MICT710: Analyzing Telstra's Digital Transformation & Ethical Concerns
VerifiedAdded on 2023/06/11
|19
|4877
|306
Case Study
AI Summary
This case study delves into Telstra's digital transformation, examining the ethical implications of its shift from a traditional engineering-based company to a fast-paced digital entity. It analyzes the ethical issues arising from this transformation using the Doing Ethics Technique (DET), focusing on issues like customer focus, lack of momentum in ITSM adoption, and network problems. The report identifies potential benefits of ITSM, including improved service quality and security assurance, and discusses the need for IT governance and standards to support these innovations. Furthermore, it explores the potential use of decision support systems and business analytics to achieve a competitive advantage, emphasizing the importance of integration, cost-benefit analysis, and a top-down approach with adequate funding for successful implementation. The analysis concludes with recommendations for Telstra to address these challenges and leverage IT for future success.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: TELSTRA
TELSTRA
Name of the student
Name of University
Author note
TELSTRA
Name of the student
Name of University
Author note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

1TELSTRA
Executive Summary
The service life cycle starts with understanding customer as well as user demand. On
this, a service portfolio is designed. The services are transitioned into operations where
maintained as well as managed. Continuous improvement in the system keeps the portfolio
updated. ITSM has become the complexity of organizations as well as growing maturity of IT
management. The benefits of this are to aid IT organizations to be more adaptive, cost
efficient, service-oriented, effective and more adaptive. In order to get a better picture Telstra
has commissioned Forrester Consulting to help understand how the Australian government
agencies are adopting key ITSM processes and the issues that organizations are facing in
delivering high quality information and communications technology in order to support
business services.
Executive Summary
The service life cycle starts with understanding customer as well as user demand. On
this, a service portfolio is designed. The services are transitioned into operations where
maintained as well as managed. Continuous improvement in the system keeps the portfolio
updated. ITSM has become the complexity of organizations as well as growing maturity of IT
management. The benefits of this are to aid IT organizations to be more adaptive, cost
efficient, service-oriented, effective and more adaptive. In order to get a better picture Telstra
has commissioned Forrester Consulting to help understand how the Australian government
agencies are adopting key ITSM processes and the issues that organizations are facing in
delivering high quality information and communications technology in order to support
business services.

2TELSTRA
Table of Contents
Executive Summary...................................................................................................................0
Assumptions...............................................................................................................................3
More governance, support and services are required.............................................................3
The service value chain is a priority for the government agencies........................................3
ITSM has been introduced in Australia.................................................................................4
Role of IT is changing............................................................................................................4
Introduction................................................................................................................................5
Analysis of the situation using the Doing Ethics Technique (DET)..........................................5
Analysis of the situation.............................................................................................................5
Analyzing the benefits of ITSM.............................................................................................5
Quality of the services provided by the organization.............................................................6
Security assurance..................................................................................................................6
As-a-service would become the norm....................................................................................7
In order To Be Successful, the Organization Needs ITSM....................................................7
ITSM Requires a Methodology..............................................................................................8
• Assess the current processes............................................................................................8
• Determine what ITSM processes.....................................................................................9
• To develop a work plan...................................................................................................9
• Implement a continual service improvement function..................................................10
Success Factors....................................................................................................................11
Table of Contents
Executive Summary...................................................................................................................0
Assumptions...............................................................................................................................3
More governance, support and services are required.............................................................3
The service value chain is a priority for the government agencies........................................3
ITSM has been introduced in Australia.................................................................................4
Role of IT is changing............................................................................................................4
Introduction................................................................................................................................5
Analysis of the situation using the Doing Ethics Technique (DET)..........................................5
Analysis of the situation.............................................................................................................5
Analyzing the benefits of ITSM.............................................................................................5
Quality of the services provided by the organization.............................................................6
Security assurance..................................................................................................................6
As-a-service would become the norm....................................................................................7
In order To Be Successful, the Organization Needs ITSM....................................................7
ITSM Requires a Methodology..............................................................................................8
• Assess the current processes............................................................................................8
• Determine what ITSM processes.....................................................................................9
• To develop a work plan...................................................................................................9
• Implement a continual service improvement function..................................................10
Success Factors....................................................................................................................11

3TELSTRA
People planning............................................................................................................11
Process planning...........................................................................................................11
Technology planning........................................................................................................12
Conclusion................................................................................................................................12
Recommendations....................................................................................................................12
Integration............................................................................................................................13
Sell the cost and quality impacts to the senior IT execs......................................................13
Targeting the future..............................................................................................................13
Managing new services........................................................................................................14
A top down approach as well as enough funding is necessary...........................................14
People planning............................................................................................................11
Process planning...........................................................................................................11
Technology planning........................................................................................................12
Conclusion................................................................................................................................12
Recommendations....................................................................................................................12
Integration............................................................................................................................13
Sell the cost and quality impacts to the senior IT execs......................................................13
Targeting the future..............................................................................................................13
Managing new services........................................................................................................14
A top down approach as well as enough funding is necessary...........................................14
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4TELSTRA
Assumptions
Forrester’s study provided various results. These results are as follows:-
More governance, support and services are required
Previously IT clients required skills for planning, building, designing as well as
running it (Bradlow and Jayachandra, 2015). Until now, these skills are important but the
organizations need more set of skills in order to manage, integrate and source. This need is
very important within IT organizations.
The service value chain is a priority for the government agencies
Service management ensures the right service to the right people. This is applicable
beyond IT services in the form of a general rule. Service would come into being, services
would continually change, rise over time and they would grow. Service portfolio
management has been proved the best practice in order to ensure the perfect mixture of
services for a definite organization (Jaldén and Medbo, 2016). Australian government
organizations under IT have realised that 42% of respondents have managed their service
portfolio to be their first and the second highest priority.
ITSM has been introduced in Australia
Australian government institutions are introducing ITSM and showing some great
knowledge as well as familiarity with the same. Today 37% of state, 74% of federal and 17%
of local government IT organizations have accepted ITSM. Adoption of ITSM varies with
agency size, type and implementation approach
Implementation of best practices frameworks like ITSM depends on the budget of the
organization, support provided to the organization and the knowledge that the employees of
the organization have. State and local agencies have not been able to introduce ITSM until
Assumptions
Forrester’s study provided various results. These results are as follows:-
More governance, support and services are required
Previously IT clients required skills for planning, building, designing as well as
running it (Bradlow and Jayachandra, 2015). Until now, these skills are important but the
organizations need more set of skills in order to manage, integrate and source. This need is
very important within IT organizations.
The service value chain is a priority for the government agencies
Service management ensures the right service to the right people. This is applicable
beyond IT services in the form of a general rule. Service would come into being, services
would continually change, rise over time and they would grow. Service portfolio
management has been proved the best practice in order to ensure the perfect mixture of
services for a definite organization (Jaldén and Medbo, 2016). Australian government
organizations under IT have realised that 42% of respondents have managed their service
portfolio to be their first and the second highest priority.
ITSM has been introduced in Australia
Australian government institutions are introducing ITSM and showing some great
knowledge as well as familiarity with the same. Today 37% of state, 74% of federal and 17%
of local government IT organizations have accepted ITSM. Adoption of ITSM varies with
agency size, type and implementation approach
Implementation of best practices frameworks like ITSM depends on the budget of the
organization, support provided to the organization and the knowledge that the employees of
the organization have. State and local agencies have not been able to introduce ITSM until

5TELSTRA
now. Federal agencies are twice as familiar to ITSM compared to local agencies (Will, 2017).
This is because of the amount of training provided to the smaller agencies. The
implementation approach is different in different organizations. Local agencies tend to adopt
ITSM with the help of a dedicated team. Compared to local agencies only 11% of the ITSM
is done by dedicated or focused team in federal agencies.
Role of IT is changing
Most of the IT organizations have placed themselves into a position where there s a
no win situation. This is because they have balanced challenges in their business as well as
demands along with apex expenditures. They have the ability to support, maintain the IT
systems and services and deliver those (Orange, 2015). IT organizations should think
differently in order to move ahead in this era. IT will need to accept new technology
management practices based on strategy of leverage. ITSM is one of the examples of
management practice that are adopted by IT organizations of Australian government.
Introduction
Telstra is also known as Telstra Corporation Limited. It is Australia’s biggest
telecommunications company. It builds as well as operates telecommunications markets
voice, internet, pay television, internet access, mobile and many more products as well as
services (McDougal, 2017). Telstra has been the largest producer of telecommunication
services. Inspite of being the best provider of services Telstra faced so many issues that have
affected the revenue of the company largely. The analysis of the issues and recommendations
to avoid them have been mentioned in the below paragraphs.
now. Federal agencies are twice as familiar to ITSM compared to local agencies (Will, 2017).
This is because of the amount of training provided to the smaller agencies. The
implementation approach is different in different organizations. Local agencies tend to adopt
ITSM with the help of a dedicated team. Compared to local agencies only 11% of the ITSM
is done by dedicated or focused team in federal agencies.
Role of IT is changing
Most of the IT organizations have placed themselves into a position where there s a
no win situation. This is because they have balanced challenges in their business as well as
demands along with apex expenditures. They have the ability to support, maintain the IT
systems and services and deliver those (Orange, 2015). IT organizations should think
differently in order to move ahead in this era. IT will need to accept new technology
management practices based on strategy of leverage. ITSM is one of the examples of
management practice that are adopted by IT organizations of Australian government.
Introduction
Telstra is also known as Telstra Corporation Limited. It is Australia’s biggest
telecommunications company. It builds as well as operates telecommunications markets
voice, internet, pay television, internet access, mobile and many more products as well as
services (McDougal, 2017). Telstra has been the largest producer of telecommunication
services. Inspite of being the best provider of services Telstra faced so many issues that have
affected the revenue of the company largely. The analysis of the issues and recommendations
to avoid them have been mentioned in the below paragraphs.

6TELSTRA
Analysis of the situation using the Doing Ethics Technique (DET)
Q1. What is going on?
Telstra has been facing various problems. These problems include
Not focusing on the customer:
The customer and service centricity has been evident in the IT operations team; it has
not permeated its way in the rest of the IT organization. This is still not taking an IT
component point of view of IT delivery (Pallegedara and Warren, 2016). In many factors IT
service delivery is just as strong as the weakest link as well the failure to sell the concepts of
ITIL in the parts of the IT organizations allows such week links to continue and the potential
for IT service delivery to be at its best sub optional.
Lack in momentum
When ITSM tool vendor’s professional services team as well as external ITSM
consultants is on site driving implementation, IITL based activity and change is very high.
After the teams, leave IITL adoption loses momentum and the IT organization to fail to
progress further with its journey to increase ITSM maturity (Freeland-Small, 2015). This is
caused due to the firefighting nature of the IT organizations. At this moment, there is no time
or resource for improvement. As a result, IT organizations are never able to achieve their
objectives fully. They do not improve their level of ITSM maturity nor do they improve their
IT support and IT services delivery to the organization.
Q2. What are the facts?
Various facts regarding the problems faced by the IT executives of Telstra are-
A survey that has been carried out on Telstra across some countries like Hong Kong, India
and Singapore and Australia yielded that among all the organizations 59% of them have
Analysis of the situation using the Doing Ethics Technique (DET)
Q1. What is going on?
Telstra has been facing various problems. These problems include
Not focusing on the customer:
The customer and service centricity has been evident in the IT operations team; it has
not permeated its way in the rest of the IT organization. This is still not taking an IT
component point of view of IT delivery (Pallegedara and Warren, 2016). In many factors IT
service delivery is just as strong as the weakest link as well the failure to sell the concepts of
ITIL in the parts of the IT organizations allows such week links to continue and the potential
for IT service delivery to be at its best sub optional.
Lack in momentum
When ITSM tool vendor’s professional services team as well as external ITSM
consultants is on site driving implementation, IITL based activity and change is very high.
After the teams, leave IITL adoption loses momentum and the IT organization to fail to
progress further with its journey to increase ITSM maturity (Freeland-Small, 2015). This is
caused due to the firefighting nature of the IT organizations. At this moment, there is no time
or resource for improvement. As a result, IT organizations are never able to achieve their
objectives fully. They do not improve their level of ITSM maturity nor do they improve their
IT support and IT services delivery to the organization.
Q2. What are the facts?
Various facts regarding the problems faced by the IT executives of Telstra are-
A survey that has been carried out on Telstra across some countries like Hong Kong, India
and Singapore and Australia yielded that among all the organizations 59% of them have
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7TELSTRA
detected minimum one security breach that has been interrupting their business. This breach
takes place every month. This calculates to be more than double of the breaches that took
place in 2015. Many government organizations have decided that the breaches that are taking
place would be reported to the customers. This proves that cyber security is not an IT
problem; it has become a business problem. Many companies are providing data security
services around 2017 (Fitzgerald and Dwyer, 2017). The main key regarding cyber security is
that the businesses get a control on their data value, where is it situated, which has access of
the data and how properly is it protected. In order to keep data safe the It security experts
suggested starting from the top level.
Many organizations have provided the freedom to work from home. Their working
site is accessible from any device any time. They have already offered cloud services that
would be secured which would allow access to any data without any effort. Telstra has
introduced a solution for this, which can complete the puzzle. This solution includes mobile
telephony and fixed-line into one. This allows the workers to transit between devices during
an ongoing business call. This is done from desk phone to mobile and then to laptop then
tablet and again in the back process if required. In order to use the same number in all devices
so that the clients are able to have an immediate impression on the physical presence of the
business. With just a single tap, workers would be able to transfer the ongoing call to an
employee. They can also switch their phones from work number in to their personal number.
Q3. What are the issues?
Telstra faces various issues. Network issue is on of the major issues faced by Telstra.
This issue was previously a problem for just customers, but gradully it has become a major
problem for the company (Nacht, 2016). At first Telstra pushed back or ignored this mishap
series by saying just a bad luck. In this particular issue, frequency of the network is the root
of the issue.
detected minimum one security breach that has been interrupting their business. This breach
takes place every month. This calculates to be more than double of the breaches that took
place in 2015. Many government organizations have decided that the breaches that are taking
place would be reported to the customers. This proves that cyber security is not an IT
problem; it has become a business problem. Many companies are providing data security
services around 2017 (Fitzgerald and Dwyer, 2017). The main key regarding cyber security is
that the businesses get a control on their data value, where is it situated, which has access of
the data and how properly is it protected. In order to keep data safe the It security experts
suggested starting from the top level.
Many organizations have provided the freedom to work from home. Their working
site is accessible from any device any time. They have already offered cloud services that
would be secured which would allow access to any data without any effort. Telstra has
introduced a solution for this, which can complete the puzzle. This solution includes mobile
telephony and fixed-line into one. This allows the workers to transit between devices during
an ongoing business call. This is done from desk phone to mobile and then to laptop then
tablet and again in the back process if required. In order to use the same number in all devices
so that the clients are able to have an immediate impression on the physical presence of the
business. With just a single tap, workers would be able to transfer the ongoing call to an
employee. They can also switch their phones from work number in to their personal number.
Q3. What are the issues?
Telstra faces various issues. Network issue is on of the major issues faced by Telstra.
This issue was previously a problem for just customers, but gradully it has become a major
problem for the company (Nacht, 2016). At first Telstra pushed back or ignored this mishap
series by saying just a bad luck. In this particular issue, frequency of the network is the root
of the issue.

8TELSTRA
Customers claim to pay a huge amount of money while they take premium services of
the company. This was because of the superior quality of network quality provided by
Telstra. Telstra used to provide better quality services compared to its competitors (Thomas,
Burmeister and Low, 2017). The recent problem faced by the company has embarrassed it
largely. The main problem that the company faces is that it needs to retain the prices of
premium services. This would help them to maintain the trust of the loyal customers. This
would help the company to keep the loyal customers but it would fail to gain new
subscribers.
Q4. Who is affected?
The problems faced by Telstra affects the customer in first instance. It causes huge
damage to the company’s business. The network quality that has been deteriorated results in
customers to unsubscribe from the company’s premium services (Thomas, Low and
Burmeister, 2018). This yields the company to lose its loyal and regular customers.
Customers are u happy with the services provided by the company. Besides losing new
subscribers, the company is also losing its regular customers. The issues have affected the
business a lot. Their revenue has decreased largely.
Q5. What are the ethical issues and their implications?
The ethical problems faced by Telstra include the avoidance of the issue faced by the
company. When Telstra faced the network problem for the first time, the company ignored it
and considered it would get normal in some time (Thomas, Burmeister and Low, 2017). This
made the company lose its customers largely. The customers waited for the company to
resolve the issues. They thought it would get resolved very soon. In addition, they did not
abandon to the premium services of the company. After a definite time when the company
Customers claim to pay a huge amount of money while they take premium services of
the company. This was because of the superior quality of network quality provided by
Telstra. Telstra used to provide better quality services compared to its competitors (Thomas,
Burmeister and Low, 2017). The recent problem faced by the company has embarrassed it
largely. The main problem that the company faces is that it needs to retain the prices of
premium services. This would help them to maintain the trust of the loyal customers. This
would help the company to keep the loyal customers but it would fail to gain new
subscribers.
Q4. Who is affected?
The problems faced by Telstra affects the customer in first instance. It causes huge
damage to the company’s business. The network quality that has been deteriorated results in
customers to unsubscribe from the company’s premium services (Thomas, Low and
Burmeister, 2018). This yields the company to lose its loyal and regular customers.
Customers are u happy with the services provided by the company. Besides losing new
subscribers, the company is also losing its regular customers. The issues have affected the
business a lot. Their revenue has decreased largely.
Q5. What are the ethical issues and their implications?
The ethical problems faced by Telstra include the avoidance of the issue faced by the
company. When Telstra faced the network problem for the first time, the company ignored it
and considered it would get normal in some time (Thomas, Burmeister and Low, 2017). This
made the company lose its customers largely. The customers waited for the company to
resolve the issues. They thought it would get resolved very soon. In addition, they did not
abandon to the premium services of the company. After a definite time when the company

9TELSTRA
kept ignoring the problems faced by its customers, people unsubscribed to its services
(Wilton, 2017). when the company took the issue seriously, many customers have already
unsubscribed.
Q6. What could have been done about it?
The company could take the issue seriously and resolve it when it got a hint regarding
the same. Ignoring it was the worst decision that it took. The company could have hired IT
experts and resolved the issue as soon as possible. The company could also hire good
decision makers who could take better decisions in such situations (Daly, 2015). The decision
takers are an important part of every company. They take decisions during any situation.
They play an important role when a critical situation arises.
Q7. What are the options?
The options that the company had are hiring a good decision maker who would take
decisions intellectually during tough situations. The company could hire good IT experts who
would detect the issue properly and resolve them as soon as possible (Turban, Whiteside and
Outland, 2017). This would help the company in many ways. It would not have lost its honest
customers. They should not have ignored it whenever they have to know about the issues
facing by the problem. They should have had better backup services that could balance the
damage caused by the issues already faced by the company.
Q8. Which option is the best and why?
The best option for the company was to take required action on the issues faced by the
company. The company should not have ignored the problem. This option is the best because
it should not have lost its customers (O'Connor, 2014). The loyal customers who had
subscribed to Telstra’s premium services would not have stopped using them.
kept ignoring the problems faced by its customers, people unsubscribed to its services
(Wilton, 2017). when the company took the issue seriously, many customers have already
unsubscribed.
Q6. What could have been done about it?
The company could take the issue seriously and resolve it when it got a hint regarding
the same. Ignoring it was the worst decision that it took. The company could have hired IT
experts and resolved the issue as soon as possible. The company could also hire good
decision makers who could take better decisions in such situations (Daly, 2015). The decision
takers are an important part of every company. They take decisions during any situation.
They play an important role when a critical situation arises.
Q7. What are the options?
The options that the company had are hiring a good decision maker who would take
decisions intellectually during tough situations. The company could hire good IT experts who
would detect the issue properly and resolve them as soon as possible (Turban, Whiteside and
Outland, 2017). This would help the company in many ways. It would not have lost its honest
customers. They should not have ignored it whenever they have to know about the issues
facing by the problem. They should have had better backup services that could balance the
damage caused by the issues already faced by the company.
Q8. Which option is the best and why?
The best option for the company was to take required action on the issues faced by the
company. The company should not have ignored the problem. This option is the best because
it should not have lost its customers (O'Connor, 2014). The loyal customers who had
subscribed to Telstra’s premium services would not have stopped using them.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10TELSTRA
Analysis of the situation
Analyzing the benefits of ITSM
The new role of IT is to improve the sustainability and increase its scalability on
government platforms. For this purpose, a new management platform is necessary. It is a
logical living framework in order to manage IT services, these services are suppose to work
in various circumstances. ITSM describes the effectiveness and efficiency of the service life
cycle and gives a framework for governance for managing the services (Wijesinghe,
Scheepers and Mcloughlin, 2016). By connecting the different needs in the plan that has been
build, and operate teams, IT organizations are claiming improved efficiency, quality as well
as cost.
Quality of the services provided by the organization
Sloppy change management, for example, can cause business downtime that prevents
customers from leveraging the organization online services (Campbell, 2017). This causes a
decrease in satisfaction and reduces the productivity of the organization workforce. Reducing
problem resolution time that in turn improves uptime and customer experience is just one
example that indirectly improves the quality of a service.
Assurance of proper security
Securing an extended government organization will require strategies that encompass
both architecture and infrastructure. Traditionally, enterprise security tasks focus on securing
organization endpoints, data centers, and extranet infrastructure and applications — in other
words, we typically focus on protecting assets that the organization manages or over which it
has direct control.
Analysis of the situation
Analyzing the benefits of ITSM
The new role of IT is to improve the sustainability and increase its scalability on
government platforms. For this purpose, a new management platform is necessary. It is a
logical living framework in order to manage IT services, these services are suppose to work
in various circumstances. ITSM describes the effectiveness and efficiency of the service life
cycle and gives a framework for governance for managing the services (Wijesinghe,
Scheepers and Mcloughlin, 2016). By connecting the different needs in the plan that has been
build, and operate teams, IT organizations are claiming improved efficiency, quality as well
as cost.
Quality of the services provided by the organization
Sloppy change management, for example, can cause business downtime that prevents
customers from leveraging the organization online services (Campbell, 2017). This causes a
decrease in satisfaction and reduces the productivity of the organization workforce. Reducing
problem resolution time that in turn improves uptime and customer experience is just one
example that indirectly improves the quality of a service.
Assurance of proper security
Securing an extended government organization will require strategies that encompass
both architecture and infrastructure. Traditionally, enterprise security tasks focus on securing
organization endpoints, data centers, and extranet infrastructure and applications — in other
words, we typically focus on protecting assets that the organization manages or over which it
has direct control.

11TELSTRA
In order To Be Successful, the Organization Needs ITSM
Thirty-six percent of the respondents ranked “making ITSM a priority” as their first
choice of barriers to adoption. This indicates that ITSM is seen as a competing priority with
other priorities that IT government organizations might have. At the same time, government
agencies claim that supporting services is a high priority — 47% indicated that operating,
optimizing, and supporting services is their highest priority. ITSM does have its roots in the
IT operations space. However, recent iterations such as ITIL v3 and ITIL 2011 have adopted
a much more holistic perspective of managing the service from its initiation and onto
operation. The biggest issue is that to implement ITSM, IT organizations need to understand
what their challenges are and what to improve. This is where the development of a strategy
and road map comes into play. An ITSM strategy needs to be developed in alignment with
the strategy of the government agency to support its goals and plans of growth, customer
alignment, or other demands and agendas (Melendez, Dávila and Pessoa, 2016).
ITSM Requires a Methodology
IT infrastructure and operation professionals work in a domain that is full of
uncertainty and complexity, making improvements difficult. However, organizations that had
had better understand their goals; process maturity, culture, behavior, skills, and capabilities
cannot only work to improve that capability but also gain the ability to make more-effective
investment decisions. ITSM provides a framework that encourages a broad holistic approach
to service management that considers internal and external groups. Infrastructure and
operation professionals should look to ITSM to rethink the delivery and support of services
within their organization (Rahman, 2015). Adopting and continuously driving ITSM requires
a methodology; Forrester recommends that IT leaders apply the following points:
Understand the requirements of end users
In order To Be Successful, the Organization Needs ITSM
Thirty-six percent of the respondents ranked “making ITSM a priority” as their first
choice of barriers to adoption. This indicates that ITSM is seen as a competing priority with
other priorities that IT government organizations might have. At the same time, government
agencies claim that supporting services is a high priority — 47% indicated that operating,
optimizing, and supporting services is their highest priority. ITSM does have its roots in the
IT operations space. However, recent iterations such as ITIL v3 and ITIL 2011 have adopted
a much more holistic perspective of managing the service from its initiation and onto
operation. The biggest issue is that to implement ITSM, IT organizations need to understand
what their challenges are and what to improve. This is where the development of a strategy
and road map comes into play. An ITSM strategy needs to be developed in alignment with
the strategy of the government agency to support its goals and plans of growth, customer
alignment, or other demands and agendas (Melendez, Dávila and Pessoa, 2016).
ITSM Requires a Methodology
IT infrastructure and operation professionals work in a domain that is full of
uncertainty and complexity, making improvements difficult. However, organizations that had
had better understand their goals; process maturity, culture, behavior, skills, and capabilities
cannot only work to improve that capability but also gain the ability to make more-effective
investment decisions. ITSM provides a framework that encourages a broad holistic approach
to service management that considers internal and external groups. Infrastructure and
operation professionals should look to ITSM to rethink the delivery and support of services
within their organization (Rahman, 2015). Adopting and continuously driving ITSM requires
a methodology; Forrester recommends that IT leaders apply the following points:
Understand the requirements of end users

12TELSTRA
The goal of ITSM is to align IT services with business objectives and customers’
needs. To achieve this goal, IT must understand the requirements from the end users
(Forsgren and Humble, 2015). The creation of a service strategy that defines the portfolio of
services to be offered and the end user to be supported is the first step in an ITSM journey.
Invest in technology to be used
Once the organization has prioritized the ITSM processes to mature, the organization
next step should be to review the organization existing ITSM tools and how they are being
used. To get started, assess the organization tools portfolio based on the organization ITSM
processes. Develop an inventory of current IT management tools to identify gaps and
opportunities for tool rationalization based on where the organization is sufficient or deficient
on ITSM process.
Success Factors
Almost any process or improvement around a system requires the understanding,
definition, and achievement of benefits. Additionally, influencing factors that facilitate or
impede its success need to be considered. Critical success factors are the few key areas that
must go right for something to take effect.5 ITSM involves the strategy, design, transition,
operation, and continual improvement of services. Adopting the ITIL framework and
implementing ITSM is not the end goal; it is a means to achieving improvements to
Productivity, quality, business reputation, and low costs (Morana, Schacht and Gerards,
2015). To deliver these benefits, ITSM adoption with the far too common “build it and they
will come” approach will not work. Because adopting ITIL requires considerable time,
resource, and organizational change management, Forrester finds that one of the most critical
success factors for ITIL is planning. Planning should be inserted across three key areas:
The goal of ITSM is to align IT services with business objectives and customers’
needs. To achieve this goal, IT must understand the requirements from the end users
(Forsgren and Humble, 2015). The creation of a service strategy that defines the portfolio of
services to be offered and the end user to be supported is the first step in an ITSM journey.
Invest in technology to be used
Once the organization has prioritized the ITSM processes to mature, the organization
next step should be to review the organization existing ITSM tools and how they are being
used. To get started, assess the organization tools portfolio based on the organization ITSM
processes. Develop an inventory of current IT management tools to identify gaps and
opportunities for tool rationalization based on where the organization is sufficient or deficient
on ITSM process.
Success Factors
Almost any process or improvement around a system requires the understanding,
definition, and achievement of benefits. Additionally, influencing factors that facilitate or
impede its success need to be considered. Critical success factors are the few key areas that
must go right for something to take effect.5 ITSM involves the strategy, design, transition,
operation, and continual improvement of services. Adopting the ITIL framework and
implementing ITSM is not the end goal; it is a means to achieving improvements to
Productivity, quality, business reputation, and low costs (Morana, Schacht and Gerards,
2015). To deliver these benefits, ITSM adoption with the far too common “build it and they
will come” approach will not work. Because adopting ITIL requires considerable time,
resource, and organizational change management, Forrester finds that one of the most critical
success factors for ITIL is planning. Planning should be inserted across three key areas:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13TELSTRA
Planning people management
Understanding and determining the right people on the project team is most important
to ITSM programs and projects. Additionally ensuring that planning, communication,
awareness, and education activities are a focus area to encourage employee inclusion and
prevent as well as manage resistance.
Process planning.
Many organizations are not able to see the current state of their ITSM and ITIL
processes. Before undergoing any sort of process improvement program, IT organizations
must determine their current state and which processes is most important going forward to
deliver key business priorities or solve key business plans (Jäntti and Hotti, 2016). Successful
ITSM implementations have prioritized the processes and then conducted a maturity
assessment to close gaps between where the organization stands and where it wants to be.
Technology planning.
Getting the right ITSM technology is not as big a key contributor to success as many
might think. Too many IT organizations, unhappy with their current ITSM technology, jump
feet first into replacement mode. This is the equivalent of applying a new coat of paint to a
house that is falling down; people will still not want to live there.
Conclusion
From the above paragraphs, it can be concluded that despite being the best
telecommunication service provider Telstra has faced many issues and it has been affected
due to this. It has lost many of its loyal customers. The ignorance and casual attitude towards
the problems faced by the customers, Telstra had to lose many of its loyal customers. Some
recommendations to overcome the issues have been mentioned below.
Planning people management
Understanding and determining the right people on the project team is most important
to ITSM programs and projects. Additionally ensuring that planning, communication,
awareness, and education activities are a focus area to encourage employee inclusion and
prevent as well as manage resistance.
Process planning.
Many organizations are not able to see the current state of their ITSM and ITIL
processes. Before undergoing any sort of process improvement program, IT organizations
must determine their current state and which processes is most important going forward to
deliver key business priorities or solve key business plans (Jäntti and Hotti, 2016). Successful
ITSM implementations have prioritized the processes and then conducted a maturity
assessment to close gaps between where the organization stands and where it wants to be.
Technology planning.
Getting the right ITSM technology is not as big a key contributor to success as many
might think. Too many IT organizations, unhappy with their current ITSM technology, jump
feet first into replacement mode. This is the equivalent of applying a new coat of paint to a
house that is falling down; people will still not want to live there.
Conclusion
From the above paragraphs, it can be concluded that despite being the best
telecommunication service provider Telstra has faced many issues and it has been affected
due to this. It has lost many of its loyal customers. The ignorance and casual attitude towards
the problems faced by the customers, Telstra had to lose many of its loyal customers. Some
recommendations to overcome the issues have been mentioned below.

14TELSTRA
Recommendations
Recommendations that can be applied are as follows:-
Budgets are available at both the type of organizations, federal as well as state.
Complexity in IT sectors increase day by day are scarcity of well-qualified technical skills is
faced. Usage of ITSM provides two results. These results include increasing the effectiveness
as well as the efficiency of IT operations and increasing the quality of operations. This also
adds up the further savings. The savings is done by reducing the amount of resources that is
being used for fixing problems. The surveys performed by Forrester’s on IT government
executives that have implemented IISM, resulted in cellar recommendations for actions by
the ones seeking quality as well as efficiency. The following recommendations can be
applied.
Integration
ITSM allows organizations to manage as well as integrate processes at various levels.
For its full affect, they need to tie up into higher level ITSM strategy. For example if the
organization is introducing self-service activities, these activities need to be described in a
service catalog. This catalog is a part of service portfolio. This service catalog would include
a variety of service items. Some of them may be directly delivered by the government IT
organizations and some of them might be by an outsourcer or partner. These services should
have SLAs that would describe the cost as well as the quality of the service provided by the
organization.
Sell the cost and quality impacts to the senior IT execs
IT leadership is driving ITSM, so focus on it. Present the labor savings and quality
improvements to get started. Then, based on early successes, add strategic justifications for
Recommendations
Recommendations that can be applied are as follows:-
Budgets are available at both the type of organizations, federal as well as state.
Complexity in IT sectors increase day by day are scarcity of well-qualified technical skills is
faced. Usage of ITSM provides two results. These results include increasing the effectiveness
as well as the efficiency of IT operations and increasing the quality of operations. This also
adds up the further savings. The savings is done by reducing the amount of resources that is
being used for fixing problems. The surveys performed by Forrester’s on IT government
executives that have implemented IISM, resulted in cellar recommendations for actions by
the ones seeking quality as well as efficiency. The following recommendations can be
applied.
Integration
ITSM allows organizations to manage as well as integrate processes at various levels.
For its full affect, they need to tie up into higher level ITSM strategy. For example if the
organization is introducing self-service activities, these activities need to be described in a
service catalog. This catalog is a part of service portfolio. This service catalog would include
a variety of service items. Some of them may be directly delivered by the government IT
organizations and some of them might be by an outsourcer or partner. These services should
have SLAs that would describe the cost as well as the quality of the service provided by the
organization.
Sell the cost and quality impacts to the senior IT execs
IT leadership is driving ITSM, so focus on it. Present the labor savings and quality
improvements to get started. Then, based on early successes, add strategic justifications for

15TELSTRA
continued service management — like better alignment with the business and a strong
integration into service providers.
Targeting the future
It is difficult to arrive at a place without intending to reach it. Therefore, while cost
reduction and quality are the best places to start — and an incremental approach is most
likely to succeed — the organization should figure out the long-term opportunities for ITSM
at the organization’s agency. Consider addressing the entire services life cycle — including
all of the organization sourcing partners, building a business-value proposition for these
services, and improving IT-business alignment as a result. Then regularly review the
organization short-term progress in terms of achieving both the cost-benefit targets that drive
the initial funding as well as the ongoing ability to achieve big-picture results.
Managing new services
The gap between business priorities and IT delivery capabilities will be filled by a
variety of technology services providers, from traditional IT services outsourcing incumbents
to upstarts with cloud- and software-as-a-service-based business models.
A top down approach as well as enough funding is necessary
To achieve benefits with ITSM governance and best practices, three critical success
factors are important: Budget needs to be available. ITSM is an investment in people,
process, and technology. The return on investment of ITSM is achieved through the
investment in best practices that are able to streamline and automate processes to design,
deliver, and maintain IT services to the respective organizations. Make ITSM a priority with
goals and strategy. Top-down support is needed.
continued service management — like better alignment with the business and a strong
integration into service providers.
Targeting the future
It is difficult to arrive at a place without intending to reach it. Therefore, while cost
reduction and quality are the best places to start — and an incremental approach is most
likely to succeed — the organization should figure out the long-term opportunities for ITSM
at the organization’s agency. Consider addressing the entire services life cycle — including
all of the organization sourcing partners, building a business-value proposition for these
services, and improving IT-business alignment as a result. Then regularly review the
organization short-term progress in terms of achieving both the cost-benefit targets that drive
the initial funding as well as the ongoing ability to achieve big-picture results.
Managing new services
The gap between business priorities and IT delivery capabilities will be filled by a
variety of technology services providers, from traditional IT services outsourcing incumbents
to upstarts with cloud- and software-as-a-service-based business models.
A top down approach as well as enough funding is necessary
To achieve benefits with ITSM governance and best practices, three critical success
factors are important: Budget needs to be available. ITSM is an investment in people,
process, and technology. The return on investment of ITSM is achieved through the
investment in best practices that are able to streamline and automate processes to design,
deliver, and maintain IT services to the respective organizations. Make ITSM a priority with
goals and strategy. Top-down support is needed.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

16TELSTRA
References
Bradlow, H. and Jayachandra, A., 2015. How digital infrastructure can substitute for physical
infrastructure.
Campbell, I., 2017. Telstra's future mode of operation: Network transformation between 1992
to 1993. Australian Journal of Telecommunications and the Digital Economy, 5(4), p.18.
Daly, A., 2015. The Law and Ethics of'Self Quantified'Health Information: An Australian
Perspective.
Fitzgerald, A.M. and Dwyer, N., 2017. Copyright in databases in Australia.
Forsgren, N. and Humble, J., 2015. DevOps: profiles in ITSM performance and contributing
factors.
Freeland-Small, P., 2015. Organisational psychology celebrated at the inaugural workplace
excellence awards. InPsych: The Bulletin of the Australian Psychological Society Ltd, 37(4),
p.38.
Jaldén, N., Medbo, J., Asplund, H., Tompson, N. and Sundman, D., 2016, October. Indoor
high-resolution channel characterization. In Antennas and Propagation (ISAP), 2016
International Symposium on (pp. 618-619). IEEE.
McDougal, M., 2017. Insights from the company monitor: Telstra. Equity, 31(11), p.15.
Melendez, K., Dávila, A. and Pessoa, M., 2016. Information technology service management
models applied to medium and small organizations: A systematic literature review. Computer
Standards & Interfaces, 47, pp.120-127.
Morana, S., Schacht, S., Gerards, T. and Maedche, A., 2015. ITSM ProcessGuide–A
longitudinal and multi-method field study for real-world DSR artifact evaluation. In At the
References
Bradlow, H. and Jayachandra, A., 2015. How digital infrastructure can substitute for physical
infrastructure.
Campbell, I., 2017. Telstra's future mode of operation: Network transformation between 1992
to 1993. Australian Journal of Telecommunications and the Digital Economy, 5(4), p.18.
Daly, A., 2015. The Law and Ethics of'Self Quantified'Health Information: An Australian
Perspective.
Fitzgerald, A.M. and Dwyer, N., 2017. Copyright in databases in Australia.
Forsgren, N. and Humble, J., 2015. DevOps: profiles in ITSM performance and contributing
factors.
Freeland-Small, P., 2015. Organisational psychology celebrated at the inaugural workplace
excellence awards. InPsych: The Bulletin of the Australian Psychological Society Ltd, 37(4),
p.38.
Jaldén, N., Medbo, J., Asplund, H., Tompson, N. and Sundman, D., 2016, October. Indoor
high-resolution channel characterization. In Antennas and Propagation (ISAP), 2016
International Symposium on (pp. 618-619). IEEE.
McDougal, M., 2017. Insights from the company monitor: Telstra. Equity, 31(11), p.15.
Melendez, K., Dávila, A. and Pessoa, M., 2016. Information technology service management
models applied to medium and small organizations: A systematic literature review. Computer
Standards & Interfaces, 47, pp.120-127.
Morana, S., Schacht, S., Gerards, T. and Maedche, A., 2015. ITSM ProcessGuide–A
longitudinal and multi-method field study for real-world DSR artifact evaluation. In At the

17TELSTRA
Vanguard of Design Science: First Impressions and Early Findings from Ongoing Research
Research-in-Progress Papers and Poster Presentations from the 10th International
Conference, DESRIST 2015. Dublin, Ireland, 20-22 May.. DESRIST 2015.
Nacht, J., 2016. Knowledge Discovery And Data Mining Current Issues And New
Applications 4th Pacific Asia Conference Pakdd 2000 Kyoto Japan April 18 20. Issues, 1,
p.4.
O'Connor, S., 2014. Responsible investment-What, how and why?. Equity, 28(9), p.4.
Orange, A., 2015, March. Re-farming 2G bands–ASEAN situation. In Workshop on re-
farming 2G bands.
Pallegedara, D. and Warren, M., 2016. Unauthorised Disclosure of Organisational
Information through Social Media: A Policy Perspective. IDIMC 2016, p.86.
Rahman, A.A., 2015, December. Defining Methodology for Multi Model Software Process
Improvement Framework. In Artificial Intelligence, Modelling and Simulation (AIMS), 2015
3rd International Conference on (pp. 245-249). IEEE.
Thomas, G., Burmeister, O.K. and Low, G., 2017. Issues of Implied Trust in Ethical Hacking.
In Proceedings of The 28th Australasian Conference on Information Systems, December (pp.
4-6).
Thomas, G., Low, G. and Burmeister, O., 2018. “Who Was That Masked Man?”: System
Penetrations—Friend or Foe?. In Cyber Weaponry (pp. 113-124). Springer, Cham.
Turban, E., Whiteside, J., King, D. and Outland, J., 2017. Implementation Issues: From
Globalization to Justification, Privacy, and Regulation. In Introduction to Electronic
Commerce and Social Commerce (pp. 383-413). Springer, Cham.
Vanguard of Design Science: First Impressions and Early Findings from Ongoing Research
Research-in-Progress Papers and Poster Presentations from the 10th International
Conference, DESRIST 2015. Dublin, Ireland, 20-22 May.. DESRIST 2015.
Nacht, J., 2016. Knowledge Discovery And Data Mining Current Issues And New
Applications 4th Pacific Asia Conference Pakdd 2000 Kyoto Japan April 18 20. Issues, 1,
p.4.
O'Connor, S., 2014. Responsible investment-What, how and why?. Equity, 28(9), p.4.
Orange, A., 2015, March. Re-farming 2G bands–ASEAN situation. In Workshop on re-
farming 2G bands.
Pallegedara, D. and Warren, M., 2016. Unauthorised Disclosure of Organisational
Information through Social Media: A Policy Perspective. IDIMC 2016, p.86.
Rahman, A.A., 2015, December. Defining Methodology for Multi Model Software Process
Improvement Framework. In Artificial Intelligence, Modelling and Simulation (AIMS), 2015
3rd International Conference on (pp. 245-249). IEEE.
Thomas, G., Burmeister, O.K. and Low, G., 2017. Issues of Implied Trust in Ethical Hacking.
In Proceedings of The 28th Australasian Conference on Information Systems, December (pp.
4-6).
Thomas, G., Low, G. and Burmeister, O., 2018. “Who Was That Masked Man?”: System
Penetrations—Friend or Foe?. In Cyber Weaponry (pp. 113-124). Springer, Cham.
Turban, E., Whiteside, J., King, D. and Outland, J., 2017. Implementation Issues: From
Globalization to Justification, Privacy, and Regulation. In Introduction to Electronic
Commerce and Social Commerce (pp. 383-413). Springer, Cham.

18TELSTRA
Wijesinghe, R., Scheepers, H. and Mcloughlin, S., 2016. Defining the optimal level of
business benefits within IS/IT projects: Insights from benefit identification practices adopted
in an IT Service Management (ITSM) project. arXiv preprint arXiv:1606.03537.
Will, C.T.C., 2017. Economics–can Trump get corporate tax cuts?. Policy, 2018, p.2027.
Wilton, R., 2017. Trust and ethical data handling in the healthcare context. Health and
Technology, 7(4), pp.569-578.
Jäntti, M. and Hotti, V., 2016. Defining the relationships between IT service management and
IT service governance. Information Technology and Management, 17(2), pp.141-150.
Wijesinghe, R., Scheepers, H. and Mcloughlin, S., 2016. Defining the optimal level of
business benefits within IS/IT projects: Insights from benefit identification practices adopted
in an IT Service Management (ITSM) project. arXiv preprint arXiv:1606.03537.
Will, C.T.C., 2017. Economics–can Trump get corporate tax cuts?. Policy, 2018, p.2027.
Wilton, R., 2017. Trust and ethical data handling in the healthcare context. Health and
Technology, 7(4), pp.569-578.
Jäntti, M. and Hotti, V., 2016. Defining the relationships between IT service management and
IT service governance. Information Technology and Management, 17(2), pp.141-150.
1 out of 19
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.