a. Briefly discuss four approaches your group would take to determine who was sharing the information.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

In 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used to
investigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. “Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place.” The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial workers at CNet and the Wall Street Journal to learn who was leaking information to them. Following this, Patricia Dunn, as well as three executives, left the company. After a congressional hearing and several federal investigations, executives were charged with felonies, and HP paid $14.5 million to settle civil charges related to the scandal. HP is not the only company to use such methods; recent admissions by the investigation firms
involved suggest that the use of ethically questionable investigative tactics by large companies is quite common. “It
betrays a type of corporate culture that is so self-obsessed, (that) really considers itself not only above the law, but
above, I think, ethical decency, that you have to ask yourself, where did the shame come in?” said Charles King, an
analyst with Pund-IT Inc.

Consider the situation at Hewlett-Packard from a multiple stakeholder perspective. Imagine you are an ethical leader in each instance….as a CEO faced with leaks regarding your strategic vision.


a. Briefly discuss four approaches your group would take to determine who was sharing the
information.

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Customer Privacy
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education