Skip to main content

The Coercer

The Coercer influences, manipulates or bribes another person to act in a desired way to dishonestly gain personal benefits.

This might involve negative incentives such as threats or intimidation, or positive incentives such as favour or monetary kickbacks.

Examples:

  • A criminal organisation threatens public officials to win government contracts.
  • An individual intimidates another person to make them hand over personal or banking information to commit fraud.

Case studies

Following receipt of more than 40 complaints to the Office for Public Integrity about the conduct of authorised South Australian driving examiners, an investigation was launched by the Independent Commissioner Against Corruption (ICAC) into the conduct of examiners.

Countermeasures

Counter the Coercer using measures that support probity, information security, oversight and deterrence:

Limit and control functionality within systems with user permissions. Assign permissions to users based on specific business needs, such as making high-risk functions limited to specialised users. The Protective Security Policy Framework sets out the government protective security policies that support this countermeasure.

Separate duties by allocating tasks and associated privileges for a business process to multiple staff. This is very important in areas such as payroll, finance, procurement, contract management and human resources. Systems help to enforce the strong separation of duties. This is also known as segregation of duties.

Internal or external audits or reviews evaluate the process, purpose and outcome of activities. Clients, public officials or contractors can take advantage of weaknesses in government programs and systems to commit fraud, act corruptly, and avoid exposure.

Was this page helpful?