Information Technology Exception Messages

Author(s):  
T. S. Amer ◽  
Jo-Mae B. Maris

Users of information technology (IT) frequently encounter “exception messages” during their interactions with computing systems. Exception messages are important points of communication with users of IT and are similar in principle to compliance and warning messages that appear on consumer products and equipment (e.g., cigarettes, power tools, etc.), in various environments (e.g., around machinery), and on chemicals. This study reviews the normative elements and information that are included in product, chemical, and environment compliance and warning messages and combines these with recommendations in the IT literature to propose that five elements and information should be included in IT exception messages with a standard format. It is argued that including these elements in the proposed format will improve the consistency and effectiveness of exception messages. Also reported are the results of an investigation of a sample of actual exception messages to determine their degree of conformity with the proposed elements. Results indicate that IT exception messages lack descriptive content.

2010 ◽  
Vol 6 (1) ◽  
pp. 54-68 ◽  
Author(s):  
T.S. Amer ◽  
Jo-Mae B. Maris

Users of information technology (IT) frequently encounter “exception messages” during their interactions with computing systems. Exception messages are important points of communication with users of IT and are similar in principle to compliance and warning messages that appear on consumer products and equipment (e.g., cigarettes, power tools, etc.), in various environments (e.g., around machinery), and on chemicals. This study reviews the normative elements and information that are included in product, chemical, and environment compliance and warning messages and combines these with recommendations in the IT literature to propose that five elements and information should be included in IT exception messages with a standard format. It is argued that including these elements in the proposed format will improve the consistency and effectiveness of exception messages. Also reported are the results of an investigation of a sample of actual exception messages to determine their degree of conformity with the proposed elements. Results indicate that IT exception messages lack descriptive content.


Author(s):  
A. D. Smith

Even before September 11, 2001, security and privacy was a concern to nearly 80% of the current and potential Internet users around the globe, according to survey released by the Information Technology Association of America (ITAA) (Poulsen, 2000). The survey, commissioned by the American Express Company, randomly polled 11,410 people in 10 countries, and found that nearly half of the respondents enjoyed some form of Internet access. As might be expected, most of the world’s Internet users utilize Internet for e-mail, browsing, and entertainment. However, fewer than 28% do some shopping online, and 24% use the Internet for banking and financial transactions. But when Internet users and non-users of many countries were asked if they agree with the statement, “I am or would be concerned about security and privacy issues when purchasing or making financial transactions online,” 79% agreed. Prior to the tragedy of September 11, 2001, U.S. citizens also expressed legitimate concerns toward the issues of privacy and security, with an 85% showing. The poll released by the Information Technology Association of America also illustrated that approximately 80% have doubts about the U.S. government’s ability to maintain computer security and privacy. Hence, protecting operating systems is a major strategic concern if the success of e-government as a whole is to reach its potential. Although most of these issues are typically not discussed in relationship with e-government, the need for trusted computing systems within e-business and computing systems can be made as an effective argument that all these issues affect e-government systems as well. Secure computing systems issues in terms of e-government are just as important.  The scope of this article is to present a description of one the most generally known security certifications; namely, the trusted computer system evaluation (TCSEC) and its commercial implementation procedure in the commercial product evaluation process and discuss the influence of this evaluation/certification on the incidence of hacker attacks on e-business. As evident by the abundance of marketing literature of different operating systems for e-business that frequently refers to its security strength ranked against popular security certifications, it is very common to rank commercially available operating systems against TCSEC evaluation and/or certification criteria. This article will also explore where the many operating systems stands on this particular evaluation. In essence, given the vulnerabilities exposed after September 11, 2001, strategic security managers should be deeply concerned that the e-business platform they are responsible for contains the highest security standards to prevent any type of potentially harmful hacker attacks. Managers need to have a working knowledge of TCSEC security evaluation/certifications to become better informed when choosing the e-security platform for e-government/e-business. Essentially, the selection of a particular operating system for e-government/e-business have as much to do with factors ranging from existing skills, existing infrastructure, and economic reasons all the way up to political and strategic reasons. In dealing strategically with modern e-business environments, one of the most important factors that management must consider when choosing an operating system for their e-business platform is the security strength to resist computer hacker attacks on the operating system. If, for example, during different hacker attacks, one of the major aspects of these attacks is a certain operating system, as opposed to other systems, then this is a clear message to management to build in proper safeguards in the proposed operating system (Smith & Rupp, 2002a, 2002b). Certainly some of the reasons for frequent hacker attacks may probabilistic in terms and not random events, since Linux and Windows operating systems are more frequently used for e-commerce than other systems. So, it is not surprising that there are practically few reports of successful hacker attacks against operating systems that run e-business platforms (Smith, 2005; Smith & Lias, 2005; Smith & Offodile, 2002). 


Author(s):  
Jessie Y.C. Chen ◽  
Richard D. Gilson ◽  
Mustapha Mouloua

The application of multiple warning labels on consumer products and household appliances is now commonplace with increased public attention on safety issues. In the present study, the number of on-product warning messages was manipulated to examine perceived risk. Risk assessment for individual warning messages associated with a product and the overall perceived risk level for the product were examined and compared. We hypothesized that the number and contents of warnings may influence the perceived risk level for both the individual warning message and the overall perception of danger. Warning messages were presented in the format of either discrete messages or as messages as part of a group, then compared with regard to their perceived risk. The results showed that the perceived risk declined in a stepwise manner as a function of the number of low-criticality warning messages, thereby producing a dilution effect. This dilution effect appeared to take place as the number of low-risk warnings increased beyond five messages. The implications for safety and product design are discussed.


2008 ◽  
pp. 3728-3738
Author(s):  
Alan D. Smith

Even before September 11, 2001, security and privacy was a concern to nearly 80% of the current and potential Internet users around the globe, according to survey released by the Information Technology Association of America (ITAA) (Poulsen, 2000). The survey, commissioned by the American Express Company, randomly polled 11,410 people in 10 countries, and found that nearly half of the respondents enjoyed some form of Internet access. As might be expected, most of the world’s Internet users utilize Internet for e-mail, browsing, and entertainment. However, fewer than 28% do some shopping online, and 24% use the Internet for banking and financial transactions. But when Internet users and non-users of many countries were asked if they agree with the statement, “I am or would be concerned about security and privacy issues when purchasing or making financial transactions online,” 79% agreed. Prior to the tragedy of September 11, 2001, U.S. citizens also expressed legitimate concerns toward the issues of privacy and security, with an 85% showing. The poll released by the Information Technology Association of America also illustrated that approximately 80% have doubts about the U.S. government’s ability to maintain computer security and privacy. Hence, protecting operating systems is a major strategic concern if the success of e-government as a whole is to reach its potential. Although most of these issues are typically not discussed in relationship with e-government, the need for trusted computing systems within e-business and computing systems can be made as an effective argument that all these issues affect e-government systems as well. Secure computing systems issues in terms of e-government are just as important.  The scope of this article is to present a description of one the most generally known security certifications; namely, the trusted computer system evaluation (TCSEC) and its commercial implementation procedure in the commercial product evaluation process and discuss the influence of this evaluation/certification on the incidence of hacker attacks on e-business. As evident by the abundance of marketing literature of different operating systems for e-business that frequently refers to its security strength ranked against popular security certifications, it is very common to rank commercially available operating systems against TCSEC evaluation and/or certification criteria. This article will also explore where the many operating systems stands on this particular evaluation. In essence, given the vulnerabilities exposed after September 11, 2001, strategic security managers should be deeply concerned that the e-business platform they are responsible for contains the highest security standards to prevent any type of potentially harmful hacker attacks. Managers need to have a working knowledge of TCSEC security evaluation/certifications to become better informed when choosing the e-security platform for e-government/e-business. Essentially, the selection of a particular operating system for e-government/e-business have as much to do with factors ranging from existing skills, existing infrastructure, and economic reasons all the way up to political and strategic reasons. In dealing strategically with modern e-business environments, one of the most important factors that management must consider when choosing an operating system for their e-business platform is the security strength to resist computer hacker attacks on the operating system. If, for example, during different hacker attacks, one of the major aspects of these attacks is a certain operating system, as opposed to other systems, then this is a clear message to management to build in proper safeguards in the proposed operating system (Smith & Rupp, 2002a, 2002b). Certainly some of the reasons for frequent hacker attacks may probabilistic in terms and not random events, since Linux and Windows operating systems are more frequently used for e-commerce than other systems. So, it is not surprising that there are practically few reports of successful hacker attacks against operating systems that run e-business platforms (Smith, 2005; Smith & Lias, 2005; Smith & Offodile, 2002). 


2019 ◽  
Vol 0 (1 (7)) ◽  
pp. 121-129
Author(s):  
Tetiana Filimonchuk ◽  
Maksym Volk ◽  
Maksym Risukhin ◽  
Tetiana Olshanska ◽  
Darina Kazmina

Author(s):  
Karen Lee ◽  
Tom Lunney ◽  
Kevin Curran ◽  
Jose Santos

Advancements in sensor technology, wireless communications and information technology has enabled the success of new types of dynamic computing systems. However designing systems which are flexible and can adapt to the changing needs of the user remains a major research challenge. Flexibility and adaptability are fundamental requirements for Ambient Intelligent (AmI) systems. The complexity involved in designing applications and devices which change and adapt their behaviour automatically based on their context or situation is well recognised. Providing technology which meets the changing needs of the user is heavily reliant on the appropriate infrastructure design. This work outlines the development of an Ambient Middleware framework for Context-Aware systems. The framework will integrate with sensor technologies, intelligent algorithms and the semantic web.


Author(s):  
Ilir Bejleri ◽  
Ruth Roaza ◽  
Alexis Thomas ◽  
Tom Turton ◽  
Paul Zwick

In response to “environmental streamlining” legislation passed by the U.S. Congress as part of the Transportation Equity Act for the 21st Century, Florida has undertaken efforts to implement more efficient transportation planning and environmental review. These efforts have led to the development of the Efficient Transportation Decision-Making Process (ETDM Process), which redefines how Florida will accomplish planning and project development. A rather unique aspect of Florida’s streamlining approach is the integration of information technology as a vital foundation for the process. The development of Florida’s ETDM Process is described and evaluated, focusing on the information technology component. This component was developed as an interactive Internet-accessible geographic information system database. It integrates resource and project data from multiple sources into one standard format, provides quick and standardized analysis of the effects of the proposed projects on the human and natural environment, and supports the effective communication of results among all stakeholders, including the public. The use of technology is expected to reduce the cost of agency participation in the process and produce better, timely transportation decisions that reflect the proper balance among land use, mobility, and environment. Main topics include application design and development methodology, its integration in the ETDM Process, and how it has been received by the user community to date. Its benefits are evaluated, and recommendations for developing integrated technologies in support of streamlining efforts are provided.


1980 ◽  
Vol 2 (1) ◽  
pp. 29-36 ◽  
Author(s):  
P.W. Williams

Rapid developments in computing, telecommunications and microtechnology are expanding the ways in which information can be obtained. The online systems are now firmly established and the Post Office Prestel service is com mencing operations. There are several packages available for large-scale and medium-scale in-house computing systems and the advent of microcomputers means that complete informa tion systems for well under £ 10 000 will soon be available. Personal information systems can already be found for a few thousand pounds. The opportunities for the smaller informa tion unit are surveyed and the costs and difficulties of the possible options are reviewed.


Sign in / Sign up

Export Citation Format

Share Document