|
||
Although information items are really convenient and useful in normal situations, they can still provide a possibility for information break-in when used inappropriately. Information items can contain any kinds of information: documents, web URLs, complete applications, etc. Opening an information item executes the attached information. Therefore only persons known to be trustworthy should be allowed to add information items to a model.