Innovative approaches and creative thinking
The prime determination of this paper is to find the impact of the Information management system in Telstra Corporation Limited. This is one of the biggest telecommunication company in Australia. The operation of this organisation is around telecommunication network, the voice of the markets, internet access and the pay television. There are different types of information systems installed in the working environment of this organisation. This private organisation aims to deliver more customer oriented service to its end users (England, 2017). There are lots of strategic and other types of issues related to the information systems installed in Information Systems of this private business organisation. This organisation have their stakeholders all around the world so there is huge cultural gap between the employees of this organisation. There are many market rivals associated with this organisation. The service provided by this organisation are fixed line and mobile telephony, whole sale and retail internet, cable internet and different categories of mobile internet such as mobile broadband, satellite internet and subscription of television.
The impact of the information system on the managerial role is presented in this documented in a professional manner. The impact of the innovative information system on the working environment of this organisation is also stated in this paper. The competitive advantage provided by the proposed strategy is also stated in the paper considering the business environment of the developing and the developed countries (Iskra, McIntosh & Wood, 2017). The different types of business elements which help in the formation of an information vision and information technology are also discussed in this paper. The process which is used to analyse the strategic issues related to the information system is also described in the paper with prime importance. The social and ethical considerations of the proposed strategy along with the global perspective of the strategy are also written in this document. The strength, opportunities, threats and limitations of this organisation are also mentioned in the later sections of this paper.
This private business organization have stakeholders all around the world, changing business conditions is the most important challenge associated with this organization. The information management system has a great impact on the productivity, functions and performance of Telstra (Telstra, 2018). Management in all levels can be achieved with the help of this information management system. Decision making which is one of the key aspects of every organization can be effectively managed with the help of this information management system. The managerial decision can be effectively improved with the help of this information management system. The current and the future of this organization can be handled with the help of this information management system (Fortino et al., 2018). The information management system used by this organization provides an added advantage to this organization due to its enhanced specification such as the security, decision support system and operational controls.
Process used to analyze strategic issues
The different stakeholders of this organization will be involved in this information management system. A new idea of implementation of this information system must be adopted by this organism to achieve the desired outcomes (Downes et al., 2015). Since each department of this organization works on different units the change should be presented in an organized manner.
The individual and the team commitment will be maintained as the new solution will be implemented in two phases. The first phase will be considering a small business unit, after this a business report will be created to find the effectiveness of the new solution (Johnston, 2017). Based upon the findings the second phase will begin which will be considering all the stakeholders of this organization. The difference of culture between the employees of this organization will also be considered while implementing this plan. Knowledge sharing should be considered as a very important aspect for the successful implementation of the two discussed phases (Moses, 2015). The risks and obstacles related to the organization will be mitigated with the help of the information management system.
The effective training and the developmental plans will be very much impactful for the effective working of the information management system. This organization should be having an effective feedback platform which needs to be associated with all the stakeholders of this organization so that the suggestive measures can be incorporated into the system so that the security is maintained from both the perspective of the employees as well as from the point of view of the organization (North, 2016). This process can be effectively used so that the concept learning organization culture can be achieved.
The information systems are rapidly changing with the passage of time and extensive development in the field of information technology. Management of the information systems is one of the main aspects of every IT organization. The effectiveness of the information system can be achieved with the help of the many approaches (Bradlow & Jayachandra, 2015). This unit of the paper will be focusing on the approach SWOT analysis of the Management Information System.
The management information system of Telstra is used for the tracking different activities of the organization. The working principle of the organization can be understood by the MIS or Managing Information System. The prime strength of MIS in Telstra is the identification of the intruders as they deal with sensitive data and networking system. The flow of information across different departments of Telstra is the other advantage of MIS. The security goals of Telstra involve CIA which is confidentiality, Integrity and the Availability. The problem solving capabilities as well as the decision making capabilities can be significantly improved with the help of the MIS (Wright et al., 2018). The prime limitation associated with the MIS used in Telstra is the transactions which are based on complicated algorithms. The backend functionalities of Telstra cannot be understood by non-technical employees of the organization, it leads to higher maintenance costs.
The other drawback of the MIS used in Telstra is the huge investment which is required throughout the entire life cycle of the MIS. The MIS used in Telstra is very much advanced and is very much sensitive to changes (McDougal, 2017). Since the MIS deals with huge amount of both structured and unstructured data so any changes in the Meta data leads to the malfunctioning of the total system. Malfunctioning of the MIS causes drastic changes in the system as well it is causes financial loss for this business organization. The MIS have different opportunity associated with the MIS of Telstra such as the controlling of the flow of materials which significantly helps the organization to cut off their extra additional cost regarding any physical or non-physical assets. The effective sales and marketing strategy are the other kinds of issues related to the MIS of Telstra.
Selection of the employees can also be done using the MIS however it can also be found that there are issues associated with the selection of employees due to the threats associated with the MIS. The threats of MIS in Telstra come from security flaws f this organization. The inappropriate design is the most important threat associated with the MIS of Telstra (Campbell, 2017). Intruders or the cyber criminals are the other categories of threats associated with MIS as they can alter any vital data which are transmitted from one department to another. Misuse of the MIS by inexperienced employees of the organization is the other type of risks associated with the MIS used in Telstra. Thus from this unit of the paper, the steps involving the analysis of the MIS used in Telstra can be identified. The specifications of the MIS used in Telstra are very much helpful for enhancing the business process of this organization.
This organization has their stakeholders from not only in Australia but also from the other countries as well. Each of the stakeholder’s of this organization comes from a different cultural background which makes this organization very much prone to different security issues. This unit of the paper will be revolving around the information security policies which will be helping to minimize the threats coming from various risks and vulnerabilities (Wu, Straub & Liang, 2015). The proposed policies will be very much useful as they are based on social and moral principles along with diversity.
Acceptable Use Policy should be maintained by every employee of this organization who is accessing any asset associated with the organization. The ethical and moral principles associated with this category of security policy are Nonmaleficence, Beneficence, Fidelity and Justice. This policy will provide social justice to both the employees of the organization as well as the management teams of the organization who are very much worried about the miss utilization of the company assets.
Business Continuity plan is the other type of information security policy which needs to be incorporated into the working environment of Telstra in order to cope up with the risks and vulnerabilities associated with the systems. This plan can be effectively used as a disaster recovery plan by the Telstra organization. Different assets of this organization such as the hardware, data application can be restored with the help of this security policy. Like every other IS organization this organization is also subjected to major changes in terms of technology (Peltier, 2016). The reason behind these technological changes is the increasing demand of the end users of this organization so this business continuity plan is very much effective for maintaining the security of this organization (NATION, 2015). There are no ethical issues associated with this business continuity plan which is one of the main reasons why this plan can be successfully implemented in this private organization. This security measure will not have any impact due to the cultural difference between the stakeholders of this organization.
There are different types of market rivalry between this organization and the other type of telecommunication companies in Australia such as the Optus and Vodafone, this s one of the main reason behind the incorporation of the global marketing strategy. The current international business market of the telecommunication industry is mostly based on data analytics. With the help of the emerging technologies, the end users of these organizations are getting the access of their products and services in a fraction of seconds (Siponen, Mahmood & Pahnila, 2014). The extensive growth in the field of telecommunication is leading to the growth of major technologies such as artificial intelligence which is actively used in most of the major telecommunication industries including Telstra.
Cloud Computing and Internet of Things are the other current trends associated with Telstra. Automated technologies and Chabot’s are used for effective communication purposes by this organization. Virtual reality, Block chain technology and augmented reality are the other types of technology associated with this organization. This organization uses these technologies for different types of purposes; these technologies have a very less negative impact due to the cultural diversity of the employees as well as the end uses. This organization is benefitted hugely with the use of these technologies. Global competitions can be dealt with the use of these technologies (Lowry et al., 2015). Threats are coming from new entrants as well as from the market competitors. These technologies are effectively used by both the internal as well as the external stakeholders of this organization. These technological innovations had a great impact on the growth and development of this business organization. The risks associated with this organization as well as the subsidiary organization can be dealt with the help of the exposure of these technologies (Soomro, Shah & Ahmed, 2016). Ownership of the business, as well as the local economy, can be effectively managed with the help of the elements of the global perspectives.
The discussed technological advancements can also lead to the changes in the managerial role of this of this organization and provide them with a competitive advantage over their market rivals. The challenges related to the cultural differences and the international trade policies which are different in each country can be effectively dealt with the help of this global perspective.
The quality decisions, management and the batch records are the three different aspects related to this organization which are needed to be maintained for the overall growth and development. The most important moral consideration in dealing with the strategic issues are the information rights and obligations, rights associated with property, accountability and control, quality of systems and quality of life (Da Veiga, 2015). The social considerations associated with this organization revolves around the extensive use of the automated technologies, the decline in the storage costs, advances in the networking and the different categories of the data analytical techniques such as profiling and non-obvious relationship awareness (NORA).
The ethical considerations are associated with responsibility, accountability, liability and due process. Identification of the higher order values and the professional stakeholders are the most important ethical considerations of this business organization. The application of data in the organization between the different stakeholders should be based on the above discussed social and ethical principles (Campbell, 2017). Along with that, the professional code of conduct should be maintained in the organization so that the ethical dilemmas associated with this organization can be significantly reduced.
This unit of the paper will be focusing on the different levels of abstraction of the ethical reasoning which are needed to be incorporated in to the organization so that the ethical issues related to the working units can be reduced significantly. The general reflection is the topmost level of abstraction associated with the logical reasoning which is generally based on a justification associated with a particular business situation (Safa, Von Solms & Furnell, 2016). The second level of abstractions revolves around the ethical justification; it is one of the most used categories of justification. The third level of abstraction is moral conviction which can guide each stakeholders of this business organization towards their common goal and objectives. What is right and what is wrong is the other category of levels of abstraction associated with this organization which is also known as the moral intuition. The moral intuition is the last level among the four levels of abstraction.
The prime determination of this unit of the paper is to review the policies adopted by Telstra organization using the four elements of the PEST analysis and a SWOT analysis is also conducted so the strength and limitations associated with this organization can be identified.
Strength |
Weakness |
The cordial relation with the regulatory bodies is the main strength associated with this IS organization. The expansion in the key market other than the telecommunication is the other significant development of this organization (Burgess et al., 2015). The latest investment of this organization on the latest technologies such as the 5th generation wireless technology makes them one of the most superior telecommunication organizations in the world. They are one of the leading telecommunication organizations in the Australian region due to their dominating market position. |
The prime weakness associated with this organization is its operational inefficiencies in spite of the use of most of the emerging technologies such as artificial intelligence. The unsatisfactory customer service is the other limitation is associated with this organization. There are many latency issues associated with this organization as compared to their marker rivals like Optus. The cost of the products and service of this organization is also on a higher side which is the other type of limitations associated with this organization. |
Opportunities |
Threats |
The rising growth of this organization can provide them with an opportunity to increase their business reach to the other parts of the world just like their market competitors Vodafone which gives services to almost all the nations of the world. The organization should be focusing on new services so that they can achieve new heights of success in the telecommunication industry. |
The saturated telecommunication market in Australia is one of the main threat associated with this IS organization. The complex telecom compliance laws and regulations are the other types of threats associated with this organization (Turban et al., 2018). Change in technology is the other most important threat for this organization. |
Table 1: PEST Analysis
(Source: Created by the author)
Political |
Economical |
The government of Australia and New Zealand are imposing several restrictions on this company so that both the government as well as the end users of the organizations can draw equal benefits. The global diplomatic relation of Australia with the other countries is getting affected due to the enhanced growth and productivity of this private telecommunication organization. |
The commodity prices of the product and services offered by this organization are falling year calendar year because of the subdued GDP. |
Social |
Technological |
The rising population in the Australian region is one of the most important reasons for the growth of this private organization. More resources and other facilities are being added in every calendar year and it is yielding great results for the corporation. |
Digitization of the different types of telecommunication services is increasing in Australia and New Zealand region due to the vast ever-growing business of this IS organization. |
Table 2: PEST Analysis
(Source: Created by the author)
Conclusion
From the above paper, it can be concluded that there are different types of internal and external stakeholder associated with this Telstra which is one leading telecommunication corporation in the Australian region. Individual commitment and team commitments are needed to be focused so that the mission and vision of the organization can be achieved. The concept of knowledge sharing should be practiced more in the working environment of this organization so that the organization can reach new heights not only in the Australian market but to other countries as well.
The concept of learning organization should be adopted by this organization. The strategic issues associated with the organization should be solved purposefully so that the working environment is not affected by any means. The discussed social and ethical principles should be followed by this IS organization so that security is maintained from both the perspectives of the employees as well as the management teams of this organization. The global perspectives of this organization should be updated frequently due to the changing business conditions. The SWOT and PEST analysis is helpful in understanding the high standard of service provided by this IS organization to its customers.
Reference
Baesens, B., Bapna, R., Marsden, J. R., Vanthienen, J., & Zhao, J. L. (2016). TRANSFORMATIONAL ISSUES OF BIG DATA AND ANALYTICS IN NETWORKED BUSINESS. MIS quarterly, 40(4).
Bradlow, H., & Jayachandra, A. (2015). How digital infrastructure can substitute for physical infrastructure.
Burgess, S., Sellitto, C., Cox, C., & Buultjens, J. (2015). Strategies for Adopting Consumer?generated Media in Small?sized to Medium?sized Tourism Enterprises. International Journal of Tourism Research, 17(5), 432-441.
Campbell, I. (2017). Telstra’s Future Mode of Operation-the transformation of the Telstra’s Network-1992/93. Australian Journal of Telecommunications and the Digital Economy, 5(4), 18-69.
Campbell, I. (2017). Telstra’s Future Mode of Operation-the transformation of the Telstra’s Network-1992/93. Australian Journal of Telecommunications and the Digital Economy, 5(4), 18-69.
Da Veiga, A. (2015). The influence of information security policies on information security culture: illustrated through a case study.
Downes, M. J., Mervin, M. C., Byrnes, J. M., & Scuffham, P. A. (2015). Telemedicine for general practice: a systematic review protocol. Systematic reviews, 4(1), 134.
England, P. (2017). Risk Managing in the Courts: Seeds of a Divergent Jurisprudence.
Fitzgerald, A. M., & Dwyer, N. (2017). Copyright in databases in Australia.
Fortino, G., Ali, A. S., Pathan, M., Guerrieri, A., & Di Fatta, G. (Eds.). (2018). Internet and Distributed Computing Systems: 10th International Conference, IDCS 2017, Mana Island, Fiji, December 11-13, 2017, Proceedings (Vol. 10794). Springer.
Gupta, L., Samaka, M., Jain, R., Erbad, A., Bhamare, D., & Chan, H. A. (2017, July). Fault and performance management in multi-cloud based NFV using shallow and deep predictive structures. In 2017 26th International Conference on Computer Communication and Networks (ICCCN) (pp. 1-8). IEEE.
Iskra, S., McIntosh, R. L., & Wood, A. (2017). Assessing RF Exposure: Fields, Currents, and SAR. Non?ionizing Radiation Protection: Summary of Research and Policy Options, 205-225.
Johnston, A. (2017). Privacy law: Data, metadata and personal information: A landmark ruling from the federal court. LSJ: Law Society of NSW Journal, (31), 82.
Karlsson, F., Hedström, K., & Goldkuhl, G. (2017). Practice-based discourse analysis of information security policies. Computers & Security, 67, 267-279.
Lowry, P. B., Posey, C., Bennett, R. B. J., & Roberts, T. L. (2015). Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence of counterfactual reasoning and organisational trust. Information Systems Journal, 25(3), 193-273.
McDougal, M. (2017). Insights from the company monitor: Telstra. Equity, 31(11), 15.
Moses, R. (2015). (15-025) Telstra Corporation Limited v Port Stephens Council [2015] NSWLEC 1053. Environmental Law Reporter, 34(15-0021/15-026), 6.
NATION, L. (2015). Video case study. Marketing, 83.
North, J. (2016). Metadata: It’s not about you after all. Governance Directions, 68(2), 96.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Auerbach Publications.
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model in organizations. Computers & Security, 56, 70-82.
Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study. Information & management, 51(2), 217-224.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215-225.
Telstra – mobile phones, prepaid phones, broadband, internet, home phones, business phones. (2018). Retrieved from https://www.telstra.com.au/
Turban, E., Outland, J., King, D., Lee, J. K., Liang, T. P., & Turban, D. C. (2018). EC Strategy, Globalization, SMEs, and Implementation. In Electronic Commerce 2018 (pp. 537-572). Springer, Cham.
Wu, S. P. J., Straub, D. W., & Liang, T. P. (2015). How information technology governance mechanisms and strategic alignment influence organizational performance: Insights from a matched survey of business and IT managers. Mis Quarterly, 39(2), 497-518.