Discuss about the Influencing the Effectiveness Of IT Governance.
In today’s competitive business world, organisations generate competitive advantage by relying on the latest technologies in order to perform their operations. Effective use of the latest technologies enables the organisations to improve their existing operations while at the same time provide their customers with high-quality services. The use of ICT technologies in the companies has proliferated in the past few years, and they enable enterprises in improving their customer services and overall efficiency. The primary advantages include reducing overall costs, improvement in efficiency, flexibility in operations, and ubiquitous data (Kritzinger and Von Solms, 2010). However, along with advantages, there are many issues relating to these technologies as well which resulted in negatively affecting the companies. There are many ethical issues which occurred due to digital disruptions. One of the key disadvantages of these technologies is the vulnerability to the cybercrimes. It is easier for cybercriminals to hack into a system of organisations when they rely on technologies to perform their task. There are many other ethical issues relating to the use of modern technologies as well. Organisations are required to comply with these information ethics principles while facing an ethical dilemma. The information ethics provides a relationship between ethical and moral principles along with use, collection, access and maintenance of data (Bulgurcu, Cavusoglu and Benbasat, 2010). The corporations also required implement policies of IT governance to ensure that they are able to avoid related issues effectively. In this report, the case study of Telstra will be evaluated by using ‘doing ethics technique’ or DET in order to analyse the ethical issues in the case. This report will also evaluate the role of IT governance and related issues and what technologies can be used by Telstra to avoid these issues. Furthermore, recommendations will be given in the report for Telstra in order to address the issues faced by the company.
The ‘doing ethics technique’ or DET assists in evaluating care from an ethical perspective. The technique focuses on asking simple questions which assist in evaluating the major ethical issues in a case (Al-Saggaf and Burmeister, 2012). The main focus of this technique is to evaluate the care ethically rather than finding the best solution.
Telstra is the largest telecommunication company in Australia; the company was founded in 1975 and its operations it provides its services in the telecommunication sector. The corporation has an international presence in over 20 countries, and it is the fastest national mobile network in Australia. The company provides over 17.6 million retail mobile services, 5.1 fixed voice services and 3.5 million retail fixed broadband services to its customers in Australia (Telstra, 2018a). In order to provide better services to its customers, the corporation has adopted a digital route. The company relied on digital disruptions in order to maintain its competitive advantage in the Australian telecommunication sector. In 2010, the corporation chanted it conservative engineering culture and adapted a must fasted structure based on digital technologies. The corporation focuses on the interest of its customers based on which it has developed 24/7 Telstra application along with crowdsupport platform.
After implementation of these technologies, the customer interaction with the company was revolutionised because it provides them the option to resolve their queries at any time while staying at the comfort of their homes (Deloitte, 2018). However, along with advantages, there are a number of issues relating to these technologies as well which negatively affect the customers and the company. Firstly, the main concern regarding the privacy of customers. In crowdsupport infrastructure, the customers can openly interact with others, and they can resolve queries and issues face by others. It raised many privacy and security concerns relating to the people using this platform. Furthermore, there is also the issue of job loss because based on this model the company promotes automation which resulted in job loss. A digital-based infrastructure increases the vulnerability of the company towards cyber-attacks based on which their data could be breached by cybercriminals.
Following are different issues which have risen in the case study of Telstra.
The main stakeholder is the company itself; it has adopted a crowdsupport platform in order to reduce its operating costs and provide fast services to its customers. In 2010, implementation of this platform was a digital disruption based on which the company was able to reduce its expenses and fulfil the requirements of its customers. However, there are many issues relating to the technology as well (Taylor, 2015). Firstly, the data of the company is stored in the cloud which makes it vulnerable to cyber-attacks. Furthermore, the company is constantly criticised for not taking appropriate actions to protect the privacy of customers who use its crowdsupport platform. The corporation was also criticised because it uses automation while performing its operations which resulted in the loss of jobs of many employees. Moreover, after a period of time, the shareholder value of the company started decreasing along with the profits of the company as the company reported a drop of 37 percent in its profits in 2017.
By using 24/7 mobile application and crowdsupport platform, the customers of Telstra are able to resolve their queries more efficiently. The customers can use the mobile application of the company to ask regarding their queries any time, and they find the solutions for their queries must faster. However, the members face issues regarding data privacy while using the crowdsupport platform than compared to traditional methods. It becomes easier for cybercriminals to hack into the servers of the company and collect the private data of its users (Sharma, 2014). It is easier for the cybercriminals to breach the security of the customers of Telstra. Thus, along with benefits, there are a number of issues faced by the customers which are relating to the breach of privacy of users.
Due to the adaptation of a digital framework, it has become easier for cybercriminals to hack into the servers of Telstra. The company is the largest telecommunication enterprise in Australia, and it has a large customer base which makes it a primary target for cybercriminals. They can hack into its servers and collect the data regarding its users for blackmailing the company or use the data to gain an unfair advantage (Barwick, 2014).
There are different alternative solutions available in this situation which can be taken by the company. In order to address the privacy and security concerns, the company can cancel its digital framework and adopt a traditional method of customer service which is relatively slower option. The company can take precautionary measures in order to improve their cybersecurity infrastructure to protect the data privacy of its customers. The corporation can also spread awareness among its customer bases in order to ensure that they take corrective actions to protect the privacy of their data.
The second option is the best because the corporation must protect the privacy of its users. The corporation understands that there is potential threat in using a digital framework while providing customers’ services, therefore, the company must take precautionary actions to protect its and customers’ data. It would also assist the company in maintaining its competitive advantage in the telecom industry.
The IT governance is referred to a formal framework which assists the corporations by providing them a structure for ensuring that their business objectives support their IT investments. It ensures that effective and efficient use of the IT in the business and it enable the company to achieve its corporate objectives (Huang, Zmud and Price, 2010). The IT governance provides that the process which is required to comply by enterprises for ensuring the effective evaluation, prioritisation, funding of competition, oversees implementation, selection and extract business benefits. The process is considered as a decision making, and oversight process and this process is the responsibility of business management. Effective use of IT governance aligns the IT infrastructure of the company with the business strategy of the company. The issues relating to IT governance include the effective establishment of IT framework, continuous auditing and assurance, IT risk management, privacy and security concerns, cloud computing, sense of teamwork, value delivery through IT and others (Ali and Green, 2012).
In Australia, there are certain principles which are necessary to be followed by companies regarding their IT governance. Following rules should be followed in the case of Telstra which are relating to IT governance in Australia.
Following are different technologies which are used by Telstra in its IT infrastructure.
The corporation has established Security Operations Centre (SOC) which focuses on managing the security of the company and its customers. The corporation has made multimillion-dollar investment in establishing SOC to build a T4 facility which protects its data from cyber breaches (Telstra, 2018b). The customer portal of the company is also completely transparent, and they can easily check the security environment of the company. The company also keep its people and premises safe from unauthorised access in order to ensure that its data is secured. The company continuously monitor its IT infrastructure to ensure that it is protected against cybercriminals (Telstra, 2018c).
Following recommendations can assist the company in addressing its IT issuers and improving its overall security.
Conclusion
In conclusion, Telstra is able to gain and maintain a competitive advantage in the telecommunication industry by providing high-quality services to its customers. The company provides such services by using its 24/7 mobile application and crowdsupport infrastructure. In order to understand the ethical issues relating to the company, doing ethics technique is used in the report. Based on such framework, different ethical issues are identified in the report such as privacy and security concerns of customers, the vulnerability of data breach, the risk of cyber-attacks, loss of jobs due to automation, and others. The best solution is that the company should invest in improving its security in order to ensure that the data of the company and its customers are safe. Different IT governance factors which are necessary to be followed by the corporation are included in the report, and the technologies which are used by the company are provided as well. The company uses these technologies to maintain its competitive advantage in the industry, and it focuses on improving the security and data control. Various recommendations are given to the company for improving its security such as the use of data encryption, increase awareness among members, and investment in top-notch cybersecurity infrastructure. Based on these recommendations, the company could improve the privacy of its customers and data and sustains its competitive advantage in the industry.
References
Ali, S. and Green, P. (2012) Effective information technology (IT) governance mechanisms: An IT outsourcing perspective. Information Systems Frontiers, 14(2), pp.179-193.
Al-Saggaf, Y. and Burmeister, O.K. (2012) Improving skill development: an exploratory study comparing a philosophical and an applied ethical analysis technique. Computer Science Education, 22(3), pp.237-255.
Barwick, H. (2014) Telstra CISO responds to customer data privacy concerns. [Online] CIO. Available at: https://www.cio.com.au/article/544825/telstra_ciso_responds_customer_data_privacy_concerns/ [Accessed on 31st May 2018].
Bulgurcu, B., Cavusoglu, H. and Benbasat, I. (2010) Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), pp.523-548.
Computer Director. (2008) IT Governance Six principles for good IT governance Aug 08. [Online] Computer Director. Available at: https://www.companydirectors.com.au/director-resource-centre/publications/company-director-magazine/2000-to-2009-back-editions/2008/august/it-governance–six-principles-for-good-it-governance-aug-08 [Accessed on 31st May 2018].
Deloitte. (2018) Digital disruption – Harnessing the ‘bang’. [Online] Deloitte. Available at: https://www2.deloitte.com/tl/en/pages/building-lucky-country/articles/digital-disruption-case-studies.html [Accessed on 31st May 2018].
Gregg, P. (2016) Creating a sustainable future with tech. [Online] Telstra Exchange. Available at: https://exchange.telstra.com.au/creating-sustainable-future/ [Accessed on 31st May 2018].
Huang, R., Zmud, R.W. and Price, R.L. (2010) Influencing the effectiveness of IT governance practices through steering committees and communication policies. European Journal of Information Systems, 19(3), pp.288-302.
Kritzinger, E. and von Solms, S.H. (2010) Cyber security for home users: A new way of protection through awareness enforcement. Computers & Security, 29(8), pp.840-847.
Pearce, R. (2017) Updated: Telstra prepares to slash 1400 jobs. [Online] Computer World. Available at: https://www.computerworld.com.au/article/620659/telstra-prepares-slash-1400-jobs/ [Accessed on 31st May 2018].
Sharma, M. (2014) Telstra breaches privacy of thousands of customers. [Online] The Sydney Morning Herald. Available at: https://www.smh.com.au/technology/telstra-breaches-privacy-of-thousands-of-customers-20140311-hvh92.html [Accessed on 31st May 2018].
Taylor, J. (2015) Inside Telstra’s digital contact centre. [Online] ZDNet. Available at: https://www.zdnet.com/article/inside-telstras-digital-contact-centre/ [Accessed on 31st May 2018].
Telstra. (2018a) Our Company. [Online] Telstra. Available at: https://www.telstra.com.au/aboutus/our-company [Accessed on 31st May 2018].
Telstra. (2018b) See the future of cyber security. [Online] Telstra. Available at: https://www.telstra.com.au/business-enterprise/solutions/security/security-operations [Accessed on 31st May 2018].
Telstra. (2018c) A better way to secure and empower your business. [Online] Telstra. Available at: https://www.telstra.com.au/business-enterprise/solutions/security/electronic-security#monitoring [Accessed on 31st May 2018].
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download