam]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Picador]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Van Gennep]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[The rites of passages]]></source>
<year>1960</year>
<publisher-loc><![CDATA[Chicago ]]></publisher-loc>
<publisher-name><![CDATA[Chicago University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Weick]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Making sense of the organization]]></source>
<year>2001</year>
<publisher-loc><![CDATA[Oxford ]]></publisher-loc>
<publisher-name><![CDATA[Blackwell]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zerubavel]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[The elephant in the room. Silence and denial in everyday life]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Oxford ]]></publisher-loc>
<publisher-name><![CDATA[Oxford University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Ethical distance in corrupt firms: How do innocent bystanders become guilty perpetrators?]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zyglidopoulos]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Fleming]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Business Ethics]]></source>
<year>2008</year>
<volume>78</volume>
<numero>172</numero>
<issue>172</issue>
<page-range>265-74</page-range></nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Rationalization, overcompensation and the escalation of corruption in organizations]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zyglidopoulos]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Fleming]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Rothenberg]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Business Ethics]]></source>
<year>2009</year>
<volume>84</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>65-73</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
