n 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used to investigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. “Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place.”   The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial workers at CNet and the Wall Street Journal to learn who was leaking information to them. Following this, Patricia Dunn, as well as three executives, left the company. After a congressional hearing and several federal investigations, executives were charged with felonies, and HP paid $14.5 million to settle civil charges related to the scandal. HP is not the only company to use such methods; recent admissions by the investigation firms involved suggest that the use of ethically questionable investigative tactics by large companies is quite common. “It betrays a type of corporate culture that is so self-obsessed, (that) really considers itself not only above the law, but above, I think, ethical decency, that you have to ask yourself, where did the shame come in?” said Charles King, an analyst with Pund-IT Inc.   Source: University of Minnesota Libraries Publishing (2017) Instructions:   Consider the situation at Hewlett-Packard from a multiple stakeholder perspective. Imagine you are a CEO faced with leaks regarding your strategic vision. Briefly discuss four approaches your group would take to determine who was sharing the information. Describe an advantage and a disadvantage of one of your proposed approaches.

Understanding Business
12th Edition
ISBN:9781259929434
Author:William Nickels
Publisher:William Nickels
Chapter1: Taking Risks And Making Profits Within The Dynamic Business Environment
Section: Chapter Questions
Problem 1CE
icon
Related questions
Question

n 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used to investigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. “Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who

had launched the quest to identify media sources in the first place.”

 

The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial workers at CNet and the Wall Street Journal to learn who was leaking information to them. Following this, Patricia Dunn, as well as three executives, left the company. After a congressional hearing and several federal investigations, executives were charged with felonies, and HP paid $14.5 million to settle civil charges related to the scandal. HP is not the only company to use such methods; recent admissions by the investigation firms involved suggest that the use of ethically questionable investigative tactics by large companies is quite common. “It betrays a type of corporate culture that is so self-obsessed, (that) really considers itself not only above the law, but above, I think, ethical decency, that you have to ask yourself, where did the shame come in?” said Charles King, an analyst with Pund-IT Inc.

 

Source: University of Minnesota Libraries Publishing (2017)

Instructions:

 

Consider the situation at Hewlett-Packard from a multiple stakeholder perspective. Imagine you are a CEO faced with leaks regarding your strategic vision.

  1. Briefly discuss four approaches your group would take to determine who was sharing the information.
  2. Describe an advantage and a disadvantage of one of your proposed approaches.
Expert Solution
steps

Step by step

Solved in 4 steps

Blurred answer
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Understanding Business
Understanding Business
Management
ISBN:
9781259929434
Author:
William Nickels
Publisher:
McGraw-Hill Education
Management (14th Edition)
Management (14th Edition)
Management
ISBN:
9780134527604
Author:
Stephen P. Robbins, Mary A. Coulter
Publisher:
PEARSON
Spreadsheet Modeling & Decision Analysis: A Pract…
Spreadsheet Modeling & Decision Analysis: A Pract…
Management
ISBN:
9781305947412
Author:
Cliff Ragsdale
Publisher:
Cengage Learning
Management Information Systems: Managing The Digi…
Management Information Systems: Managing The Digi…
Management
ISBN:
9780135191798
Author:
Kenneth C. Laudon, Jane P. Laudon
Publisher:
PEARSON
Business Essentials (12th Edition) (What's New in…
Business Essentials (12th Edition) (What's New in…
Management
ISBN:
9780134728391
Author:
Ronald J. Ebert, Ricky W. Griffin
Publisher:
PEARSON
Fundamentals of Management (10th Edition)
Fundamentals of Management (10th Edition)
Management
ISBN:
9780134237473
Author:
Stephen P. Robbins, Mary A. Coulter, David A. De Cenzo
Publisher:
PEARSON