2023
DOI: 10.1108/arj-07-2022-0160
|View full text |Cite
|
Sign up to set email alerts
|

A gendered discourse on truthful disclosure of financial fraud practices among accountants in China: implications to corporate governance

Abstract: Purpose With the worsening of corporate fraud and consequential loss, the growing importance of truthful disclosure is globally advocated. This study aims to examine corporate governance’s role in accountants’ intention to disclose fraudulent practices honestly. At the same time, this study examines intergender differences concerning the formation of the disclosure intention. Design/methodology/approach Based on the theory of planned behavior (TPB), data from 256 accountants working in China have been collec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 82 publications
(145 reference statements)
0
1
0
Order By: Relevance
“…Multiple theories, including the theory of planned behaviour (TPB), rational choice theory (RCT), general deterrence theory (GDT), technology threat avoidance theory (TTAT), routine activity (RAT), and protection motivation theory (PMT), have been employed by information security researchers. For instance, Fansher and Randa used (RAT) [19], Kirwan et al, [20] also used RAT, Rogers and Prentice-Dunn used PMT [21], Chen and Liang used TTAT [22], Tan et al [23] used TPB, and last but not least Martens et al [17] also using PMT to explain the reasons behind people's protective behaviours and intentions. These hypotheses are grounded in various disciplines, including computer science, criminology, business, and psychology.…”
Section: A Underpinnings Theorymentioning
confidence: 99%
“…Multiple theories, including the theory of planned behaviour (TPB), rational choice theory (RCT), general deterrence theory (GDT), technology threat avoidance theory (TTAT), routine activity (RAT), and protection motivation theory (PMT), have been employed by information security researchers. For instance, Fansher and Randa used (RAT) [19], Kirwan et al, [20] also used RAT, Rogers and Prentice-Dunn used PMT [21], Chen and Liang used TTAT [22], Tan et al [23] used TPB, and last but not least Martens et al [17] also using PMT to explain the reasons behind people's protective behaviours and intentions. These hypotheses are grounded in various disciplines, including computer science, criminology, business, and psychology.…”
Section: A Underpinnings Theorymentioning
confidence: 99%
“…Furthermore, Ahmad et al (2023) emphasizes that employees’ attitudes toward organizational politics are closely linked to their personal values and cultural backgrounds. For instance, some employees may strongly disapprove of practices such as bribery, deception, or unethical competition, while others may perceive these behaviors as normal ( Scharding and Warren, 2023 ; Tan et al, 2023 ). If employees strongly believe in fairness and justice, they are likely to hold a negative view of organizational politics, reflecting the influence of their personal values ( Kaur and Kang, 2023 ).…”
Section: Introductionmentioning
confidence: 99%