Conduct an ethical analysis of the case study of Telstra by implementing doing ethics technique.
The use of technology has increased between organisations, and they rely on them to provide products and services to their customers. While using these technologies, companies perform various business functions such as marketing, selling, promoting, manufacturing and others. In order to provide effective and efficient customer service experience, corporations implement information and communication technology (ICT) (Sarkar, 2012). Due to these services, corporations are able to offer high-quality customer service experience to its users. Use of technologies in the business enables enterprises to find new solutions for business problems and implement new and creative solutions for addressing such issues. It also reduces the operating costs of a company by making business processes more efficient and effective. However, there are many disadvantages faced by corporations while using modern technologies in their operations. One of the most common threats face by enterprises is cyber-attacks; the number of cyber-attack on business has grown rapidly along with the use of technologies (Uma and Padmavathi, 2013). These attacks pose a significant threat to the privacy of companies along with their customers. This report will evaluate the case study of Telstra by using doing ethics technique (DET). Furthermore, the role of IT governance will be discussed along with the technologies used by Telstra in the company. Recommendations for improving the cybersecurity will be included in the report, and a conclusion will be drawn based on the analysis.
In order to evaluate ethical issues raised in a case, the doing ethics technique (DET) can be used which evaluate the case by asking few simple questions. Based on the answers given in each question, the ethical issues can be analysed by parties in a particular scenario. The doing ethics technique focuses on evaluating a particular scenario from an ethical perspective rather than finding the best solution for the ethical problems raised in the scenario (Lekakas, Vlachos and Koritos, 2014).
What’s going on?
In this report, the case study of Telstra will be analysed. It is an Australia based telecommunication corporation. The company was founded in 1975, and it is the largest enterprise in Australia telecommunication industry (Telstra, 2018a). The corporation has gained a competitive advantage in the industry by being the fastest network in the country. Other than Australia, the operations of the company are situated in more than 20 countries across the globe. The enterprise has become the largest telecom organisations in Australia by adopting digital technologies to perform its business functions. The senior level executives of the company understand the importance of digital disruptions, and they leverage the modern technologies to perform their business functions. In 2010, the corporation adopted a digital structure to provide better customer service experience to its members (Carter-Steel et al., 2017). The main purpose of this digital disruption was to ensure that the customers are able to resolve their queries as quickly as they can increases brand loyalty. Telstra has introduced its 24/7 mobile application which provides in-house services to its customers. Based on this application, the customers are able to get access to their data, and they can easily manage their services through this application. Furthermore, the corporation introduced a crowdsupport platform for its members where they can post their queries and instantly get a solution for the issues face by them (Telstra, 2017). These services provide substantial success to the enterprise based on which it expanded its market share. However, it also increased the risk of privacy breach and security of data of the enterprise because cybercriminals can hack the online servers of the company.
Following are the facts provided in the case study.
Following are a number of issues which raised in this case study.
Telstra Corporation
The purpose of adaptation of digital technology in the business is to provide a competitive advantage in the industry. The goal of the company is to provide high quality and efficient customer service experience to its members. By relying on these technologies, customers can easily manage their account and resolve their queries from the comfort of their homes (Morley, 2017). The company is also able to provide a faster network connection to its customers by using digital technologies. Another objective of the company is to reduce its operating costs by relying on digital technologies. By using these technologies, the enterprise is able to maintain a low operating expense which resulted in increasing its profitability. However, implementation of these technologies has increased the vulnerability of data breach in the company. Cybercriminals can hack into the servers of the company and access their confidential data; they can also collect and harvest the private data of customers who use the digital technologies of the company (Redrup, 2018). Therefore, along with advantages, there are many risks associated with the implementation of digital technologies as well.
Customers of Telstra
The implementation of these technologies has improved the customer service experience of the members of Telstra. They are able to manage their services and resolve their queries by using the digital-based services of the company. The corporation has made the process of customer service experience efficient and reliable. However, the use of digital technologies has increased the risk of cyber-attacks and data breaches. The customers who use the mobile application and crowdsupport platform are vulnerable to cyber-attacks. Cybercriminals can hack into their data and collect their private data which breached their privacy. For example, in 2014, Telstra was filed by the court after breaching the privacy of over 15,775 customers which was being available online (ABC, 2014).
Hackers
It becomes easier for cybercriminals to hack into the servers of Telstra and collect the confidential data regarding the company and its customers. The adaptation of a digital structure has made it easier for cybercriminals to breach the privacy of Telstra’s customers. A recent report on cyber-attacks published by Telstra provided that over 59 percent Asian organisations face a business interrupting focused towards breaching their data at least once a month (Moon, 2018). Thus, the risks associated with adaptation of a digital structure are substantial which affects the interest of Telstra and its customers.
What are the ethical issues and implications?
What can be done about it?
In this case, Telstra can decide to shut down its mobile application and crowdsupport infrastructure to ensure that it is protected from cyber-attack. But, it will negatively affect the interest of its customers, and it will reduce the profitability of the company. On the other hand, the corporation can improve the security of its crowdsupport platform and mobile application by implementing the latest cybersecurity technology to ensure that it is protected from cyber-attacks and data breach. Customers can also avoid using the digital services of Telstra to ensure that their data is protected.
What are the options?
Following are different options available in this case.
Which option is best – and why?
The best option in this scenario is that the company should increase its investment in the cyber security structure to ensure that the data of the corporation and its customers are secured. This option is the best because it enables the company to ensure that customers are receiving high-quality services and their data is protected at the same time. This option also benefits the company because it maintains its profitability
Telstra decided to move to a digital firm in order to improve the customer services experience of its members and to reduce its overall costs. However, there are many ethical consequences relating to the adaptation of a digital structure which affects the privacy and security of its customers.
IT governance
The principles of IT governance focus on aligning the corporate objectives along with IT investments of the company. The provisions of IT governance provide information about various principles which are necessary to follow by companies while performing their business actions. Compliance with these principles ensures that the corporation made ethical decisions while making decisions regarding IT investments of the company (Tallon, Ramierz and Short, 2013). It ensures that the IT investments which are made by a corporation are focused towards achieving its corporate goals while at the same time they are focused towards protecting the interest of its stakeholders. While implementing the principles of IT governance, there are a number of issues faced by organisations such as IT risk management, delivery of value through IT, the establishment of the governance framework, auditing, activist IT department and directors and sense of teamwork (Chong and Tan, 2012). In case of Telstra, the establishment of an IT risk management is a key issue because the company deals with the data of a large number of people and it is required to implement appropriate measures to ensure that such data is protected from unauthorised access.
IT governance and issues
The Australian government is strict towards implementation of IT governance principles in organisations. There are a number of rules which corporations have to follow in order to ensure that they avoid any ethical dilemma during their business operations.
Technologies
In order to establish an effective IT structure, Telstra uses a number of technologies which provides them a competitive advantage.
Advantages
Security and Data Control
Along with strict IT regulations, the corporation has established two cybersecurity centres in order to ensure that the data of the company and its customers are protected from cyber-attacks and data breaches (Reichert, 2017). Furthermore, Security Operations Centre (SOC) has been established by the enterprise to ensure that the cyber-attacks faced by the enterprise are affectedly managed. Moreover, the corporation has implemented different IT guidelines which are necessary to comply by its employees to ensure that they did not mistakenly leak any of its classified data which can be used by cybercriminals to hack into its system. Additionally, the corporation ensures that its computer systems and data servers are physically protected to avoid unauthorised access to its data.
Telstra can comply with following recommendations to improve its cybersecurity and IT governance structure.
Conclusion
From the above observations, it can be concluded that Telstra has become the largest telecom corporation in Australia by relying on digital disruptions. The company has introduced 24/7 mobile application and a crowdsupport platform to provide high-quality customer service experience to its members. However, due to use of these technologies, issues regarding security and privacy of customers have increased because it has become easier for cybercriminals to hack into the data of its customers. In this case, the best solution is that the company should increase its investment in the cybersecurity infrastructure to protect the privacy of its customers and its data. The importance of IT governance and different technologies which are used by the company are discussed which provide a competitive advantage to the company. Recommendations are given in the report which can be used by the enterprise to improve its cybersecurity infrastructure.
References
ABC. (2014) Telstra fined after breaching privacy of 15,775 customers. [Online] ABC. Available at: https://www.abc.net.au/news/2014-03-11/telstra-breaches-privacy-of-15775-customers/5312256 [Accessed on 5th June 2018].
Cater-Steel, A., Rajaeian, M.M., Toleman, M. and Troup, D. (2017) The phenomenon of P3 community for IT support: a crowd-support case study. AIS Electronic Library.
Chong, J.L. and Tan, F.B. (2012) IT governance in collaborative networks: A socio-technical perspective. Pacific Asia Journal of the Association for Information Systems, 4(2).
Gallo, P. (2017) Key takeaways from the Telstra Cyber Security Report 2017. [Online] Netway Network. Available at: https://www.netwaynetworks.com.au/telstras-cyber-security-report-2017/ [Accessed on 5th June 2018].
Lekakos, G., Vlachos, P. and Koritos, C. (2014) Green is good but is usability better? Consumer reactions to environmental initiatives in e-banking services. Ethics and Information Technology, 16(2), pp.103-117.
LeMay, R. (2014) Australian standard published for IT governance. [Online] Delimiter. Available at: https://delimiter.com.au/2014/01/22/australian-standard-published-governance/ [Accessed on 5th June 2018].
Moon, H. (2018) Auditors face evolving cybersecurity challenges. [Online] ACCA Global. Available at: https://www.accaglobal.com/in/en/member/member/accounting-business/2017/06/practice/cybersecurity-cpd.html [Accessed on 5th June 2018].
Morley, I. (2017) Telstra maximised their real estate utilisation, streamlined their move process and saved millions. [Online] Serraview. Available at: https://serraview.com/telstra-case-study/ [Accessed on 5th June 2018].
Redrup, Y. (2018) Telstra warns of record number of ransomware attacks. [Online] Financial Review. Available at: https://www.afr.com/technology/web/security/telstra-warns-of-record-number-of-ransomware-attacks-20180404-h0yb0q [Accessed on 5th June 2018].
Reichert, C. (2017) Telstra announces two cybersecurity centres, new managed security service. [Online] ZDNet. Available at: https://www.zdnet.com/article/telstra-announces-two-cybersecurity-centres-new-managed-security-service/ [Accessed on 5th June 2018].
Sarkar, S. (2012) The role of information and communication technology (ICT) in higher education for the 21st century. Science, 1(1), pp.30-41.
Tallon, P.P., Ramirez, R.V. and Short, J.E. (2013) The information artifact in IT governance: toward a theory of information governance. Journal of Management Information Systems, 30(3), pp.141-178.
Telstra. (2017) Telstra 24X7 application. [Online] Telstra. Available at: https://crowdsupport.telstra.com.au/t5/Telstra-24×7-App/Telstra-24X7-application/td-p/693421 [Accessed on 5th June 2018].
Telstra. (2018a) Our history, leaders & value. [Online] Telstra. Available at: https://www.telstra.com.au/aboutus [Accessed on 5th June 2018].
Telstra. (2018b) Support. [Online] Telstra. Available at: https://www.telstra.com.au/support [Accessed on 5th June 2018].
Telstra. (2018c) Fibre to the Premises. [Online] Telstra. Available at: https://www.telstra.com.au/broadband/nbn/fibre-to-the-premises [Accessed on 5th June 2018].
Uma, M. and Padmavathi, G. (2013) A Survey on Various Cyber Attacks and their Classification. IJ Network Security, 15(5), pp.390-396.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download