Digital Disruption and Ethical Issues in Telstra: An Analysis
Added on 2023-06-11
16 Pages3924 Words496 Views
Political Science
|
|
|
[Type the company name]
Ethics
[Type the document subtitle]
System04002
[Pick the date]
[Type the abstract of the document here. The abstract is typically a short summary of the contents of
the document. Type the abstract of the document here. The abstract is typically a short summary of
the contents of the document.]
Ethics
[Type the document subtitle]
System04002
[Pick the date]
[Type the abstract of the document here. The abstract is typically a short summary of the contents of
the document. Type the abstract of the document here. The abstract is typically a short summary of
the contents of the document.]
![Digital Disruption and Ethical Issues in Telstra: An Analysis_1](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Ftelstra-digital-disruption-ethics_page_1.jpg&w=3840&q=10)
Executive Summary
The present report will shed light on the digital disruption event in telecom industry. As a result,
Telstra introduced several changes in the company. The data breach is another ethical issue as
the user data is made available to different software developers, which is highly confidential in
nature. These application developers will attain access to the data and have knowledge regarding
the security measures and passwords, which can be used to enter the system. Today, most of the
users are relaxed in using the electronic medium in sharing personal information. Therefore, they
use these mediums in sharing highly confidential and sensitive information. The application
users can steal the information and use it for unethical purposes. There will be changes in
software, which will impact the user privacy.
The present report will shed light on the digital disruption event in telecom industry. As a result,
Telstra introduced several changes in the company. The data breach is another ethical issue as
the user data is made available to different software developers, which is highly confidential in
nature. These application developers will attain access to the data and have knowledge regarding
the security measures and passwords, which can be used to enter the system. Today, most of the
users are relaxed in using the electronic medium in sharing personal information. Therefore, they
use these mediums in sharing highly confidential and sensitive information. The application
users can steal the information and use it for unethical purposes. There will be changes in
software, which will impact the user privacy.
![Digital Disruption and Ethical Issues in Telstra: An Analysis_2](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Ftelstra-digital-disruption-ethics_page_2.jpg&w=3840&q=10)
Table of Contents
Executive Summary.....................................................................................................................................1
List of Abbreviations and assumptions made:.............................................................................................3
Introduction.................................................................................................................................................4
Analysis of the Case by DET (Doing Ethics Technique).............................................................................4
What’s going on?.....................................................................................................................................4
What are the Facts?.................................................................................................................................4
What are the issues?................................................................................................................................5
Who is affected?......................................................................................................................................6
What are the ethical Issues and the Implications?....................................................................................6
What can be done about it?......................................................................................................................6
What are the options?..............................................................................................................................7
Which is the best option and Why?.........................................................................................................7
Assessment of the ethical consequences (IT Governance)...........................................................................7
IT Governance.........................................................................................................................................7
IT Governance and Issues........................................................................................................................7
Technologies...........................................................................................................................................8
Advantages..............................................................................................................................................9
Security and data control.........................................................................................................................9
Recommendations.....................................................................................................................................10
Conclusion.................................................................................................................................................10
References.................................................................................................................................................10
Executive Summary.....................................................................................................................................1
List of Abbreviations and assumptions made:.............................................................................................3
Introduction.................................................................................................................................................4
Analysis of the Case by DET (Doing Ethics Technique).............................................................................4
What’s going on?.....................................................................................................................................4
What are the Facts?.................................................................................................................................4
What are the issues?................................................................................................................................5
Who is affected?......................................................................................................................................6
What are the ethical Issues and the Implications?....................................................................................6
What can be done about it?......................................................................................................................6
What are the options?..............................................................................................................................7
Which is the best option and Why?.........................................................................................................7
Assessment of the ethical consequences (IT Governance)...........................................................................7
IT Governance.........................................................................................................................................7
IT Governance and Issues........................................................................................................................7
Technologies...........................................................................................................................................8
Advantages..............................................................................................................................................9
Security and data control.........................................................................................................................9
Recommendations.....................................................................................................................................10
Conclusion.................................................................................................................................................10
References.................................................................................................................................................10
![Digital Disruption and Ethical Issues in Telstra: An Analysis_3](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Ftelstra-digital-disruption-ethics_page_3.jpg&w=3840&q=10)
![Digital Disruption and Ethical Issues in Telstra: An Analysis_4](/_next/image/?url=https%3A%2F%2Fdesklib.com%2Fmedia%2Ftelstra-digital-disruption-ethics_page_4.jpg&w=3840&q=10)
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
(Solved) ACS Code of Ethics - PDFlg...
|13
|3647
|111
Digital Disruption in Telstra: Ethical Implications and Crowdsourcing Platformlg...
|14
|3868
|276
Ethical Analysis of Telstra Case Study: Privacy and Security Concerns in Digital Technologieslg...
|15
|4221
|329
ICT Implications – Telstra’s Change in Business Processlg...
|19
|4780
|89
Professional Practice and Ethicslg...
|16
|4429
|426
Edward Snowden - Ethical Issues ICT Professional Practice and Ethics Evaluationlg...
|13
|3417
|351