Nobody downloaded yet

Newscorp phone-Hacking - Speech or Presentation Example

Comments (0) Cite this document
Summary
The purpose of this paper "Newscorp phone-Hacking" is to identify and engage the topic of Newscorp phone-hacking. Furthermore, the study analyzes and evaluates the problem. Finally, the writer will represent a practical and realistic policy recommendation…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER92.4% of users find it useful
Newscorp phone-Hacking
Read TextPreview

Extract of sample "Newscorp phone-Hacking"

Download file to see previous pages The issue here goes much beyond phone hacking and goes to the question of corporate culture, ethics, privacy, confidentiality and freedom of speech. Journalists are traditionally have a right to investigate and they are expected to report fearlessly. The Pulitzer prize of USA is awarded to such outstanding journalists. However, what Murdoch and his hacks accomplished was not an expose into illegal dealings but an expose into the private sorrow of deceased soldiers and murdered girls. Clearly, News Corp went to a new low. However, some people have also blamed the news hungry public that constantly feeds off the cable television, the Internet and other modern media tools. Realty shows also find high viewership and in such shows, celebrities commit all types of behaviour that should not be actually shown on public TV but which the celebrities want to be shown. In addition, there are crime TV series and other such channels where the blur between acceptable and tasteless footage is very fineClearly, people place great pressure on the newsmakers, reporters and media houses to deliver and show something new and unique. TV ratings, advertisement revenues, salaries of people and survival of the media channels depends on the ‘eyeballs’ that their content generates. Thus, journalists are under great pressure to deliver what the public wants. News Corp had been hacking phones since 2005 and a large number of people read stories some of which were presumably written using phone hacks. It was only after that the journalists were caught that people were disgusted. Therefore, the audience is also partly to blame for creating a demand for such tasteless stories.


3) Practical and realistic policy recommendation
It is clear from the incident of News Corp that ethics, moral responsibility and corporate culture of news media houses is highly questionable. The government is in a very tight position. If it brings in regulations and imposes curbs on what can be published and what cannot, the whole media will revolt and cry out against censorship, forgetting the main issue of phone hacking. At the same time, if the government does not do anything, it is accused of dragging its feet and of being held to ransom by a power media house. ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Newscorp phone-Hacking Speech or Presentation Example | Topics and Well Written Essays - 750 words”, n.d.)
Newscorp phone-Hacking Speech or Presentation Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/journalism-communication/1458319-newscorp-phone-hacking
(Newscorp Phone-Hacking Speech or Presentation Example | Topics and Well Written Essays - 750 Words)
Newscorp Phone-Hacking Speech or Presentation Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/journalism-communication/1458319-newscorp-phone-hacking.
“Newscorp Phone-Hacking Speech or Presentation Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/journalism-communication/1458319-newscorp-phone-hacking.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Newscorp phone-Hacking

Ethical Hacking

...Ethical Hacking 1. Threats There have been many cyber attacks in the past that have weighed heavily on the shoulders of the victims. Three of the many examples are described here. Black Hat Crackers worked to take advantage of computer systems, and Jonathan James has been a big name among black hat crackers. He was sentenced at the age of sixteen and told the press that all he did was for fun. One instance of his great hacking is installing a backdoor into a Defense Threat Reduction Agency server and hacking sensitive information and employees’ data. In June 2005, the computer specialist, Michael Haephrati and his wife Ruth, who belonged to London, were caught sending Trojan horse...
5 Pages(1250 words)Research Paper

Hacking Exposed

...? Hacking Exposed (College Hacking Exposed Adrian Lamo Adrian Lamo is a green hat hacker who hacked a seriesof high-profile computer networks including those of The New York Times, Microsoft, and Yahoo. However, his most notorious computer crime was committed against The New York Times in 2002 when he unauthorizedly accessed into its Times’ private intranet. According to Poulsen (2002), by this hacking, he got unauthorized access mainly into paper’s social security numbers, customers’ order details, and “WireWatch” keywords. The most notable element of Lamo’s hacking activity was that he could access a database of 3000 contributors. Similarly, he could...
2 Pages(500 words)Essay

News International - Phone Hacking Scandal

...Management December 3, News International: Phone Hacking Scandal Management in most organizations is usually concerned with maximizing performance and productivity. Over the years, different theories of management have been formed in a bid to ensure efficient allocation of available resources, and ensure maximum performance by all workers, in order to achieve maximum productivity. There has also been an evolution on how individuals think on the best ways to maximize both productivity and performance. News international is an example of a company that has had to apply a number of management ideologies in its undertakings. News International is also known as the News International Group Limited. The...
8 Pages(2000 words)Research Paper

Email Hacking

...?Email Hacking Introduction Information is one of the most fundamental necessities of every individual in the contemporary age. People will access toinformation find plenty of opportunities of exceling in their academic and professional careers as well as their personal and social life. These days, the Internet is the fundamental source of information for people of all age groups everywhere in the world. Many companies e.g. budget airlines employ the Internet as their only means through which they conduct the business. This provides people with a good know-how of the use of networks as well as access to them have a great edge over others who do not have these resources. Accordingly, the more technically trained and informed people... are in...
9 Pages(2250 words)Essay

Ethical Hacking

.... For a long time, the term Ethical Hacking has been termed to be an oxymoron. This is mainly because of the misappropriate information imparted by misinformed or more appropriately, 'lesser informed' people. Since a long time, zealous and intelligent information system professionals who can get around a computer issue through innovation have categorized themselves into two categories: Black Hat Society (Crackers) and White Hat Society (Hackers). Programmers who use their skills to cause trouble, crash machines, release computer viruses, steal credit card numbers, make free long distance calls (the phone system is so much like a computer system that is a common target for computer criminals), remove...
2 Pages(500 words)Essay

Hacking Exposed

...Hacking Exposed Hacking Exposed In an article en d Jonathan James – 15 Year-Old Cybercriminal Who Hacked NASA published in the website What’s the latest? on June 20, 2010 revealed the criminal escapade involving hacking. The US Legal define computer hacking as “intentionally accesses a computer without authorization or exceeds authorized access” (US Legal, 2010, par. 1). Jonathan James, then 15 years of age, hacked the following organizations: NASA, Defense Department, and the Marshall Space Flight Center. The resulting damages were: $1.7 million software stolen from NASA; viewing the Defense Threat Reduction Agency server, the agency of the Department of Defense; and “downloaded the proprietary environmental control software... for the...
2 Pages(500 words)Essay

Ethical Hacking

.... It can be used to protect an organization against an attack because it spots out and potentially prevents intrusions that breach the system’s firewalls or those that occur behind the local area network (LAN) or the firewall (IATAC, 2009, p.3). Thus, IDS can provide organizations real-time or near-real-time monitoring of a host or a network and defend them from hacking. IDS and Detection of Footprinting stages IDS cannot always detect footprinting stages. The wrong results in an IDS are categorized into two kinds: false positives and false negatives (IATAC, 2009, p.4). False positives happen when an IDS wrongly sees a problem with benign traffic (IATAC, 2009, p.4). False negatives take place when malicious traffic is...
2 Pages(500 words)Essay

Hacking

...IT infrastructures within their business premises for gaining competitive edge in the business market. As all the companies have started utilizing the latest IT systems, the computer hacking has become the biggest threat for the computer and Internet users. The word ‘hacker’ was coined by John Nash in 1980s who was a famous mathematician on the international level. In 1972, the first technology for hacks was determined; a single whistle from the box ‘Cap n’ Crunch’ was being used for making long distance phone calls free of any charge (Himma, 2007). In 1981, Ian Murphy hacked data of AT&T and changed the clocks so that people could avail late night discounts and he was...
12 Pages(3000 words)Essay

Ethical hacking

...XEN [Penetration testing documentation] By Introduction The Xen show of virtual machines offered our understudies serverautonomy giving every learner control of a neighborhood arrangement and of a remarkable IP address on the "virtual" system for each one server so that people could work in groups, incorporating in separation taking in circumstances, and this office subsequently could be utilized either as a part of the showing space or as separation taking in. Learners were allocated into groups. They drilled in the classroom utilizing laptops and remote access and afterward kept on working at home, arranging their "ambushes" on one another by phone. One learner might make an impression on the other or port-filter the...
8 Pages(2000 words)Essay

Investigate mobile phone hacking techniques

...Mobile phone hacking techniques Introduction The present mobile phone has slight in common with the plastic bricks of the 1980s. Smartphones are fundamentally small computers individuals can use to check transfer bank funds, email, update Facebook, buy music and endlessly. As a result of this addiction on handheld devices, the possibility of these devices being hacked has developed along with the quantity of private and financial information deposited within. (Cheng) What does Mobile Phone Hacking means? Hacking of smart phone is an open to discussion drill whereby a moderator advances entrance to a...
3 Pages(750 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Speech or Presentation on topic Newscorp phone-Hacking for FREE!

Contact Us