Collusive Bidding in Brazilian Infrastructure Projects
MetadataShow full item record
Allegations of corruption have resulted in an investigation of Brazil’s national ‘oil’ company prior to an incumbent Brazilian president disputing their re-election. The investigation has examined allegations that several directors of the ‘state’-owned company received bribes from construction companies and that the funds were used to support the parties of the governing coalition. Using a case study, this paper presents the approach adopted by the Brazilian Federal Police to determine if collusion had occurred. The bidding patterns of construction firms in 22 infrastructure projects suggested to the police that collusion occurred. Considering these circumstances, 561 bids for 77 projects were examined. Investigators obtained evidence that indicates that a collusive behaviour regarding procurement at specific construction firms (the League of 16) had taken place. The conclusions of the research provide insights into the intendment of the League of 16’s bidding patterns with an example of the ‘real’ cost of cartelisation that was experienced in an infrastructure project.
Showing items related by title, author, creator and subject.
Esten, Antonia (1998)The thesis is concerned with the construction of women's authority as it is manifested in biographical speech; that is, in written or oral narratives, or sub-narratives, about others. The emphasis is on women's biography ...
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networksTian, Biming; Han, Song; Dillon, Tharam S. (2008)Self-healing key distribution mechanism can be used to establish session keys within a large and dynamic groups of users over an unreliable wireless network. Mutual-healing key distribution mechanism deals with some ...
Tian, Biming; Han, Song; Dillon, Tharam S.; Das, S. (2008)An efficient self-healing key distribution scheme with revocation capability is proposed for secure group communication in wireless networks. The scheme bases on vector space secret sharing and one way hash function ...