Skip to ContentGo to accessibility pageKeyboard shortcuts menu
OpenStax Logo

1 .
On December 23, 2021, the accounts of more than three million users of the U.S.-based FlexBooker appointment scheduling service were stolen and being traded on hacker forums. Customers were businesses needing to schedule appointments. This ranged from professionals like accountants and lawyers to service providers like hairdressers and dentists to owners of facilities like gyms and repair shops. Do some research on whether FlexBooker was following the best data security practices? Did it have well-defined user roles for who could access its data?
2 .
In January 2020, Microsoft acknowledged that a customer support database containing anonymized user analytics had been accidentally exposed online. The data breach involved email addresses, IP addresses, and other details stored in the company’s customer support case analytics database. The exposed database contained over 250 million Microsoft customer records spanning fourteen years, without any password protection. Microsoft attributed the server exposure to misconfigured Azure (a cloud platform with data-related services) security rules implemented on December 5, 2019. Upon discovering the issue, Microsoft quickly addressed the configuration problem to prevent unauthorized access. How do you think this incident impacted clients of Azure, and what could they have done differently? Do some additional research to back up your answer.
3 .
Imagine you are working on information technology strategy for a small local café in competition with a large fast-food chain like McDonald’s. If the small café wants to introduce a fancy new mobile app for customization of orders to improve customer experience, how would you evaluate the value and feasibility of this information technology investment?
4 .
Imagine you are an information system consultant, and you have been given a report from an organization’s business analysts that indicates that investments in information systems are projected not to affect the company’s efficiency or productivity and not to impact its revenue. Would you recommend that the organization proceed with such investments? Why or why not?
5 .
Access the Clean Eatz website. Prepare a list of all the services the company provides. Identify its digital business model and describe the information technology strategy implemented.
6 .
Access the The Knot website. Identify its digital business model and describe the information technology strategy implemented.
7 .
Enter the Alibaba.com website. Identify its digital business model and describe the information technology strategy implemented. How can such a site help a person who is making a purchase?
8 .
Your IS team is debating which of two images for your website’s home page are more likely to appeal to website visitors. What process do you recommend to help the team make this decision and why?
Citation/Attribution

This book may not be used in the training of large language models or otherwise be ingested into large language models or generative AI offerings without OpenStax's permission.

Want to cite, share, or modify this book? This book uses the Creative Commons Attribution-NonCommercial-ShareAlike License and you must attribute OpenStax.

Attribution information
  • If you are redistributing all or part of this book in a print format, then you must include on every physical page the following attribution:
    Access for free at https://openstax.org/books/foundations-information-systems/pages/1-introduction
  • If you are redistributing all or part of this book in a digital format, then you must include on every digital page view the following attribution:
    Access for free at https://openstax.org/books/foundations-information-systems/pages/1-introduction
Citation information

© Mar 11, 2025 OpenStax. Textbook content produced by OpenStax is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike License . The OpenStax name, OpenStax logo, OpenStax book covers, OpenStax CNX name, and OpenStax CNX logo are not subject to the Creative Commons license and may not be reproduced without the prior and express written consent of Rice University.