Analyse an ICT business case study using a chosen ethical analysis framework.
In the present scenario, it has been seen that companies can create competitive advantage by focusing on the latest technologies so that activities can be conducted in a right direction. Also, if the company considers proper use of technology then it can be easy to bring improvisation in the activities and also it will bring enhancement in the quality of the services offered to the customers. With the use of ICT technologies in the organizations has proliferated in the past many years, and they have enabled many other organizations to bring change in the overall customer services (Gustafson et al., 2015).
The primary benefit is related with the reducing the overall cost and bring improvisation in the overall efficiency. Also by giving focus on the advantages it has been seen that there are also many problems which are concerned with the technologies that has given adverse effect on the growth of the company (Moore, 2014). There are various ethical problems which has taken place just because of the digital disruptions. One of the disadvantages related to these technologies is related with the vulnerability of the cybercrimes. It is simple for cybercriminals to hack the overall systems of the companies when focus is given on the technologies as it helps to conduct the activities of the company (Bidgoli and Grossklags, 2016).
There are various ethical issues concerned with the use of modern technologies. The companies need to comply with the data related to ethics at the time of facing the ethical dilemma. The information related to ethics offers a connection with the ethical and moral principle by focusing on the use, collection and access of the information. The companies also need policies to implement related to IT governance so that the problems can be reduced in an effective manner. This paper, will discuss about the case study related to Telstra and it will be analyzed by focusing on the doing ethics techniques or DET in order to evaluate the ethical problems in the overall case. This paper will also analyze the overall role of IT governance and the problems and also what the technologies should be considered by Telstra to minimize the problems faced by the company.
The “Doing Ethics technique” or DET helps in analyzing the care from an ethical view. The technique emphasizes on asking the questions which help in analyzing the major ethical problems in a given case. The emphasis is given on the technique to evaluate the care in an ethical manner and also to search the best solution.
What’s going on?
Telstra is considered as the biggest telecommunication company in Australia, the organization was established in 1975 and it offers its services in the telecommunication sector. The company has an international presence in more than 20 countries and it is one of the largest national mobile networks in Australia. The organization offers over 17.6 million services related to retail mobile services, 5.1 fixed voice services and also 3.5 million retail fixed broadband services to its consumers in Australia. To offer effective services to the customers it has been seen that the company has given focus on a digital route.
The organization has also relied on the overall digital disruptions so that the competitive advantage can be maintained in the telecom sector of Australia. It has been evaluated that in 2010, the company has focused on the conservative engineering culture and also considered a good structure which is based on the development application with the crowd support platform (Pearce, 2017).
When these technologies are implemented, the interaction of the customers with the company was revolutionized as it offers them a choice to solve the overall queries at any moment while staying in a comfort zone. With the overall benefits, there are also many problems which are related to the technologies and also it has given adverse impact on the customers as well as on the company. Initially, the main problem is related to the overall privacy of the consumers. In crowd support infrastructure, the consumers can easily communicate with each other’s and also they can easily solve the queries and other also faces the problems. It also enhanced various privacy and security issues that are related to the individuals who are focusing on this platform. It has been seen that there are also problems of job loss as it is based on the entire model the organization promotes which result in the job loss. A digital-based infrastructure enhances the vulnerability of the organization towards the cyber-attacks which are based on the information that could be breached by the cybercriminals (Patel et al., 2017).
What are the facts?
What are the issues?
Different issues raised in the case of Telstra are as follows:
Telstra
The company itself is the main stakeholder; crowd support platform is accepted by the company for the reduction in its operating cost and delivering fast services to its customers. Implementation of this platform in the year 2010 was a digital disruption by which company was able to decrease its expenditures and accomplish the needs of its customers. There are also several problems related to technology (Deloitte, 2018). Primarily, storage of company data in the cloud makes it susceptible to the cyber-attacks. Additionally, criticism of the company is done constantly for not taking proper actions by which privacy of customers using crowd support platform can be protected. Criticism of the company was also done due to the usage of automation while executing its operations. Several people lose their job due to this.
Customers
Customers of Telstra can resolve their queries more effectively by using crowd support platform and 24/7 mobile application. Mobile application of the company is used by the customers to ask about their queries and solutions to their queries are made much faster (Congress, 2017).
Data privacy problem is faced by the members while using crowd support platform. Hacking the accounts of the company and collect the personal information of its users by the cybercriminals becomes simpler. Cybercriminals find it easier to break the security of the customers of Telstra. Thus, there are both number of benefits as well as a number of problems related to user privacy faced by the customers (Jayanthi, 2017).
Cybercriminals
Cybercriminals find it easier to hack the servers of Telstra due to the digital framework adaptation. The company has a large customer base as they are the largest telecommunication firm in Australia. This feature attracts the cybercriminals and makes it is the main target for them. Data of the users of the company can be stolen by hacking into their servers which can be used by them to get an unfair advantage or it can be used to blackmail them (Leukfeldt, Lavorgna and Kleemans, 2017).
What are the ethical issues and implications?
Several actions to enhance the cybersecurity has been taken by the company by they are not sufficient to end large cyber-attacks. Financial losses are caused to the company due to the lack of security and breaching of data may also be caused (Pathak, 2016).
What can be done about it?
Several alternative solutions are available in this scenario which a company can adopt.
A company can choose a traditional method rather than a digital framework to solve the issues regarding the privacy and security. Enhancement of the cybersecurity infrastructure can be done by taking proper actions for the data privacy protection of its customers. Awareness of the customers can be made by the company such that they can protect their data privacy by taking appropriate measures.
What are the options?
Which option is best – and why?
The second option is the best among these options as it is necessary for an organization to protect the user privacy. The company recognizes the future threat in using digital framework while delivering customer service, thus proper steps should be taken by the company to secure their data as well as their customer’s data. It may also be beneficial for the company to maintain its competitive advantage (Ibrahim, 2016)
IT governance
It is related to the formal framework which helps the companies by offering them a proper structure so that goals and objectives can be achieved and also it will help in the investments. It helps to ensure the proper and efficient usage of the services related to IT in the company and it enables the organization to accomplish overall objectives and goals in an effective manner (Diehl and Frederking, 2015). It has been analyzed that IT governance offers a process which is necessary to consider that proper evaluation, funding of competition and also selection is done. The overall process is taken into consideration for decision making and also in the overall method of business management. It has been seen that proper use of the IT governance helps the company related with the IT to audit and also manage the risk issues related with the IT and also the focus is given on value delivery with the help of IT (Dawson et al., 2016).
IT Governance and problems
When the focus is given on Australia, it has been seen that there are various principles that are important to be considered by the organizations and it has a link with the IT governance. There are following rules that should be taken into consideration by focusing on Telstra which has a link with the IT governance in Australia.
Technologies
There are various technologies that are considered by the company. The following will be discussed below.
Advantages
There are various advantages like
It has been seen that the company has established security operations center that emphasizes on managing the overall security of the organization and also its consumers. The organization has focused on the multimillion-dollar investment which creates SOC so that security of the data can take place.
The recommendations are
Conclusion
By focusing on the report it has been concluded that the company is able to achieve the competitive advantage by giving good quality of the services to its customers. Also, the company is focusing on offering services so that satisfaction level can be enhanced. In the last phase, recommendations are made that can help to bring improvisation to the overall security of the consumers and also help to survive in the competitive market.
References
Bidgoli, M. and Grossklags, J., 2016, June. End user cybercrime reporting: what we know and what we can do to improve it. In Cybercrime and Computer Forensic (ICCCF), IEEE International Conference on (pp. 1-6). IEEE.
Congress, E.P., 2017. What social workers should know about ethics: Understanding and resolving practice dilemmas. Social Work Ethics, p.1909.
Dawson, G.S., Denford, J.S., Williams, C.K., Preston, D. and Desouza, K.C., 2016. An examination of effective IT governance in the public sector using the legal view of agency theory. Journal of Management Information Systems, 33(4), pp.1180-1208.
Deloitte.,2018. Digital disruption – Harnessing the ‘bang’. [Online] Deloitte. Available at: https://www2.deloitte.com/tl/en/pages/building-lucky-country/articles/digital-disruption-case-studies.html [Accessed on 5th May 2018].
Diehl, P.F. and Frederking, B. eds., 2015. The politics of global governance: international organizations in an interdependent world. Lynne Rienner Publishers.
Dubnick, M.J. and Frederickson, H.G. eds., 2015. Accountable governance: Problems and promises. ME Sharpe.
Ghernaouti-Helie, S., 2016. Cyber Power: Crime, Conflict and Security in Cyberspace. EPFL Press.
Glasser, D. and Taneja, A., 2015. A routine activity theory-based framework for combating cybercrime. In Handbook of research on digital crime, cyberspace security, and information assurance (pp. 398-406). IGI Global.
Gregg, P. ,2016. Creating a sustainable future with tech. [Online] Telstra Exchange. Available at: https://exchange.telstra.com.au/creating-sustainable-future/ [Accessed on 5th May 2018].
Gustafson, D.H., McTavish, F., Mahoney, J.E., Johnson, R.A., Lee, J.D., Quanbeck, A., Atwood, A.K., Isham, A., Veeramani, R., Clemson, L. and Shah, D., 2015. The effect of an information and communication technology (ICT) on older adults’ quality of life: study protocol for a randomized control trial. Trials, 16(1), p.191.
Hui, K.L., Kim, S.H. and Wang, Q.H., 2017. Cybercrime deterrence and international legislation: Evidence from distributed denial of service attacks. Mis Quarterly, 41(2), p.497.
Ibrahim, S., 2016. Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals. International Journal of Law, Crime and Justice, 47, pp.44-57.
Jayanthi, M.K., 2017, March. Strategic Planning for Information Security-DID Mechanism to befriend the Cyber Criminals to assure Cyber Freedom. In Anti-Cyber Crimes (ICACC), 2017 2nd International Conference on (pp. 142-147). IEEE.
Johnston, A., 2017. Privacy law: Data, metadata and personal information: A landmark ruling from the federal court. LSJ: Law Society of NSW Journal, (31), p.82.
Leukfeldt, E.R., Lavorgna, A. and Kleemans, E.R., 2017. Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime. European Journal on Criminal Policy and Research, 23(3), pp.287-300.
Levi, M., 2017. Assessing the trends, scale and nature of economic cybercrimes: overview and Issues. Crime, Law and Social Change, 67(1), pp.3-20.
Luo, Y. and Bu, J., 2016. How valuable is information and communication technology? A study of emerging economy enterprises. Journal of World Business, 51(2), pp.200-211.
Moore, R., 2014. Cybercrime: Investigating high-technology computer crime. Routledge.
Patel, P., Kannoorpatti, K., Shanmugam, B., Azam, S. and Yeo, K.C., 2017, January. A theoretical review of social media usage by cyber-criminals. In Computer Communication and Informatics (ICCCI), 2017 International Conference on (pp. 1-6). IEEE.
Pathak, P.B., 2016. Malware a Growing Cybercrime Threat: Understanding and Combating Malvertising Attacks. International Journal of Advanced Research in Computer Science, 7(2).
Pearce, R., 2017.Updated: Telstra prepares to slash 1400 jobs. [Online] Computer World. Available at: https://www.computerworld.com.au/article/620659/telstra-prepares-slash-1400-jobs/ [Accessed on 5th May 2018].
Rozman, R., 2017. The organizational function of governance: Development, problems, and possible changes. Management: journal of contemporary management issues, 5(2), pp.94-110.
Sharma, M., 2014. Telstra breaches privacy of thousands of customers. [Online] The Sydney Morning Herald. Available at: https://www.smh.com.au/technology/telstra-breaches-privacy-of-thousands-of-customers-20140311-hvh92.html [Accessed on 5th May 2018].
Vaishnavi, V.K. and Kuechler, W., 2015. Design science research methods and patterns: innovating information and communication technology. Crc Press.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download