首页    期刊浏览 2025年08月26日 星期二
登录注册

文章基本信息

  • 标题:Accounting student perceptions of ethical behavior: insight into future accounting professionals.
  • 作者:Lang, Teresa K. ; Hall, Dianne ; Jones, Rita C.
  • 期刊名称:Academy of Educational Leadership Journal
  • 印刷版ISSN:1095-6328
  • 出版年度:2010
  • 期号:May
  • 语种:English
  • 出版社:The DreamCatchers Group, LLC
  • 摘要:The Public Accounting Reform and Investor Protection Act of 2002, better known as the Sarbanes-Oxley (SOX) Act, was developed in response to corporate scandals such as those involving Enron, Tyco International, and WorldCom. WorldCom's earnings management techniques overstated income by hiding bad debt, understating expenses, and backdating contracts. Tyco International executives sold company stock without proper reporting to the United States Securities and Exchange Commission (SEC), gave unapproved bonuses to buy silence within the organization, and gave themselves interest-free or low interest loans for personal use. Enron executives made false statements to banks and auditors and participated in insider trading, bribery, irregular accounting practices, bank fraud, securities fraud, wire fraud, money laundering, and conspiracy. These three scandals ended in bankruptcy and caused significant financial loss to employees and investors.
  • 关键词:Accounting;Bribery;Business ethics;Business schools;College students;Computer crimes;Corporate corruption;Corporations;Software piracy

Accounting student perceptions of ethical behavior: insight into future accounting professionals.


Lang, Teresa K. ; Hall, Dianne ; Jones, Rita C. 等


INTRODUCTION

The Public Accounting Reform and Investor Protection Act of 2002, better known as the Sarbanes-Oxley (SOX) Act, was developed in response to corporate scandals such as those involving Enron, Tyco International, and WorldCom. WorldCom's earnings management techniques overstated income by hiding bad debt, understating expenses, and backdating contracts. Tyco International executives sold company stock without proper reporting to the United States Securities and Exchange Commission (SEC), gave unapproved bonuses to buy silence within the organization, and gave themselves interest-free or low interest loans for personal use. Enron executives made false statements to banks and auditors and participated in insider trading, bribery, irregular accounting practices, bank fraud, securities fraud, wire fraud, money laundering, and conspiracy. These three scandals ended in bankruptcy and caused significant financial loss to employees and investors.

The United States Congress responded to the scandals by passing SOX, which has effectively changed the business environment in which both accountants and business managers operate. The Sarbanes-Oxley Act attempts to regulate and reinforce ethical behavior within companies in the United States. Corporate chief executive officers and chief financial officers must attest to the accuracy of the company's financial statements. Corporations cannot make personal loans to executives or directors, and top-level management must attest that the company has effective internal controls in place to prevent or detect misstatements and improprieties.

Section 404 of the Sarbanes-Oxley Act (H.R. 3763) requires that an organization's external auditor assess the internal controls and issue an opinion on the management's report regarding internal controls over financial reporting. The 1992 report of the Committee of Sponsoring Organizations of the Treadway Commission (Committee of Sponsoring Organizations of the Treadway Commission, 1994), The Internal Control- Integrated Framework, is the standard used by auditors and managers to evaluate controls. The report outlines the key components of a good internal control structure. The first component is the organization's control environment. The framework outlines that the control environment sets the tone of an organization and influences the control consciousness of its people. The control environment includes the integrity, ethical values and competencies of the entity's people, management's philosophy and operating style, the process used by management to assign authority and responsibility and to organize and develop its people; and the attention and direction provided by the board of directors. An ethical corporate governance system requires an ethical, underlying internal control structure.

External auditors and managers are expected to evaluate whether an organization sufficiently incorporates ethics into the control environment. If they recognize an action is unethical but at the same time perceive the action is commonly accepted or less unethical than another, couldn't this affect the evaluation of risk? This study is part of an ongoing effort to identify factors that influence future managers' and accountants' opinions relating to what is ethically acceptable and unacceptable. This study extends prior research by using a continuous scale instead of the typical dichotomous scale (Kreie & Cronan, 1998; McMahon & Harvey, 2005). The degree to which participants believe the situation is ethical/acceptable or unethical/unacceptable is revealed. The results provide supervisors and academics insight into the ethical perception of future professionals.

MANDATED BUSINESS ETHICS

The need to influence ethical behavior in the business community is not new. Questionable corporate political campaign finance practices and corrupt foreign practices in the 1970s prompted the SEC and the United States Congress to enact campaign finance law reforms. The 1977 Foreign Corrupt Practices Act (FCPA) made it illegal to extend bribes to foreign government officials in order to obtain or retain business within that country, and required evidence of compliance from organizations doing business abroad. In response, a private-sector initiative, the National Commission on Fraudulent Financial Reporting (commonly known as the Treadway Commission), was formed in October 1985. The Treadway Commission issued its initial report in 1987, and among other items, recommended that the organizations sponsoring the Commission work together to develop integrated guidance on internal control.

As a result of this initial report, the Committee of Sponsoring Organizations (COSO) was formed and retained Coopers & Lybrand, a major CPA firm, to study the issues and author a report regarding an integrated framework of internal control. The report titled "Internal Control Integrated Framework" was issued in 1992 and re-published with minor amendments in 1994. This report presented a common definition of internal control and provides a framework against which internal control systems can be assessed and improved. This report is the standard that U.S. companies use to evaluate compliance with FCPA (1998) and SOX. In 1998, the FCPA was updated; one of the changes was to include employees or officers of public international organizations, including, among others, the Red Cross and the World Health Organization. As a result, many organizations were forced to revisit their compliance policies. SOX further necessitated reviews of ethical behavior in organizations.

SOX outlines the need for internal controls and calls for both financial and criminal penalties for unethical behavior specific to financial reporting. Section 404 requires that companies "provide reasonable assurance regarding prevention or timely detection of unauthorized acquisition, use, or disposition of (its) assets that could have a material effect on the financial statements" (Securities and Exchange Commission, 2003, p. 11). Section 409 requires all data about financial changes be brought forth and disclosed rapidly and currently. This may include anything that affects the company's financial situation such as stock price and intellectual property. Some issues that may fall into this reportable area include virus attacks, large systems outages, important data loss, and security violations (Cunningham, 2005). Section 802 requires that companies maintain records relating to audits and reviews for five years. The maintenance of this and similar information increases storage requirements and further increases the risk of unintentional information leaks, thus requiring more diligence on the part of the organization along with a focus on appropriately secure technology. Table 1 summarizes some the technology related requirements of the Sarbanes-Oxley Act (Pasley, 2006).

A study conducted by Oracle indicated that 42% of the information technology professionals surveyed did not believe their company could adequately protect their information. In addition, 45% of those surveyed did not think their company could appropriately notify their customers in the event of a breach. These professionals cited a need for automated audit and security controls to combat privacy and security risks (Oracle, 2007). Clearly, the intent of SOX and the reality facing most organizations differs, underscoring the need for adequate risk assessment during audits.

The post SOX financial audit requires that auditors expand their concept of risk to include technology issues, and perhaps evaluate their own perceptions of risk related to technology. Prior research indicates that individuals do not regard digital piracy as important or unethical (Al-Rafeem & Cronan, 2006; Im & Van Epps, 1991; Reid & Thompson, 1992). Auditors and managers must identify and evaluate the risks affecting an organization in order to understand, implement, and test the controls operating in the organization in order to provide reasonable assurance that transactions are properly recorded, assets protected, and SOX requirements are met. If individuals do not regard data piracy as important or unethical, they may not assign an appropriate level of risk to technology issues when implementing and evaluating controls.

BUSINESS ETHICS AMONG ACCOUNTING STUDENTS

New accounting graduates have a foundation in business, accounting, and auditing. The context of SOX has been taught; some schools offer classes in business ethics. However, few studies exist to indicate how the average accounting student views ethics in a business environment. Extant studies generally use a dichotomous (ethical, not ethical) scale (Kreie & Cronan, 1998; McMahon & Harvey, 2005). Our study uses a continuous scale to investigate the degree to which business students perceive the unethical/unacceptability of technology scenarios versus a typical unacceptable accounting scenario. This measure may better indicate the level of risk young professionals would assign when evaluating control systems, and provide managers and academics insight for practical application.

This study was conducted in sophomore level core accounting classes at a large southeastern university. There were 174 respondents; 53% were female. Two respondents were freshman, 94 were sophomores, 44 juniors, 27 seniors, and seven did not complete the question. A total of 159 participants were between 19 and 23, seven were 24-30, one was 36-40, and seven did not complete the question. Participants were awarded ten bonus points for completing the survey. Those that did not wish to complete the survey were offered extra homework to earn ten bonus points. Approximately 20% of the students chose this option, for a response rate of 80%.

The survey included three scenarios, two current IT related scenarios, and one accounting related scenario. Scenario one relates to inappropriate use and potential damage of employer resources. Scenario two relates to data privacy, and scenario three relates to earnings management. The scenarios and questions were amended to represent issues common to general business and accounting disciplines from the scenarios used in a previous study using students in computing classes (Leonard & Cronan, 2005) and are shown below

Scenario 1: "While surfing the web at work, and employee unknowingly downloads a file containing a virus. The person opens the file and a message appears informing the person that the virus has been released on the computer. The computer is connected to the company network and is shared by several users. The computer appears to be operating normally, and when rebooted shows no sign of trouble. The person tells no one about the virus."

Scenario 2: "A fellow employee asks the database administrator working for a large health care organization to give them a copy of the data stored on the database. The information stored in the database comes from a questionnaire filled out on the company website. In exchange for completing the questionnaire (containing specific questions about prescription use and medical conditions), visitors to the website are provided access to a medical encyclopedia and drug interaction program. The database administrator copies the information and gives it to the employee."

Scenario 3: "A manager at a large, international corporation is reviewing the monthly financial reports. The manager finds that his division will fall short of his projected net income by $20,000. The manager was promised a bonus if the net income projection was met. He remembers he increased the estimated loss on accounts receivable for the month by $24,000 (an acceptable accounting practice). This resulted in a decrease in net income for the month of $24,000. He contacts the accounting department and tells them he overestimated the loss by $20,000. Since the estimate is based on the manager's calculation, accounting makes the change; the manager receives the bonus, and next month the manager increases the estimated loss back to $24,000."

Participants were asked whether they believed the behavior described in each scenario was ethical/acceptable or not ethical/not acceptable. The question was repeated several times asking the participants to put themselves in the position of the employee, the supervisor of the employee, or the friend of the employee. The participants were also asked their opinion when there would be consequences if the behaviors were reported.

ANOVAs were completed using scenarios as the factor and ethics/acceptability on the continuous scale as the response variable. The scale is zero (acceptable) to thirteen (unacceptable). There is a significant difference between the scenarios (Table 2).

Scenario two relates to data privacy. Participants felt less strongly about the unacceptability of sharing private data than about the release of a virus on the employer's computer system or about earnings management. This held true for questions one through three. Question one refers to a theoretical employee's behavior. Question two indicates the participant is the employee, and question three indicates the participant is the supervisor in-charge of the employee. The lower mean indicates participants believed less strongly that the behavior was unacceptable in scenario two than scenario one or three.

Questions three and four ask the respondent the acceptability of the behavior from the perspective of being the supervisor or the friend of the employee. Again the data sharing is perceived as less unacceptable than the other two scenarios. Question 5 indicates that the individual would be caught. Only in this instance is data piracy more unacceptable than virus reporting.

Pairwise comparisons confirmed the differences between scenario 2 and the other two scenarios (Table 3). All results were confirmed using non-parametric measures.

DISCUSSION

Question one for each scenario describes the situation and asks the respondent in general whether the behavior is acceptable or not. Respondents rated scenario one, not reporting the introduction of a virus to the employer's computer network, and scenario three, changing an accounting estimate for personal gain, similarly with means of 9.7--9.9. The higher the mean, the more unacceptable the respondent perceives the behavior. However, scenario two, the database administrator providing private data to an employee, averaged 7.7. Respondents viewed scenario two as less unacceptable than the other two scenarios. The pairwise comparison indicates there is a statistically significant difference between scenario two and the other two scenarios, but not between scenarios one and three. Clearly, as a general behavior, data piracy is less important to accounting students than reporting a virus or changing estimates. Given that data piracy is a major issue both from a government mandate perspective and a consumer trust perspective, this finding is worrisome. Is this a general attitude for accounting students in particular, and potentially the generation about to enter the workforce? Do individuals at this stage simply have less concern because they have fewer items about which to worry (e. g., retirement accounts, credit history)? More investigation into these results may shed light on the foundations that facilitated these responses.

Question two asks the participant to respond assuming the participant is the employee, administrator, or manager performing the behavior. Scenario two is again scored as less unacceptable/unethical than the other two scenarios. Interestingly, the virus and data infractions are scored even more unacceptable than when considered as general behavior, while the accounting change is scored slightly less unacceptable. Although statistically insignificant, these differences are interesting. It would appear that students perceive data piracy and non-report of a virus more troublesome when they take ownership of the scenario, but changing an estimate less so. Nonetheless, data piracy was still statistically less important than either of the other scenarios. There were no significant differences between scenario one, not reporting the computer virus and scenario three, manipulating the accounting information.

Question three puts the participant in the position of supervisor. Scenario two is again scored less unacceptable/unethical than the other two scenarios. All three scenarios are scored more unacceptable/unethical for this question than questions one and two, perhaps indicating that students place a higher ethical standard on supervisors than supervisees. Although not statistically significant, this is an interesting finding. Would this general assertion (that supervisors should be held to a higher standard) be found in a general population? How would this change if working individuals were surveyed? Would there be a difference between supervisors and supervisees in their assumptions of unethical behavior?

Participants' responses to questions one through three all indicate that participants perceive the data privacy scenario differently than the virus or earnings management scenarios. Managers dealing with young professionals should take this possible bias into consideration when establishing controls and may want to reinforce the importance of data privacy and other technology related risks during training. Academics training future professionals should include technology ethical issues when addressing ethics in the classroom.

Question four puts the participant in the position of a friend and advisor to the person involved in the scenario. More participants would advise a friend to report the virus infection than would advise a friend not to copy the data or not to make the accounting change. This is the first question in which the data piracy scenario is not different from the others. There was no significant difference between the data privacy issue and the accounting manipulation, although the emphasis on an accounting change dropped from its position in question three. These results make us wonder why virus reporting is emphasized over data piracy or accounting changes when the participant takes on an advisory role. Is this because reporting a virus is largely non-consequential? The scenario does not state whether the original action (web surfing) was not permitted at the workplace. Assuming that the employee was surfing during a break, contracting a virus is less of a direct ethical issue than either data piracy or accounting changes. Therefore, suggesting that not reporting the virus has, apparently, fewer consequences. The participant's role as advisor allows him or her to maintain an ethical standard without causing issue for his or her friend. It is also important to note, that while participants more strongly recommended virus reporting than either preventing data piracy or accounting changes, the mean of the responses is still in excess of the midpoint, thus more respondents would recommend an ethical behavior.

Question five directly introduces consequences into the scenarios. If a reprimand would result, the mean is lower for reporting the virus than for choosing not to copy the data or not to change the accounting estimate. Clearly, the consequences of the action have a bearing on a participant's choice. The issue of data piracy being unethical is relatively low (mean = 7.683) whereas, once consequences are added, the mean jumps to 10.60 for the other two scenarios. For both data piracy and accounting changes, this question results in the highest level of perception of unethical behavior. Virus reporting, on the other hand, is perceived as the least unethical of all the questions. These results are different from those of question four where the participant is advising a friend. It appears that, when reprimands are included, participants are more worried about avoiding reprimands (e.g., for data piracy) than for virus reporting.

Consequences seem to provide the most extreme responses for scenarios two and three. Managers should note that introducing consequences seems to have a varied affect on the intensity of the participants' responses. Specifically outlining consequences for undesirable actions may decrease the likelihood of young professionals engaging in certain activities, while providing an anonymous method to report similar activities may offer another way to decrease the risk related to these situations.

This survey was initially developed and used in ethics research in systems classes. Earlier studies of ethics found differences in ethical decisions between gender (Kreie & Cronan, 1998). Therefore, gender differences were analyzed. T-tests reveal a significant difference between means for males and females relative to virus reporting. Males averaged 10.49, while females mean was 9.06 (df = 156, p=.000). Therefore, males found not reporting the virus more unacceptable than females. Although the gap is closing, this finding may be explained by the gender gap that exists in technology (Bhattacharjee & Shaw, 2001). Overall, there are more men in the technical field; these individuals are more likely to understand the true impact of a virus. Therefore, they see failure to report a problem as being more troublesome. However, men were less likely to encourage a friend to report a virus (men=9.86; women=10.61, p=.05) than women. While this seems contrary on the surface, it may simply have to do with women being more collaborative and social, thus engaging in advise giving, whereas men are more solitary and hands-off, therefore less likely to engage in a casual advisory role (Brody, 1997; Carli & Eagly, 1999). No differences were detected for scenarios two and three.

CONCLUSION

In general, the participants in this study did not treat the scenarios the same, although most government and corporate mandates view ethical violations equally. While it would be true that the consequences may vary, each of these scenarios are in direct violation of ethical guidelines for technology use and financial reporting. It may be that organizations and business schools should focus on eliminating unethical behavior of any kind, rather than focus on the level of consequences attached thereto. FCPA, SOX, and other acts developed by the federal government are attempts to dictate acceptable, ethical business behavior. States have attempted to address the need for ethical behavior in the accounting industry by requiring certified public accountants pass ethics exams before renewing their licenses (Burke & D'Aquila, 2004). Accounting is not alone in this endeavor, but it is the industry that draws focus from the two acts discussed here.

This study extends our understanding of the relative degree to which accounting students interpret ethical and unethical behavior by using a continuous rather than dichotomous scale. This provides a better indication of the beliefs of the individuals involved and may provide better insight

into what their behavior might be given different situations. Management and auditors can also use this information to better design, implement, and evaluate the control environment in business today. The better our understanding of ethical behavior of students and employees, the better we can train future professionals to engage in ethical behavior and compliance.

REFERENCES

Al-Rafeem, S., & Cronan, T. P. (2006). Digital Piracy: Factors that Influence Attitude Toward Behavior. Journal of Business Ethics, 63, 237-259.

Bhattacharjee, S., & Shaw, L. (2001). Evidence that Independent Research Projects Improve Accounting Students' Technology-related Perceptions and Skills. Accounting Education, 10(1), 83-103.

Brody, L. R. (1997). Gender and Emotion: Beyond Stereotypes. Journal of Social Issues, 53(2), 369-394.

Burke, J. A., & D'Aquila, J. (2004). A Crucial Test for New CPAs. The CPA Journal, 74(1), 58.

Carli, L. L., & Eagly, A. H. (1999). Gender Effects of Social Influence and Emergent Leadership. In G. Powell (Ed.), Handbook of Gender and Work (pp. 203-280). Thousand Oaks, CA: Sage.

Casabona, P., & Yu, S. (1998). Computer Fraud: Financial and Ethical Implications. Review of Business, 20(1), 22.

Committee of Sponsoring Organizations of the Treadway Commission. (1994). Internal Control--Integrated Frameworks (2. Vols). New York, NY: American Institute of Certified Public Accountants.

Cunningham, M. (2005). Meeting Sabanes-Oxley Section 409 Requirements. Retrieved April 4, 2008, from www.sox.com/feature/detail.cfm?articleID=1067

Im, J., & Van Epps, P. (1991). Software Piracy and Software Security in Business Schools: An Ethical Perspective. The DATABASE for Advances in Information Systems, Summer, 15-21.

Kreie, J., & Cronan, T. P. (1998). How Men and Women View Ethics. Communications of the ACM, 41(9), 70-76.

Leonard, L. N. K., & Cronan, T. P. (2005). Attitude toward ethical behavior in computer use: A shifting model. Industrial Management & Data Systems, 105(9), 1150-1171.

McMahon, J. M., & Harvey, R. J. (2005). Psychometric Properties of the Reidenback-Robin (1990) Multidimensional Ethics Scale (MES). Paper presented at the Society for Industrial and Organizational Psychology, Los Angeles, CA.

Oracle. (2007). What Worries IT & Compliance Practioners Most about Privacy and Data Security? : Ponemon Institute LLC.

Pasley, K. (2006). Sarbanes-Oxley (SOX)--Impact on Security in Software. Retrieved July 23, 2008, from www.developer.com/security/article.php/3320861

Reid, R., & Thompson, J. (1992). Knowledge and Attitudes of Management Students Toward Software Piracy. Journal of Computer Information Systems, 33, 46-51.

Securities and Exchange Commission (2003). Final Rule: Management's Report on Internal Control Over Financial Reporting and Certification of Disclosure in Exchange Act Periodic Reports. Retrieved July 24, 2008, from http://www.sec.gov/rules/final/33-8238.htm

Teresa K. Lang, Columbus State University Dianne Hall, Auburn University Rita C. Jones, Columbus State University
Table 1: Some Technology-related Requirements of the Sarbanes-Oxley Act

       Statute                 Summary                 Threat

Section 302--           Requires executives     Unauthorized
Corporate               to certify the          modification of data;
Responsibility for      accuracy of corporate   data fraud.
Financial Reports       financial reports.

Section 404--           Requires executives     Unauthorized access
Management Assessment   and auditors to         to data, data
of Internal Controls    confirm the             deletion.
                        effectiveness of
                        internal controls for
                        financial reporting.

Section 409--Real       Requires any material   Non-availability of
Time Issuers            changes to financial    data, data
Disclosures             state of issuer be      recoverability
                        communicated quickly    issues, backup, and
                        and with supporting     restore.
                        data to public.

Table 2: ANOVA Analysis Results

Scenario 1                      Mean

1. The employee did not        9.905
report the virus.

2. If I were the               10.112
employee, not reporting
the virus would be

3. If I were the               10.208
supervisor, I would find
the employee's behavior:

4. As a friend of the          10.283
employee, I would advise
my friend to:
0 not report the virus;
13.2 report the virus.

5. If the employee knew        9.423
that, if discovered, he
(she) would be
reprimanded, he(she)
should:

Scenario 2                      Mean

1. The administrator           7.683
providing the employee a
copy of the information.

2. If I were the               8.182
administrator, copying the
information would be

3. If I were the supervisor,   8.504
I would find the
administrator's behavior

4. As a friend of the          8.736
administrator, I would
advise my friend to: 0 copy
the information; 13.2 not
copy the information

5. If the administrator        10.61
knew that, if discovered,
he(she) would be
reprimanded, he(she)
should

Scenario 3                      Mean    df   P-value

1. The manager                 9.709    2     .000
changing the
estimate.

2. If I were the               9.598    2     .000
manager, changing
the estimate would
be:

3. If I were the               10.298   2     .000
supervisor, I would
find the manager's
behavior:

4. As a friend of the          9.482    2     .000
manager, I would
advise my friend to:
0 change the
estimate; 13.2 not
change the estimate

5. If the manager              10.56    2     .000
knew that, if
discovered, he (she)
would be
reprimanded,
he(she) should

Table 3: Pairwise Comparisons

Question   Scenario   Scenario   Significance      Second Comparison

   1          2       1 and 3        .000        1 to 3 not significant
   2          2       1 and 3        .000        1 to 3 not significant
   3          2       1 and 3        .000        1 to 3 not significant
   4          1       2 and 3    .000 and .028   2 to 3 not significant
   5          1       2 and 3    .000 and .001   2 to 3 not significant
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有