Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

Finance and Management
Reference:

Forms of internal opportunism and its impact on the company's activities

Yuzhakova Ninel Aleksandrovna

ORCID: 0009-0005-0711-8962

Postgraduate student; Faculty of Public Administration; Lomonosov Moscow State University

140016, Russia, Moscow region, Lyubertsy, md. Zenino Residential complex Airplane, 46 Helicopter street

uzhakova.n@mail.ru

DOI:

10.25136/2409-7802.2025.2.73988

EDN:

IGCEQB

Received:

06-04-2025


Published:

05-05-2025


Abstract: Subject of the study: forms of internal opportunism of personnel in the company. Objective of the study: analysis of forms of manifestation of opportunistic behavior of personnel in the company and determination of its influence. In order to achieve the objective of the study, the following tasks were identified: 1. It is necessary to form a classification of manifestations of forms of opportunistic behavior (by contract process, type of information asymmetry, attitude to the object of analysis, degree of intensity of manifestation, degree of openness). 2. Determine the influence of various types of opportunistic behavior on activities within the company; 3. Research forms of opportunistic behavior in relation to the object of analysis (endogenous and ectogenous manifestation of opportunistic behavior of employee and employer). 4. Form recommendations for preventing and minimizing the consequences of opportunistic behavior of personnel in the company. The research methods are generalization of the theoretical and practical base of forms of manifestation of internal opportunistic behavior that affect the company's activities, analysis of domestic and foreign literature, as well as the use of data on organizations from Internet sources. The scientific novelty lies in creating a more complete and detailed classification of forms of opportunistic behavior based on the analyzed literary sources. The article analyzes the forms of opportunistic behavior of personnel. Cases of intra-company opportunism and corporate fraud are considered and the consequences of such behavior for the company are determined. For example, the Yandex security service identified an internal data leak of about 5 thousand users in 2021. An investigation was conducted into this fact, and it turned out that one of the company's employees provided the information to the public. And in 2022, the Yandex.Food service was also subject to a leak of customer information and a class action lawsuit was filed against the company, which caused the company reputational risks. Opportunistic behavior has a significant impact on the activities of companies. Intra-company opportunism and fraudulent actions by personnel threaten the company's activities. At the moment, there are statistics all over the world where cybercrimes, which can cause great damage, occupy the first place. Pre-contract and post-contract opportunism are characterized by different forms of intra-firm opportunism, but both before and after the conclusion of a contract, the company must bear certain costs in order to control and successfully regulate the manifestations of opportunism in the company.


Keywords:

opportunistic behavior, internal opportunism, corporate fraud, forms of opportunism, information asymmetry, ex-ante opportunism, post-ante opportunism, opportunism, fraud, costs of opportunism

This article is automatically translated.

1. Introduction

Opportunism can manifest itself in various forms, depending on the conditions and reasons that influenced its formation. So, it is important to know how the object of analysis correlates with the environment, with the norms of legislation, the form and time of its manifestation [1].

According to the norms of legislation, opportunism can be legal and illegal. The fact that opportunism can be legitimate was suggested by O. Williamson in 1991 [2]. Its essence lies in the fact that one party, in case of violation of the contract, has the legal right to file a lawsuit for damages, while knowing that the counterparty will suffer enormous damage if the decision is not in his favor. Legitimate opportunism, on the one hand, does not carry anything negative, since everything happens within the framework of the law of a particular state. But if we consider the situation from the perspective of the scale of damage that can be inflicted on the counterparty after the claim and the damage caused by the breach of contract, it may turn out that these are completely incommensurable amounts, and the issue could be resolved by peaceful methods [3].

The relevance of the study lies in the fact that in the modern world, cases of various forms of opportunistic behavior in companies are increasingly occurring, which it is not customary to talk about in order not to undermine the reputation of the company. Annual studies of consulting companies show a continuous increase in the manifestation of opportunism in the workplace, which leads to financial losses, harms the company's image, and exacerbates the moral situation in the team. In order for companies to effectively use preventive measures to counteract the opportunistic behavior of staff, it is necessary to understand the forms in which such behavior can manifest itself.

The purpose of the study: to analyze the forms of manifestation of opportunistic behavior of personnel in the company and determine its impact on the company's activities.

Research objectives:

  1. to form a classification of forms of opportunistic behavior;
  2. to determine the impact of various types of opportunistic behavior on activities within the company;
  3. to investigate the forms of opportunistic behavior in relation to the object of analysis;
  4. to formulate recommendations on preventing and minimizing the consequences of opportunistic personnel behavior.

The subject of the research is the forms of suppression of the opportunistic behavior of staff in the company.

The object of the study is the influence of forms of opportunistic behavior on the company's activities.

Hypothesis: the manifestation of opportunistic behavior in various forms negatively affects the company's activities.

Methodology: generalization of the theoretical and practical base of forms of internal opportunistic behavior affecting the company's activities, processing and generalization of analytical materials from professional associations, analysis of cases (practices) of the manifestation of opportunistic behavior of personnel in organizations.

Source materials: works of domestic and foreign scientists and practitioners, analytical materials of professional associations, practices of opportunistic behavior of personnel in organizations.

2. Classification of forms of opportunistic behavior of personnel in the company

Everything that is outside the legal field, as well as violates the current legislation of the country, regulations and local regulations, refers to illegal opportunism.

According to the form of manifestation, opportunism is divided into active and passive [4]. Active implies a purposeful manifestation of the opportunistic behavior of the parties in order to renegotiate the contract, create an artificial environment for profit [5]. Passive, in turn, manifests itself in the form of avoidance of the basic obligations of fulfilling the contract [6].

According to the time of manifestation, there are ex ante (opportunistic behavior before the conclusion of the contract) and ex post (opportunistic behavior after the conclusion of the contract) opportunistic behavior [7].

According to the correlation of the object with the internal or external environment, opportunism can be endogenous (intra-company) and exogenous [8]. Internal opportunism usually appears as a result of the activities of employees, and external opportunism occurs in interaction with counterparties, that is, from external forces.

In order to determine the impact of intra-company opportunism on the company's activities, it is necessary to make a more detailed classification of the remaining forms of its manifestation.

Table 1. Classification of forms of opportunistic behavior.

Basis for classification

Forms of manifestation of opportunistic behavior

The contract process

Pre-contract

Post-contract

The type of information asymmetry

Hidden characteristics

Hidden actions and hidden information

Hidden intentions

Relation to the object of analysis

Internal (endogenous)

External (exogenous)

The degree of intensity of manifestation

Rude

Strategic

Natural

The degree of openness

Open

Hidden

Source: compiled by the author

In relation to the contractual process, there are two forms of opportunistic behavior: ex ante (pre-contractual) opportunism and post ante (post-contractual) opportunism. The difference lies in the time of its manifestation. In the first case, opportunism manifests itself before the conclusion of the contract. The purpose of pre-contractual opportunism is to conceal information about the workplace from the employer and to misinform or conceal the true reasons for the purpose of staying at the workplace from the employee. The goal of post-contractual opportunism is to maximize benefits (tangible and intangible). both for the employer and the company as a whole, and for the individual employee [9]. Every form of opportunistic behavior has a negative impact on the company's operations. Therefore, it is important for counterparties to develop the right ways to combat opportunistic behavior within the firm, depending on the forms of opportunism.

The most detailed post-contract and pre-contract opportunism is considered in the article by E.V. Popov and E.V. Ershov [10]. Based on the data provided by the authors, table 2 was compiled.

Table 2. Manifestation of certain forms of opportunistic behavior in the workplace

Forms of opportunism

Manifestations

Ex ante employer's opportunism

1) imposing a probation period on a candidate with deliberate subsequent dismissal;
2) conscious concealment of the negative aspects of work.

Post ante employer's opportunism

1) unpaid overtime work;
2) expression of personal sympathies in the distribution of jobs, remuneration based on work results, positions (patronage, nepotism);
3) failure to provide employees with benefits and compensations provided for by law;
4) assignment of duties beyond the scope of the employment contract;
5) wage manipulation.

Ex ante worker's opportunism

1) misinformation of the employer (overestimation of the hired employee's real abilities, skills, and knowledge during employment);
2) industrial espionage;
3) concealment by the hired employee of his plans about the true goals and duration of his stay at the new workplace.

Post ante employee opportunism

1) shirking;
2) carelessness in work;
3) undercover games";
4) fraud;
5) extortion;
6) theft.

A source: compiled by the author on the basis of Popov E.V., Ershov E.V. Opportunism in industrial enterprises // Manager. 2015. №2 (54).

For example, the deliberate concealment of the negative aspects of work by the employer, unpaid overtime, assignment of duties beyond the scope of the employment contract, and wage manipulation. At a minimum, they can lead to the loss of valuable employees and a decrease in the company's reputation. If the rights of an employee are violated within the framework of labor legislation, then he has every right to challenge the actions of the employer in court. If an employee shows such forms of opportunism as shirking and negligence, the quality of work deteriorates, therefore, consumers of the goods or services that the company produces will switch to competitors, and the company will suffer damage. Fraud on the part of the employee can lead to serious consequences. Most often it occurs with some documents and has a delayed effect. Theft on a small scale can lead to a deterioration in relations within the workforce, as employees will begin to suspect each other of this crime, which will affect productivity. Theft on a particularly large scale in itself causes great damage to the company, as its resources suffer.

According to the ACFE 2024 global report, the average damage from one identified case of corporate fraud amounted to 1.5 million US dollars, an increase of 24% compared to the previous year. At the same time, companies lose 5% of their annual income on average due to such offenses. More than 43% of all cases were detected through anonymous messages, which makes this channel the most effective way to detect opportunistic behavior [11].

According to a report by the U.S. Federal Bureau of Investigation, global cybercrime losses exceeded $16 billion in 2024, up 33% from the previous year. The main reasons for the growth were investment scams and phishing attacks, as a result of which employees were deceived and funds were transferred to the accounts of intruders [12].

The PwC Global Economic Crime Survey 2024 report notes that 46% of organizations worldwide have experienced economic crimes in the past two years. Cybercrime (31%), abuse of office (28%), and corruption (25%) are among the most common forms of fraud [13].

The EY Global Integrity Report 2024 indicates that 49% of respondents believe that compliance with corporate ethics standards has improved over the past two years, but corporate violations continue to grow, indicating a growing gap between stated values and actual behavior [14].

According to the degree of intensity of its manifestation, intra-company opportunism can be crude, strategic and natural. Gross opportunism implies a deliberate violation of the terms of a contract in order to achieve one's interests. In other words, the counterparty initially knows that his actions will harm the company, but at the same time he will receive his benefits [15]. The interests of the counterparties in this case do not coincide, and everyone acts based on obtaining their possible benefits. Strategic opportunism is the use of information asymmetry in order to conceal data from one side from the other. In any case, this form of opportunism also proceeds from personal gain, but within the framework of information distribution [16]. At the same time, it is very difficult to compare the damage caused by gross opportunism and strategic, since withholding information can lead to large losses for the company.

Opportunism can be hidden and open. Hidden opportunism is quite difficult to identify due to insufficient resources and information, so such actions by employees can cause more damage to the company. The ability to identify open opportunism is higher, so the speed of response and application of measures to eliminate consequences is also higher.

According to O. Williamson, opportunism refers to deliberate attempts to mislead, distort, disagree, or confuse someone within the firm. Opportunistic behavior can be classified as objective or perceived. Objective opportunism deviates from certain behavioral rules in an intra-company contract. The perceived opportunism deviates from the rules not taken into account by the contract, but established directly by the firm [17].

Returning to the issue of intra-company opportunism, it should be noted that, considering pre-contract and post-contract opportunism, some authors define them from two sides: both exogenous (aimed at external contractors) and endogenous (intra-company). The results of the analysis of the two forms of data are presented in Table 3.

Table 3. Forms of opportunistic behavior in relation to the object of analysis

Exogenous

Endogenous

Ex ante opportunism

1) providing false information about the terms of the contract;
2) corruption and extortion on the part of the customer;
3) bribery of agents in contractual procedures;
4) hostile takeover, raiding, and greenmail.

1) overestimation by economic agents (in most cases by employees) of real skills when concluding an employment contract;

2) lack of attention during the preparation of the contract.

Post ante opportunism

1) bribery of agents;
2) an offer to change the terms during the execution of the contract;
3) late payment, blackmail.

1) shirking;
2) industrial espionage;
3) intra-company fraud;
4) extortion;
5) asset withdrawal and transfer pricing;
6) countering effective capital growth;
7) conclusion and execution of oral supplementary agreements.

A source: compiled by the author on the basis of Grigoriev N. S. Forms of manifestations of opportunistic behavior // Russian Journal of Education and Psychology. – 2015. – №. 3 (47).

It can be assumed that before concluding a contract, it is inappropriate to consider intra-company opportunism, since the employee is not yet part of the company, and the company does not influence the employee. However, the transaction costs that will be spent on information retrieval, protection from third parties, and mechanisms to prevent the appearance of opportunism in the company will have a positive impact in combating the manifestations of intra-company opportunism, as well as minimize the consequences in the future [18].

Thus, each counterparty tries to reduce the risk of information asymmetry by clarifying additional information about its counterparty. An employer checks a potential employee through professional tests, interviews, and security services. Additional information can be provided by the previous employer. But even when checking all the information, it may turn out that this employee is prone to shirking or, for example, his values do not align with the values and organizational culture of the company [19]. If he shows himself in an interview as a responsible employee who is interested in working for a particular company, this does not guarantee that he will develop opportunistic behavior. At the same time, the potential employee himself has fewer resources to find out about the employer, since companies often tend to hide negative information about themselves, and order positive feedback from former employees on work sites and review sites. If a potential employee does not know anyone in the company, then he is unlikely to be able to fully learn the corporate culture and relationships in the team, and at the interview, if he turns out to be a highly qualified specialist, they will tell him only about the advantages of working in the company, and they will not voice inconvenient points. This may also affect the further manifestation of opportunism on the part of both the employer and the employee, since the counterparties were not initially honest with each other.

3. Manifestations of opportunistic behavior of staff and their impact on the company's activities

Examples of opportunistic behavior are well demonstrated by a number of well-known corporate scandals. For example, in the companyIn 2001, Enron's top management systematically concealed losses through fictitious subsidiaries. This led to bankruptcy with assets of $63.4 billion and caused damage to investors in the amount of more than $40 billion. In the case of WorldCom in 2002, the misrepresentation of financial statements resulted in losses of $11 billion and became the largest bankruptcy in the history of the United States at that time. In Russian practice, there is a well-known example of Tolyattiazot, where management used transfer pricing and affiliated companies to withdraw assets, causing multibillion-dollar damage to shareholders.

Intra-company opportunism can manifest itself after an employee has been dismissed from the company, and negatively affect its future activities. So, Frances Haugen, a former employee of Facebook (an organization banned in the Russian Federation), in October 2021, before her dismissal, took away internal documents and handed them over to the Wall Street Journal, an American daily business newspaper, and the US Congress. After receiving the data, the US Congress initiated an investigation into how the company operates, and the Wall Street Journal wrote several articles about privileged Facebook users who can circumvent the law and publish prohibited materials while remaining unpunished [20], and the negative impact of the Instagram network (banned in Russia Russian Federation organization) on adolescent girls, increasing their anxiety and depression levels [21]. The company incurred reputational risks after this incident. Due to the current situation, the company introduced new working rules for employees to reduce information leaks, which the employees themselves immediately passed on to the media, and they were publicly available [22]. This situation suggests that no matter how hard the company tries to minimize the risks associated with opportunistic behavior, as well as introduce measures to prevent and counteract it, there will always be people who will commit illegal acts for their own interests. But, on the other hand, the fact that internal employees disclose information may indicate the dissatisfaction of the team as a whole. In this way, they show the overall tension. And this action should be considered by management not as a call for tougher measures to counter opportunistic behavior, but as a signal of problems in communication with employees. In any case, this action had a negative impact on Facebook: in October, its shares fell by 4.66% [23].

Another example of the negative impact of intra-company opportunism is the situation with Yandex. In February 2021, the company's security service revealed an internal data leak of about 5,000 users [24]. A check was carried out on this fact, and it turned out that one of the company's employees had provided the information to the public. In order to minimize the risks of information leakage, the company decided to review the work processes of employees who have access to confidential information. It is noteworthy that Yandex shares increased by 1.1% in February 2021 [25]. But at the same time, trust in the service has fallen. So, in 2022, the Yandex.Food service was also leaked customer information, only this time a class action lawsuit was filed against the company [26], from which the company incurred reputational risks.

In 2024, the Association of Certified Fraud Investigation Specialists published its report entitled "Corporate Fraud 2024: A Report for the People", the largest study of industrial fraud to date [27]. Since the release of the first report in 1996, ACFE has analyzed more than 20,000 professional fraud cases reported by certified fraud screening specialists.

This report is based on the results of the ACFE Global Survey 2023, an online survey open to 53,118 certified fraud investigation professionals that was conducted from July 2023 to September 2023.

As part of the ACFE online survey, respondents were asked to describe the largest case of professional fraud they had encountered and investigated since January 2022. They were then asked questions about the details of the fraud case, including information about the perpetrator, the damage done to the organization and the forms of fraud used, as well as fraud trends in general.

A total of 7890 responses were received, 2110 of which could be used for the purposes of the ACFE decision report.

The submitted cases had to meet the following four criteria:

1) the case should relate to professional fraud (i.e. fraud committed by a person in relation to the organization in which he works);

2) the investigation was conducted in the period from January 2020, that is, until the moment of participation in the survey;

3) the investigation is completed at the time of participation in the survey;

4) the respondent should have been reasonably confident that the perpetrators of the illegal acts had been identified.

Each study examined the mechanisms used by employees to deceive their employers. Even with the transition to digital payments, remote work environments, and technology-based organizations, the patterns and methods used by employees to display opportunistic behavior have remained unchanged.

Among the main and frequently committed forms of opportunistic behavior in the company that can be traced are:

  • Misappropriation of assets, in which an employee steals company assets or abuses employer resources. This form is the most common, with 86% of fraud cases falling into this category. However, these schemes tend to result in the lowest average losses of $100,000.
  • Financial reporting fraud schemes, in which the perpetrator intentionally causes a material misstatement or omission in an organization's financial statements, are the least common (9%), but cause the most damage to the company (593,000 USD) category.
  • Corruption, which includes offenses such as bribery, conflict of interest, and extortion, is in the middle in both frequency and loss. These schemes occur in 50% of cases and result in an average loss of $150,000.

Based on the above analysis, it can be said that intra-company opportunism and fraudulent actions on the part of staff endanger the company's activities, which confirms the hypothesis of the study. At the moment, there are statistics around the world where cybercrimes occupy the first place, which can cause great damage. This is due to the emergence of new ways to circumvent the security system, the emergence of cryptocurrencies and "gray zones" in the legislation of the countries in which this fraud is committed [28]. Then there is the misappropriation of assets, bribery and corruption. Pre-contract and post-contract opportunism are characterized by different forms of intra-company opportunism, but both before and after the conclusion of the contract, the company must bear certain costs in order to control and successfully regulate the manifestations of opportunism in the company. At the same time, there is no guarantee that these methods of combating opportunism will be effective for a particular company.

4. Recommendations for preventing and minimizing the consequences of opportunistic personnel behavior

1. Before concluding a contract (employment contract), the HR department needs to carry out a number of activities. First of all, before being invited to an interview, HR managers should analyze the applicant's resume and find additional information about the employee's reputation (reviews from colleagues, characteristics from a previous job). This will allow, at the first stage, to weed out those who have already been noticed in the manifestation of fraudulent behavior in the workplace. At this stage, the costs of searching for information will arise, while the costs of resolving the consequences of possible opportunistic behavior that may harm the company will decrease [29].

This recommendation is aimed at preventing ex-ante opportunism (falsification of hiring data), which can be implemented through checking recommendations, social networks, and connections with former employers.

2. In order to diagnose latent tendencies to display opportunistic behavior of staff, the company must develop an effective recruitment questionnaire containing questions that can be answered by a portrait of a potential employee and apply psychological tests to determine the character and temperament of the future employee.

One of the effective tools for the preventive analysis of potential risks associated with opportunistic behavior of employees is the case interview method. This method involves modeling situations close to the real conditions of professional activity, followed by an analysis of the reactions and behavioral strategies of the applicant. For example, a situation is proposed for an applicant: "Imagine that you hold the position of a specialist in the procurement department. One of the bidders is your personal acquaintance, who offered you assistance in promoting his company, despite the fact that his price offer objectively loses to competitors. Management trusts you and does not require strict documentation of each stage of supplier selection. Your actions?"

The analytical purpose of the case is to identify behavioral patterns indicating a candidate's possible propensity to conceal information, manipulate in the interests of third parties, and be willing to act outside the framework of ethical norms in conditions of weak control.

Evaluation criteria may include awareness of a conflict of interest, willingness to act in the interests of the organization rather than for personal or affiliated purposes, commitment to transparency of decisions (intention to notify management), and a level of moral and ethical maturity expressed in maintaining professional distance.

Potential indicators of opportunistic behavior:

– rationalization of violations (for example: "it won't hurt the company");

– concealment of the fact of personal communication with the supplier;

– evading responsibility by delegating decisions without informing management.

Thus, the use of case interviews as an assessment method makes it possible to diagnose behavioral attitudes in advance that potentially contribute to the development of opportunistic practices in the future. The use of such a tool in combination with psychological testing and biographical data analysis helps to reduce transaction costs associated with the risks of intra-company opportunism.

3. To prevent post-contractual opportunism, when a person is part of a company, it is necessary to familiarize a new employee with internal values and rules. Management should also establish internal communication within the workforce, and employees should be able to receive feedback not only from their colleagues, but also from their superiors in order to feel that managers are monitoring the performance of their work duties and are always ready to help their subordinates [30]. In order to implement this recommendation, it is necessary to allocate a mentor for a new employee, as well as conduct trainings that introduce the internal culture.

4. In order to avoid alienation of labor, it is necessary to create an effective motivation system that will include monetary and non-monetary incentives. It is most effective to gradually implement a KPI system, having previously prepared the team for organizational changes if this system did not exist before [31].

5. In order to avoid opportunistic behavior from the management, it is necessary to form its own personnel reserve in order to nurture its own managers who will occupy high positions in the company. Perhaps because of this, the company will become more closed to external candidates, but the advantages of a talent pool are undeniable when choosing a candidate for high positions: reputation, experience, and adherence to the company's values.

6. Building an effective motivation system aimed at fairly rewarding employees in proportion to their contribution to the organization is another measure aimed at countering the opportunistic behavior of staff in the company [32].

7. When forming an information base within a company, it is necessary to clearly allocate access to certain resources in such a way that employees cannot use the information to their advantage. To do this, the security service needs to create a system in which, in order to gain access to certain information, the approval of the line manager and the person directly responsible for the information is required [33].

8. The HR department should systematically conduct surveys in the company regarding comfort and concerns. This will make it possible to identify people who may exhibit opportunistic behavior when the situation worsens. Therefore, the company should have internal psychological assistance that would help reduce stress levels among employees.

5. Conclusions

The opportunistic behavior of the staff should be considered as a systemic threat to the stability and sustainable development of the company. Regardless of the legality of the external form, actions aimed at extracting benefits to the detriment of the interests of the organization undermine trust within the team, violate corporate norms and have a devastating impact on economic security.

Taking into account the growing trend of opportunistic behavior, the need to develop and implement preventive mechanisms, risk assessment systems and ethical filters at the hiring stage, as well as the formation of a culture of openness and feedback within the company is becoming more important. Rather than dealing with the consequences, systemic management of the root causes of opportunistic behavior should be a priority for organizations seeking long-term effectiveness and the preservation of human resources.

The results of the study confirmed the existence of a stable relationship between the forms of opportunistic personnel behavior and risks to the economic, personnel, information and reputational security of the organization. The classification features of opportunism have been clarified, including the division by time of manifestation (ex ante and ex post), the nature of information asymmetry, the degree of openness and intensity of behavior, which allows us to consider the phenomenon more systematically.

An analysis of empirical examples from Enron, WorldCom, Facebook, and Yandex, combined with quantitative data from the ACFE global report, demonstrated the scale of the consequences of opportunistic actions, including financial losses, undermining corporate culture, reduced loyalty, and loss of trust from stakeholders. These facts have justified the need for an integrated approach to the prevention of destructive employee behavior.

Based on the analysis of literary sources, a classification of forms of manifestation of opportunistic behavior was formed, and an analysis of pre-contract and post-contract opportunism was initiated, since the costs incurred by the company vary depending on the time of manifestation of opportunistic behavior (before or after the conclusion of the contract).

Statistical data from the Association of Certified Fraud Investigation Specialists report were summarized. According to the results of the analysis, one of the main forms of opportunistic behavior in companies were: misappropriation of assets, manipulation of financial statements in which an employee intentionally causes a significant distortion or omission in the financial statements of the organization and corruption.

As a rule, statistical data that is publicly available on the Internet is limited only to information that can be quantified. Therefore, the damage caused by shirking, failure to fulfill one's work obligations, and the commission of petty fraud, which is difficult to control and monitor, most often does not fall under research, and there is no data on how much damage such actions cause.

The recommendations developed in the framework of the study are based on the introduction of preventive tools aimed at identifying and reducing risks at the recruitment stage. Among them, case interviews, assessment sessions, psychological testing, building a system of fair remuneration, developing feedback and delineating information access are highlighted. Each measure is aimed at eliminating specific prerequisites for the formation of opportunistic behavioral strategies.

Staff behavior can cause irreparable harm to an organization and thereby weaken its economic security. If opportunistic behavior occurs, the risk of financial losses increases, undermining the company's reputation, reducing the level of organizational culture and motivation, staff turnover increases, and as a result, there is a shortage of qualified personnel. Opportunism affects the elements of personnel, financial, intellectual and information security in the economic security system. Financial damage is currently one of the main consequences of opportunism, which negatively affects the financial security of the company. Deterioration of the moral situation in the team, staff outflow, decreased motivation, and violation of the integrity of the corporate culture affect personnel security. The leakage of confidential information, as well as information that is proprietary to the company, affects intellectual and information security.

Thus, the opportunistic behavior of the staff should be interpreted as a stable destructive factor that systematically affects the key elements of the organization's security. Effective management of such risks requires not only the institutionalization of relevant regulations and procedures, but also the integration of behavioral analysis into HR and corporate policy practices. The formation of an organizational culture environment focused on compliance with ethical standards, ensuring transparency of internal company interactions and the development of internal control mechanisms is a prerequisite for the sustainable functioning and strategic development of the company. The implementation of these approaches will minimize the consequences of behavioral deviations and ensure long-term protection of the organization's resources from internal threats.

References
1. Antonenko, E. V. (2016). The costs of opportunistic behavior of counterparties as components of transactional costs of an industrial enterprise. Investment Management and Innovation, 4, 11-17. https://doi.org/10.14529/iimj160402
2. de los Reyes Jr, G., & Martin, K. (2019). Not from guile but from entitlement: Lawful opportunism capitalizes on the cracks in contracts. Buffalo Law Review, 67, 1.
3. Dolgopoluk, E. E., & Snimshikova, I. V. (2021). Opportunism in entrepreneurship. In Institutional Trends in the Transformation of the Socio-Economic System in Conditions of Global Instability (pp. 165-170).
4. Shunaev, A. M. (2022). Counteracting corruption and fraud in business.
5. Masten, S. E. (1988). Equity, opportunism, and the design of contractual relations. Journal of Institutional and Theoretical Economics (JITE)/Zeitschrift für die gesamte Staatswissenschaft, 144(1), 180-195.
6. Wathne, K. H., & Heide, J. B. (2000). Opportunism in interfirm relationships: Forms, outcomes, and solutions. Journal of Marketing, 64(4), 36-51.
7. Popov, E. V., & Simonova, V. L. (2006). Effects of reducing the level of opportunism in the principal-agent system. Journal of Economic Theory, 1, 27-50.
8. Borovkova, N. V. (2011). Opportunism as a socio-economic phenomenon. In Multilevel Social Reproduction: Questions of Theory and Practice (pp. 154-163).
9. Vasilenko, N. V. (2024). Threats to personnel security of the enterprise: Prospects of institutional theory and competitive intelligence concept. In Strategic Development of Domestic Science: National Self-Consciousness, Hidden Competitive Advantages (p. 43).
10. Popov, E. V., & Ersh, E. V. (2015). Opportunism in manufacturing enterprises. Manager, 2(54).
11. Reuters. (2025). FBI says cybercrime costs rose to at least $16 billion in 2024. Retrieved April 20, 2025, from https://www.reuters.com/world/us/fbi-says-cybercrime-costs-rose-least-16-billion-2024-2025-04-23/?utm_source=chatgpt.com
12. PwC. (2025). Global Economic Crime Survey 2024. Retrieved April 20, 2025, from https://www.pwc.com/gx/en/services/forensics/economic-crime-survey.html?utm_source=chatgpt.com
13. EY. (2025). How can trust survive without integrity? Retrieved April 20, 2025, from https://www.ey.com/en_gl/insights/forensic-integrity-services/global-integrity-report?utm_source=chatgpt.com
14. Buntovskaya, L. L. (2019). Labor opportunism as a negative component of social labor relations. In Mechanisms for Managing Economic, Environmental, and Social Processes in Conditions of Innovative Development (pp. 203-211).
15. Kozlova, E. V. (2020). Strategic opportunism in the behavior of economic entities. In Competitiveness and Development of Socio-Economic Systems (pp. 168-169).
16. Wang, X., & Yang, Z. (2013). Inter-firm opportunism: A meta-analytic review and assessment of its antecedents and effect on performance. Journal of Business & Industrial Marketing.
17. Hasanah, N. (2024). Transaction costs: A legendary theory of the firm. Journal of Business Studies and Management Review, 7(2), 79-95.
18. Tsyokhla, S. Yu., & Romanyuk, E. V. (2016). Modern approaches to the classification of transaction costs in the labor market. Journal of Economic Theory, 4, 197-203.
19. The Wall Street Journal. (2025). Facebook says its rules apply to all; company documents reveal a secret elite that's exempt. Retrieved February 6, 2025, from https://www.wsj.com/articles/facebook-files-xcheck-zuckerberg-elite-rules-11631541353?AID=11557093&PID=6415797&SID=bi%7C613f64730d5b756984014acd%7C1631600766787&subid=Business+Insider&cjevent=ad692320152411ec832d84b90a180513&tier_1=affiliate&tier_2=moa&tier_3=Business+Insider&tier_4=3861930&tier_5=https%3A%2F%2Fwww.wsj.com%2Farticles%2Ffacebook-files-xcheck-zuckerberg-elite-rules-11631541353
20. The Wall Street Journal. (2025). Facebook knows Instagram is toxic for teen girls, company documents show. Retrieved February 6, 2025, from https://www.wsj.com/articles/facebook-knows-instagram-is-toxic-for-teen-girls-company-documents-show-11631620739
21. The New York Times. (2025). Facebook clamps down on its internal message boards. Retrieved February 6, 2025, from https://www.nytimes.com/2021/10/13/technology/facebook-workplace-transparency-leaks.html
22. Investing.com. (2025). Facebook stock quotes. Retrieved February 8, 2025, from https://ru.investing.com/equities/facebook-inc-historical-data
23. Yandex. (2022). Yandex security service revealed a fact of internal data leakage. Retrieved February 11, 2022, from https://yandex.ru/company/press_releases/2021/2021-02-12
24. Investing.com. (2025). Yandex stock quotes. Retrieved February 15, 2025, from https://ru.investing.com/equities/yandex-historical-data?cid=102063
25. VC.ru. (2025). The "Network Freedoms" project has begun to collect a class action lawsuit against "Yandex.Eda" due to the leakage of client data. Retrieved February 17, 2025, from https://vc.ru/legal/385725-proekt-setevye-svobody-nachal-sobirat-kollektivnyy-isk-protiv-yandeks-edy-iz-za-utechki-dannyh-klientov
26. ACFE. (2025). Occupational fraud 2024: A report to the nations. Retrieved February 23, 2025, from https://www.acfe.com/-/media/files/acfe/pdfs/rttn/2024/2024-report-to-the-nations.pdf
27. Strizhak, A. Yu. (2020). Contagion of opportunism in cyberspace: Trends and ways to mitigate. New in Economic Cybernetics, 3-4, 346-353.
28. Ilchenko, S. V., Alakoz, S. N., & Sadykhova, E. N. (2024). Personnel security as a tool for ensuring the economic security of the organization. Business and Design Review, 3, 35.
29. Oksenyuk, E. E., Bezuglova, M. N., & Kovalenkova, O. G. (2024). Ensuring personnel security of the enterprise as an HR technology. Bulletin of the Academy of Knowledge, 3(62), 866-869.
30. Tanichev, A. V., Klimovets, O. V., & Stuglev, A. A. (2024). Formation of corporate management sustainability: From internal stakeholders to development institutions. Scientific Notes of the Crimean Federal University named after V.I. Vernadsky. Economics and Management, 10(2), 105-119.
31. Semenova, I. A., & Gerbulova, A. S. (2021). Causes and consequences of opportunistic behavior of the firm's personnel. Bulletin of Udmurt University. Series "Economics and Law", 31(1), 30-36. https://doi.org/10.35634/2412-9593-2021-31-1-30-36
32. Koklyukhina, P. S. (2023). Problems of post-contractual opportunism and motivation of the organization's labor. BBK 65, 67 Chief Editor: M. T. Tekueva.
33. Tsui, T., & Kuznetsov, E. N. (2017). The influence of opportunism on the personnel security of the company. Modern Technologies and Scientific Progress, 1, 198-199.

First Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

The peer-reviewed study is devoted to the study of forms of internal opportunism and its impact on the company's activities. The research methodology is based on the study of literary sources and data on global surveys about fraud in the world. The relevance of the work is due to the fact that when opportunistic behavior occurs, the risk of financial losses increases, undermining the company's reputation, reducing the level of organizational culture and motivation, staff turnover increases, and as a result, there is a shortage of qualified personnel. The scientific novelty of the work, according to the reviewer, consists in the presented results of summarizing information about the forms of internal opportunism and its impact on the company's activities. Structurally, the following sections are highlighted in the text of the article: Introduction, Classification of forms of opportunistic behavior of personnel in the company, Manifestations of opportunistic behavior of personnel and their impact on the company's activities, Recommendations for preventing and minimizing the consequences of opportunistic behavior of personnel, Conclusions and Bibliography. The publication provides a classification of forms of opportunistic behavior according to such classification criteria as the contractual process, the type of information asymmetry, attitude to the object of analysis, the degree of intensity of manifestation, the degree of openness; reflects the manifestation of various forms of opportunistic behavior in the workplace; examines the forms of opportunistic behavior in relation to the object of analysis. The authors believe that open statistics, which are limited only by information that can be quantified, therefore, the damage from shirking, failure to fulfill their work duties, and the commission of petty fraud, which is difficult to control and track. The paper reflects the results of the global online survey of the Association of Certified Fraud Investigation Specialists (ACFE) of more than 53,000 certified fraud investigation specialists, which was conducted from July to September 2021; 8 recommendations were formulated to prevent and minimize the consequences of opportunistic personnel behavior. The final part of the publication indicates that one of the main consequences of opportunism is financial damage, which negatively affects the financial security of the company. The bibliographic list includes 30 sources – scientific publications by Russian and foreign authors on the subject in Russian and foreign languages, as well as online resources. The text of the publication contains targeted references to the list of references confirming the existence of an appeal to opponents. Of the reserves for improving the article, it should be noted that the introduction does not substantiate the relevance of the topic, does not formulate the purpose and objectives of the study, the subject and object, the working hypothesis of the study, does not reflect the methods and source materials. The topic of the article is relevant, the material reflects the results of the research conducted by the authors, contains elements of increment of scientific knowledge, corresponds to the topic of the journal "Finance and Management", may arouse the interest of readers, but requires revision in accordance with the comments made.

Second Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

The subject of the study. Taking into account the formed headline, it seems possible to conclude that the article should be devoted to the forms of internal opportunism and its impact on the company's activities. The content of the article does not deviate from the stated topic, but the presented theses require justification, as well as presentation of the author's position, and not only systematization of the information already reflected in the scientific literature. The research methodology is based on data analysis and synthesis. It is valuable that the author uses graphical tools through the formation of 3 tables demonstrating various aspects of the topic under consideration. When finalizing an article, it is important to ensure that the article is filled with quantitative data characterizing the subject of the study. The relevance of the study of issues related to internal opportunism and its impact on the company's activities is beyond doubt, as the strategic development of the organization depends on it. The scientific novelty is contained in the material submitted for review, it is related to the classification of forms of opportunistic behavior, but it would be interesting to identify which effects (negative/positive, including quantification) this is borne out in practice. Style, structure, and content. The presentation style is scientific. The structure of the article, formed by the author, allows you to reveal the chosen research topic. Familiarization with the content showed that the author is mainly focused on summarizing the data available in other publications. When finalizing an article, it is extremely important to show the existing scientific gaps and how the author proposes to fill them. Speaking about the recommendations formed to prevent and minimize the consequences of opportunistic behavior of staff, it is not clear what specific consequences each recommendation eliminates? It is extremely important to show what consequences each recommendation is aimed at solving, as well as exactly how it should be implemented. For example, the author says that "before being invited to an interview, HR managers should analyze the applicant's resume": this is obvious, but perhaps the author suggests some specific algorithm for conducting such an analysis? The answer to this question will already be interesting for a potential readership. All the recommendations given should have scientific novelty and practical significance. Bibliography. The bibliographic list consists of 30 titles. It is valuable that the author relies on both domestic and foreign scientific publications. The positive perception of familiarization with the generated list of sources also arises due to the presence of relevant scientific publications in it. Appeal to the opponents. Despite the compiled list of sources, no scientific discussion has been carried out, but in fact the author summarized them and presented in most of the article the result of such a generalization. When finalizing the article, it is important to supplement the article with the author's position on the issues under consideration and show what the increase in scientific knowledge is compared to what is already contained in published scientific articles. Conclusions, the interest of the readership. Taking into account the above, we conclude that the article requires revision, after which it can be published and re-reviewed. A qualitative correction will ensure that the article is in demand among a potential readership interested in corporate governance issues in modern conditions.

Third Peer Review

Peer reviewers' evaluations remain confidential and are not disclosed to the public. Only external reviews, authorized for publication by the article's author(s), are made public. Typically, these final reviews are conducted after the manuscript's revision. Adhering to our double-blind review policy, the reviewer's identity is kept confidential.
The list of publisher reviewers can be found here.

The subject of the peer-reviewed study is the opportunistic behavior of staff in the company. The author justifiably attributes the high degree of scientific relevance and practical significance of his research to an increase in the amount of information about internal opportunism among company employees, as well as to the expansion of forms of such behavior in the workplace. The author describes the research methodology rather vaguely. Of the actual methods, only a case study of the practices of opportunistic behavior of staff at Enron, WorldCom, FaceBook and Yandex is indicated. What exactly do such "methods" of research as "generalization of the theoretical and practical base of forms of internal opportunistic behavior" mean (what is it, what specific scientific tools were used to carry out this generalization? based on the author's intuition? or personal experience? subjective experiences? for the correct generalization of the scientific base, a scientific method is required, which is not specified by the author), as well as "processing and generalization of analytical materials from professional associations" (similar questions). At the same time, it can be understood from the context that the author used critical conceptual analysis to explicate the scientific concept of opportunistic behavior, institutional analysis to study and evaluate the role of institutions, practices, and what in neo-institutionalism is called "standard operating procedures" in preventing opportunistic behavior in a company, as well as analysis of secondary statistical data to assess the impact the opportunistic behavior of staff on the company's activities. The correct application of these methods allowed the author to obtain results with signs of scientific novelty and reliability. First of all, we are talking about the revealed connection between the internal opportunism of the company's staff and the economic security of this company.: As the author has shown, the opportunistic behavior of the organization's employees undermines trust in the organization's team, destroys corporate norms and poses a threat to the sustainable development of the company. The author's conclusion about the need to create preventive mechanisms to prevent opportunistic behavior in the company on a systematic basis is also of scientific (and practical) interest. Finally, the author offers a set of recommendations to prevent the opportunistic behavior of staff and minimize its consequences. Structurally, the reviewed work makes a positive impression: its logic is consistent and reflects the main aspects of the research. The following sections are highlighted in the text: - "1. Introduction", which poses a scientific problem, substantiates its relevance, formulates the purpose and objectives of the study, its subject and object (although the object is not described quite correctly), hypothesis, research methods and materials; - "2. Classification of forms of opportunistic behavior of personnel in the company", where a conceptual analysis of the scientific concept of opportunistic behavior is carried out, the forms of its manifestation are investigated, and a classification of these forms is developed; - "3. Manifestations of opportunistic behavior of staff and their impact on the company's activities", where the manifestation of opportunistic behavior in specific companies (Enron, WorldCom, FaceBook and Yandex) is investigated by means of institutional and case analysis; - "4. Recommendations on preventing and minimizing the consequences of opportunistic personnel behavior", which develops a set of practical recommendations on countering opportunistic behavior in the workplace; - "Conclusions", which summarizes the results of the conducted research, draws conclusions and outlines the prospects for further research. The style of the reviewed article is scientific and analytical. There is a small amount of stylistic ambiguity in the text (for example, ambiguity, as in the sentence "That opportunism may be legitimate, suggested [suggested "legitimate opportunism" or an idea, a concept? – rec.] O. Williamson in 1991. His essence [whose essence? "legitimate opportunism" or O. Williamson? – Rec.] is that...", "...Cases of various forms of opportunistic behavior in companies that are not commonly talked about ["is it not customary to talk about" forms or companies? – rec.]..." etc.; etc.) and grammatical (for example, typos of "the form of the prostration", ... ; or a missing comma after the subordinate clause "... If we consider the situation from the perspective of the scale of damage that may be inflicted on the counterparty after the claim and the damage that was ..."; etc.) There are no errors, but in general it is written quite competently, in good Russian, with the correct use of scientific terminology. The bibliography includes 33 titles, including sources in foreign languages, and adequately reflects the state of research on the subject of the article. The appeal to opponents takes place during the conceptual elaboration of the concept of opportunistic behavior. The special advantages of the article include a very relevant topic chosen for research, as well as a significant amount of empirical material used for analysis. THE GENERAL CONCLUSION is that the article proposed for review can be qualified as a scientific work that meets the basic requirements for such work. The results obtained by the author will be of interest to sociologists, economists, managers, specialists in the field of organizational sociology, risk management in companies, as well as for students of the listed specialties. The presented material corresponds to the subject of the journal "Finance and Management". Based on the results of the review, the article is recommended for publication.