Preview

Contemporary Issues in Business

Powerful Essays
Open Document
Open Document
5454 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Contemporary Issues in Business
1. Introduction
2. What Happened?
2.1. Table of Events- The Phone Hacking Scandal
3. What is management?
3.1. Management Ideologies
3.2. Humanistic versus Economistic Ideologies
3.3 Scientific Management Theories
3.4. Critical Management Studies
3.5 Managers as Actors
3.6 Managers as Discursive Subjectivies
4. Ethical Theories
4.1. Consequentialist Theories
4.2. Non Consequentialist Theories
5. Conclusion
6. Recommendations
7. References

1.Introduction
This report will discuss the events that took place during the phone hacking scandal at News International and evaluate the behaviour of the Organisation and its Management. It will review the issues in this case against several ethical and ideological theories as well as providing recommendations for how things could have been handled differently. It will examine the role of Management within an organisation and reflect on its social and ethical responsibilities.
2.What Happened?
The events of the phone hacking scandal can be seen detailed in the table below-

2.1. Table of Events- The Phone Hacking Scandal Date | Event | Significance | 2000 | Rebekah Brooks appointed editor of News Of The World | | 2003 | Rebekah Brooks is appointed editor of The Sun. Andy Coulson is also appointed editor of The Sunday paper. Brooks also tells a parliamentary committee that her paper has paid police for information however News International say that this is not the policy of the company. | This is a first admittance that the paper was willing to pay for information and perhaps use underhand tactics to get stories. | 2005 (November) | The Royal Court complains after NOW prints a story reporting on a leg injury suffered by Prince William which they could not have known about without intercepting private voicemail messages. A Police inquiry is launched to investigate. | This is the first time an accusation of phone hacking has been made against NOW. | 2006 (August) | Clive Goodman (NOW’s Royal



References: A. L. CUNCLIFFE (2009) A Very Short, Fairly Interesting and Reasonably Cheap Book about Management A.CUNCLIFFE (2001) Journal of Management Studies, 2001, vol BBC NEWS (2011) http://www.bbc.co.uk/news/uk-politics-12253968 CENTRE FOR AMERICAN PROGRESS (2004), Who is Rupert Murdoch? http://www.americanprogress.org/issues/2004/07/b122948.html D.WILSON AND R.ROSENFIELD (1990), Managing Organizations ELI: BUILD A CIVIL WORKPLACE (2007) http://www.eliinc.com/insights/blog/Ethics-and-The-New-York-Times-Test F.W. TAYLOR (1911), Scientific Management, H.J.PATON (1971) The Categorical Imperative, A Study in Kant’s Moral Philosophy JOHN COTTER (1996), Leading Change JOHN ELKINGTON (1997), Cannibals with Forks: the Triple Bottom Line of 21st Century JOHN STUART MILL (1863) Utilitarianism JOSEPH L BADARACCO (1995), Business ethics: roles and responsibilities K.R ANDREWS (1989), Ethics in practice: managing the moral corporation MATS ALVESSON AND HUGH WILLMOTT (1992), Critical Management Studies PETER L BERGER AND THOMAS LUCKMANN (1966), The Social Construction of Reality STEPHEN COPELAND AND KATHRYN SUTHERLAND (1995) Adam Smith’s Wealth OF Nations THE GUARDIAN (2011) http://www.guardian.co.uk/media/interactive/2011/jul/09/phone-hacking-timeline The New York Times Magazine (13 September 1970) THE TELEGRAPH (2011)http://www.telegraph.co.uk/news/uknews/phone-hacking/8634176/Phone-hacking-timeline-of-a-scandal.html TOM L BEAUCHAMP (1993), Ethical Theory and Business

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Verizon business researched and reported in 2009 a case study involving data breaches in secured network. Within their findings, they summarize the threats, which industry, and which records are the most popular. The report fist showed that a percentage of the hacking from outside sources came from the European Union, and the most popular info being stolen was financial and retail goods.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cp Case Study

    • 976 Words
    • 4 Pages

    | * Data soon became available after authentication breach * Revealed hole in ChoicePoint security system * Trust of security standards instantly lost…

    • 976 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Good Essays

    “According to court records the massive T-Mobile breach first came to the government's attention in March 2004, when a hacker using the online moniker "Ethics" posted a provocative offer on muzzfuzz.com, one of the crime-facilitating online marketplaces being monitored by the Secret Service as part of Operation Firewall.” ( Google\ Tmobile.com)…

    • 241 Words
    • 1 Page
    Good Essays
  • Good Essays

    In particular, that 45% of the court circuits have adopted as broad interpretation of the law while only 36% have adopted a narrow interpretation of the law (Mikulic, 2016). The cautionary tale that the author spelled out in part I of the article was in particular an eye opener. The famous hacker and “internet troll” (Lennard, 2014) Weev (Andrew Auernheimer) was “sentenced to 41 months in federal prison for revealing to media outlets that AT&T had configured its servers to allow the harvesting of iPad owners' unsecured email addresses” (EFF, 2013). Both Weev and co-defendant Daniel Spitler used “a script that [exploited] the security hole to collect roughly 120,000 email addresses” (EFF, 2013). Weev was indicted under the provisions of the CFAA law, in particular the broad interpretation of the law. In which Weev had exploited a security hole that AT&T had failed to secure. I found that the author described a strong case where millions of Americans can be punished under the broad scope of…

    • 1035 Words
    • 5 Pages
    Good Essays
  • Better Essays

    The law at that time allowed a rape victim’s identity to be published only if it would help to catch the alleged perpetrator – a loophole which The Sun used in its letter of defence. The newspaper’s then managing editor, Kelvin MacKenzie, refused to issue an apology; claiming that publishing the photo was part of its duty to portray rape as a “sordid crime” (Media Law, 2007: p. 783). Although the Press Council condemned the action, the newspaper had not technically breached the law – only gone against codes of practice.…

    • 1211 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Take Home Midterm

    • 1653 Words
    • 7 Pages

    1. Infamous hacker Andrew Auernheimer, aka "Weev", was convicted of conspiracy to access a protected computer without authorization, a violation of the Computer Fraud and Abuse Act (CFAA), as well as fraud in connection with personal information, in United States Third Circuit Court today (Nov. 20). All he did was exploit the weaknesses that AT&T ipads had its own cellular ID number, or integrated circuit card (ICC) ID, in the URL, or Web address, that it used to access the AT&T website. He then found that subtly altering the cellular ID numbers in the URL would generate different email addresses on the AT&T site.…

    • 1653 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    U.s. Health Care

    • 2018 Words
    • 9 Pages

    Robbins, S., Decenzo, D., & Coulter, M. (2011) Fundamentals of management: Essential concepts and applications (7th ed.) Boston, MA: Prentice Hall.…

    • 2018 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Role of Federal Agencies

    • 802 Words
    • 4 Pages

    The recent security breach by unauthorized intruders into the parent company of NASDAQ is an example of the kind of breaches directed against important financial infrastructure and illustrates the difficulty of determining clear attribution. As we would in response to any such breach, the FBI is working to identify the scope of the intrusion and assist the victim in the remediation process.…

    • 802 Words
    • 4 Pages
    Good Essays
  • Good Essays

    150 Salami Fraud 1

    • 768 Words
    • 3 Pages

    The recent disclosure that WorldCom concealed almost $4 billion of expenses as if they were…

    • 768 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The media coverage of the phone hacking scandal was substantial due to the high volume case it had created. The media throughout the course of investigation and inquiry made sure that all their information was available to all people that had been both affected and not affected by the News of the World phone hacking ring. The information provided by other media allowed the readers to form their own opinions about what was happening to the victims of the phone hacking…

    • 1287 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Phone Hacking Scandal

    • 504 Words
    • 3 Pages

    * After the 2005 Royal phone hacking scandal another investigation was launched into phone hacking called operation Weeting. It was announced in January 2011 by the police that a new investigation would be conducted as a result new information.…

    • 504 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Corrpuption Spain

    • 329 Words
    • 1 Page

    The raid is the latest in a series of scandals that have entangled Spanish politicians and bankers. An investigation into the misuse of company credit cards by more than 80 officials connected to savings bank Caja Madrid has dominated headlines in recent weeks.…

    • 329 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    A Bad Situation

    • 500 Words
    • 2 Pages

    Journalists within the company should be prohibited from actively seeking special favors and gifts. The underlying basis of this memorandum is to have our fellow journalist remember that the driving mission behind our news is to seek an unbiased approach towards the news we…

    • 500 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Now I would like to move on to some stastistics. According to the internet crime complaint center also know as the IC3 a partnership with the federal beauro of investigation, the national white collar crime center and the bearo of justice assistance. The percentage of people hacked within the last year has increased 22 from last year.…

    • 521 Words
    • 3 Pages
    Good Essays

Related Topics