Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementPhysical Security

The Value of Whistleblowing and Hotline Reporting

New research is changing how enterprises think about whistleblowing.

By Kyle Welch
SEC0420-whistleblower-Feat-slide1_900px
SEC0420-whistleblower-slide2_900px

About the Author

Kyle Welch is an assistant professor of accountancy at The George Washington University School of Business.

SEC0420-whistleblower-Feat-slide1_900px
SEC0420-whistleblower-slide2_900px
April 16, 2020

Despite its negative connotations, whistleblowing is simply reporting a problem. But it’s increasingly clear that strong internal systems that allow and encourage employees to report internally are integral to root out problems, create strong cultures and protect employees. If such a system is not in place, or if it’s underused, problems will go unaddressed – prompting employees to then report their problems externally. That can ruin reputations, end careers and topple businesses.

Additionally, we’re learning that information organizations receive from secondhand reporters is more valuable – and more credible – than we thought in the past.

 

Debunking Conventional Whistleblowing Thinking

These conclusions were derived from data from NAVEX Global, the world’s largest provider of internal whistleblower systems. University of Utah Professor Stephen Stubben and I were granted limited, secure access to the company’s EthicsPoint Incident Management system, allowing analysis of anonymized hotline reports from between 2004 and 2017 of roughly 5,000 public companies, more than half of which were of the Fortune 500. In addition, the Corporate Research Project of Good Jobs First provided us access to data on government fines.

We found that higher hotline volume correlated with greater profitability and workforce productivity as measured by Return on Assets (ROA); fewer material lawsuits brought against the company overall and lower settlement costs if a lawsuit does occur; and fewer external whistleblower reports to regulatory agencies and other authorities.

This sets conventional wisdom – that more reports meant more problems – on its head. A more active hotline is actually a sign of employees who feel comfortable coming forward and trust their concerns will be addressed because of their organization’s strong culture.

 

Why Higher Hotline Use is a Good Thing

Internal hotline systems provide employees a confidential way to flag issues, which allows for management to take care of problems that are difficult to root out in traditional monitoring. This also allows issues to be resolved before they become more expensive or known outside of the organization.

As noted here, there are also productivity issues at play. Using ROA as measurement, we found that companies that more actively used their hotline systems (i.e., reviewed reports more frequently) had small but significant improvement increase in ROA as opposed to companies with lower utilization.

Further, healthy companies are comprised of happy employees, which is achieved when managers can access important concerns through internal reports. Dissatisfied employees and internal strife, on the other hand, can quickly lead to lawsuits and negative press, deteriorating the overall health of any business.

 

Hotlines’ Correlation with Headlines and Lawsuits

We also studied the connection between hotline volume and the number of material lawsuits filed against companies. Companies whose management fully utilized its internal reporting systems to address reported issues (such as financial reporting improprieties, harassment of employees or workplace safety) had fewer lawsuits. In fact, companies with higher levels of reporting were subject to 6.9-percent fewer pending material lawsuits in the subsequent three years than companies with lower levels of hotline use. And, in the event of lawsuit being brought against a company, those with higher hotline usage faced 20.4-percent less in total settlement amounts.

Companies with increased hotline usage were also shown to have fewer external whistleblower reports to the Occupation Health & Safety Administration. And there was also a connection between hotline usage and media coverage. We compared hotline data with reporting in the financial and business press, finding that firms that actively used their hotlines received on average, 46-percent fewer negative news stories than businesses with low or less frequent internal reporting use.

We went a step further and looked at instances where regulatory action came in response to the media attention driven by a whistleblower report. There was a clear negative association between more hotline usage and the fines imposed by federal and state regulators. The data also showed that even a modest increase in internal reporting activity could result in up to $8 million in savings.

 

Debunking Conventional Whistleblowing Thinking (Again)

As we continued our research, we unearthed something else that rejected conventional thinking – this time regarding the comparative value of first and secondhand reports.

Of the two, it had typically been assumed that secondhand information was less reliable. But after analyzing more than two million reports in NAVEX Global’s data, we found that secondhand reports are 47.7-percent more likely than firsthand reports to be substantiated by management. In other words, secondhand reports were more credible than firsthand reports.

In addition to flying in the face of conventional wisdom, this was in direct contradiction to some scientific thinking (from psychology labs). We reached out to some smart chief compliance officers for help interpreting this data, and they weren’t surprised. They pointed to two primary reasons for the credibility of secondhand reports as compared to firsthand.

Firsthand reports are more likely to be frivolous and occasionally personally motivated. Secondhand reporters who decide to come forward usually do so after doing a sort of first round of vetting of the situation themselves. Additionally, many valid firsthand reports are never made because those affected sometimes fear retaliation or blowback. This is less of a concern for secondhand reporters.

 

More about the Value of Secondhand Reports

Higher volume of secondhand reports from employees negatively correspond to fewer lawsuits and lower legal settlements in the following year. And secondhand reports from individuals outside the organization are negatively associated with the number and dollar amounts of government fines in subsequent years.

We didn’t find the same correlation with firsthand reports. But none of this is to say that firsthand reports aren’t also valuable. It should be noted that firsthand accounts in a vacuum (i.e., two reports about the same event) are likely more accurate about the specific event. But the social dynamics that prompt someone to report to a company’s whistleblower hotline – or what discourages them from doing so – means that whistleblowing is an entirely different animal.

 

No Doubt about the Value of Hotline Reporting

Whether it’s about how higher hotline volume helps companies or how we should re-evaluate the value of secondhand reporting, one thing’s clear based on our research: Companies with fully implemented, actively advertised and widely used internal reporting systems benefit from a direct line of communication with their employees in more ways than one, positioning them to more quickly identify and rectify problems before they become larger and more costly.

The results of the analyses we’ve conducted provide compliance officers and corporate leaders with compelling further evidence of why a healthy, well-designed hotline system is paramount for the wellbeing and longevity of any multifaceted organization. Amid an always-evolving compliance landscape, these are lessons organizations need to take to heart.

KEYWORDS: compliance tools internal investigations risk management whistleblower workplace safety

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kyle Welch is an assistant professor of accountancy at The George Washington University School of Business.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • reporting-whistle-blower-freepik1170x658v5.jpg

    Gartner: Compliance reporting needs new value proposition

    See More
  • Tax and budget documents

    The value of security: building the foundation for modern enterprises

    See More
  • Security Metrics

    The value-add of security metrics

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×
About the Author Kyle Welch is an assistant professor of accountancy at The George Washington University School of Business.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!