Preview

Dilemmas Faced By Tim Cook

Good Essays
Open Document
Open Document
754 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Dilemmas Faced By Tim Cook
The various dilemmas faced by Tim Cook has been characterized as,“the dirty-hands problem”;an expressionwhich referred to the hard, moral choices involving the“right-versus-right” dilemmas faced by management. The case study categorizes various responsibilities of the management into 4 different spherescalled as, “The Four Spheres of Managers’ Commitment”; a clash between which resulted into the various dilemmas for Mr. Cook. These four spheres of commitment include the following: •The Commitment of private life: It refers to commitment to various abstract, universal principles on individual level like one such maximfollowed by Mr. Cook i.e. “To whom much is given, much is required”. •The Commitment of economic agents: This refers to their …show more content…
Naikgovernment agencies, labour unions, or —through strategic alliances —with customers, suppliers, and even competitors.”A clash between these responsibilities led to the major dilemma for Mr. Cook to either compromise on customer privacy by building the backdoorin order to favour national security and the right to live in a worldincreasingly threatened by international terrorismthat operated across the seamless borders afforded by digital technologyor choose to stick his business personal commitment to preserve customer privacy since once the backdoor was created or even if a way to bypass the encryption was given out even to the government, there was guarantee that it wouldn’t be used by any other malicious user. It would put privacy of numerous customers in danger. Both causes had their own noble intentions,but a choice had to be made between themthus,causing the dilemma.Q2. Assess theways in which Tim Cook may have resolved these dilemmas.Answer. Mr. Tim Cookcould have resolved the dilemma by either agreeing to creating the backdoor for the government or providing them with the information to bypass the encryption implemented for security reasons. By doing so he could have had successfully continued to maintain his commitment as an Economic agent, Company leaderbut this could have contradicted his commitment of Private Life, responsibilities outside the firm’s boundaries that he is expected to execute. Sure, itwould have had temporarily helped the government …show more content…
Naikon the long-run this would have ended up being just another tool for the malicious users. The other way is what Mr. Tim Cook actually did i.e. to provide maximum support to the government on case to case basis but refuse to provide a backdoor or any information to bypass the securitythus,maintaining customer privacy. I believe Mr. Tim Cook took a wise, appropriate decision.He even so far as to update the security in the newer OS’s so that even his own engineers could not bypass the security anymore.This helped him maintain his commitment of Private Life, his responsibilities towards his customers (which is considered outside Firm’s boundaries as per the case study). Q3. Last yearSenatorsFeinstein and Burr released “Backdoor” Anti-Encryption Bill. Review the draft online and provide your insights.Answer. The Anti-Encryption bill called as “Compliance with Court Orders Act”was introduced by Senators Richard Burr (R-NC) and Dianne Feinstein (D-CA) (who represents California, where most of the companies that would be impacted are based) inthe month ofFebruary 2016as a result of increasingly rancorous debate over encryptionbetween the government agencies like FBI and the tech companies like Apple. If this bill was passed, it would have had requiredtech firms to decrypt customers’ data at a court’s request, essentiallyrequired theengineers to make their encryption reversible for investigators, create vulnerabilities into their products or servicesalso,potentially

You May Also Find These Documents Helpful

  • Better Essays

    In the 1970’s there was a significant change in the way that several corporations were being managed and this only increased into the 1980’s.This new type of management was developed in response to the challenges of the increasing foreign competition and the complexities of global economy along with the decline of growth and aim toward the greater power sharing and the participation of decision making. Some of these corporations that chose to change the way they manage their employees were Motorola, general Motors, Ford, Honeywell, Mead, Xerox, and GTE. The types of changes they chose are those which almost do not show the difference between employee and management. This allows the creation of organizational culture characterized by the employees caring more and knowing more and doing more. This shows the difference of how there is not the controlling of employees and their compliance to have effective behavior. What this means is that they receive commitment through the effectiveness of behavior for the goals that have been set for the lower employee.…

    • 1338 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Since 2012, the US government has spread rumors regarding the Chinese government putting spy equipment in the products of China-based companies (Schmidt, Bradsher, and Hauser). Such companies can be as large as Huawei, the global leader of ICT (information and communications technology) solutions. The rumors suggest that these China-based companies pose a risk to national security, and because of their ‘intimate link’ to the Chinese government, it is very dangerous for American companies to conduct business with them. Due to these accusations and the risk assessments for every exchange, Huawei immediately chose to exit the US market (Blagdon). This does not to reflect that the accusations are true. Rather, Huawei simply did not want to waste time while they have many opportunities around the globe. The US government is trying to save local ICT companies that are slowly going out of business because of high competitiveness, by increasing protectionism in this area would insure that jobs are kept now, but not for long. The government put out statements of possible national security threats, but never showed any evidence of spying or any sort of espionage. A probe into the issue uncovered no proof at all.…

    • 1579 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The argument being presented in the given piece is the FBI asking permission from Apple to have the ability to access people’s private messages in their apple products. This argument came into conversation after the terrorist attack in San Bernardino, California. The author’s claim towards the argument is that the FBI should not be able to have the ability to tap into people’s individual cell phones. Although the FBI’s idea of decoding Apple’s encryption code in order to gain access to tapping into all iPhones under service, it seems that the cons outweigh the pros of this certain situation. However, there has to be a completely different way the FBI can develop a better way to combat terrorism without interfering with all of Apple’s customers.…

    • 1416 Words
    • 6 Pages
    Good Essays
  • Better Essays

    The beginning of chapter 5 discusses the importance of cryptography and the legislative issues that surround government access. The debate of whether the government should have access to all encryptions we use, ultimately giving them total ability to read all communication to help fight crime and terrorism or if that is a breach of personal space. As the text attests to, "the tension between enabling secure conduct of electronic commerce and preventing secret communication among outlaws had been in the air for a decade" (Abelson, Ledeen, and Lewis 163). Later however, the government turned to helping citizens and businesses encrypt their messages to ultimately keep more information secure through packets from the construction of a system of routers (Abelson, Ledeen, and Lewis 164). However as technology has improved, the ability to create new encryption systems is…

    • 773 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Target Breach Case Study

    • 346 Words
    • 2 Pages

    Greg Steinhafel made many bad decisions during his time, whether it is a botched expansion into Canada, or the mishaps before and after the data breach in 2013 (Reisinger, 2014). Before the hack occurred, Greg displayed the managerial planning function by putting into place data security measures six months before the hacking (Riley et al., 2014). He was preparing and putting into place measures…

    • 346 Words
    • 2 Pages
    Good Essays
  • Best Essays

    Cadbury Takeover

    • 2635 Words
    • 11 Pages

    In the beginning of 2010 the US food giant took-over one of the most famous British confectionary companies, Cadbury, affectively making Kraft the largest food confectionary company in the world (Smith, 2010). According to Rigby and Masters (2010) the takeover “was one of the biggest – and most hotly contested – acquisitions in the UK”. The process was exhaustively followed by media, which criticized inability of British Government to limit takeovers of such famed British brands in the future – as it is part of the British identity. Moreover, during such process a large number of employees have suffered, not only through a large number of redundancies, but also through the change in management and overall organization of the company, which has affected employees values amongst the other factors. This assignment will be looking into various details of changes in employees values as well as relationships and overall changes of the work ethics.…

    • 2635 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    Fbl Vs Apple Company

    • 110 Words
    • 1 Page

    Security and privacy are the two rights that are always closely related but also with contradiction as they are both correct. They now are obviously shown in a big conflict and successfully cause a strong controversy upon the Apple Company and FBL. Apple refused a court order to help FBL unlock an iphone of Syed Farook, one of two shooters in the ISIS-inspired San Bernardino attack last year. Apple protests the FBL's request violate the privacy of its costumers while FBL says the purpose of doing this is for the public safety of every citizen. Whether Apple accept the order to allow the FBL to hack the iphone or…

    • 110 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    grand principals

    • 427 Words
    • 2 Pages

    Managers deal with man y business problems that can causes intense personal consideration. While deciding what to do managers uncover their intimate values, by asking questions about how engaged they are about their values that form their characters. Badarcco (1997) creates a body of work with steps for dealing with dilemmas that requires managers to look for ways to “guide the decision making process”. According to Badaracco (1997) Managers should look for concrete ways of resolving right vs. wrong situations by using good behavior with good intentions.…

    • 427 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Current Event- Foxconn

    • 652 Words
    • 3 Pages

    This article shows that Apple, being a multination corporation (MNC), has a blend of polycentric and regio-centric predisposition management strategies, dealing with human rights and labor practices. Apple at first made management decisions that were tailored to suit the culture, in this case, China; however, over the years, Apple has been scrutinized for their human rights and labor practices due to offshoring and outsourcing of jobs. In 2010 there were numerous amounts of suicides that occurred within the factories that Apple outsourced its jobs to. These suicides were due to bad working and living conditions, which stemmed from 60 hour work weeks, low pay, abuse on the job and countless other reasons.…

    • 652 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The theme of the chapter is the role of management. The author says that there is only one way to take advantages of the resources we have this through management. Management allows a better use of the resources therefore it helps to increase the level of productivity of a company or of a country.…

    • 376 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    At the first part of this essay, mains issues in the case study in relation to management control and accountability will be outlined. Moreover, this essay will be analysing the case study using contingency and institutional theory perspectives, and also comparing and contrasting these two perspectives. This essay will also discuss about the interpretation of the case differ from each perspectives.…

    • 2343 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    This talk must become very useful and practical for managers in consequence of their working with different types of human society. Because of the deepness of this topic it must be listened at least three times to understand what the talker is speaking about for real. To recognize why it is a must watch for managers it would be better to see into the specifics of the manager’s job.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Google, Inc

    • 377 Words
    • 2 Pages

    This case covers the many processes that companies/organization like Google Inc. come into play with on a day to day basis. “Adapting to changing circumstances, embracing change, being open to new ideas, and dealing effectively with ambiguity”, is what determines a company’s future. (Botha & Claassens, 2010, p. 79). These concepts are all a part of what makes or breaks a company. “To be ethical or not to be that is the question” (Alahmad, 2010, p.33)? “Management have to be sure procedures will…

    • 377 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Tim Cook does an exceptional job on exemplifying ethical communication. In his letter, Cook seems very honest and truthful man who knows what he is talking about when it comes to the company Apple. We recognize what he is saying is correct because he can back it up with facts, such as “Apple has helped create and sustain more than 1.5 million jobs across Europe” and “Apple has become the largest taxpayer in Ireland, the largest taxpayer in the United States, and the largest taxpayer in the world.” Without a doubt, one could easily tell that Cook believes Apple is being ripped off and treated unfairly of tax fraud. Cook points out some of the reasons how Apple has maintained a solid credibility. He mentions, “In Ireland and in every country…

    • 230 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    The Apple company ensures their customers of safety from any form of invasion. The public has a right to keep anyone from having access to their privacy. In the article, “The fourth Amendment and New Technologies”, Paul Larkin discusses the complications of the Fourth Amendment due to technology because it is most often used in proving cases. Because technology is a huge factor in this situation, it undermines the Fourth Amendment, “That is, the court could decide that the government may use sophisticated electronic information acquisition and analysis technology in order to protect the nation against terrorist threats, but may not use that information in an ordinary criminal prosecution unrelated to the need that justified the original search or seizure. The court will have to sort out competing constitutional values involving both law enforcement, military, and foreign intelligence needs and the privacy…

    • 2290 Words
    • 10 Pages
    Better Essays