{"id":354,"date":"2012-04-24T02:46:58","date_gmt":"2012-04-23T19:46:58","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=354"},"modified":"2012-04-24T02:46:58","modified_gmt":"2012-04-23T19:46:58","slug":"kamko-1","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-1\/","title":{"rendered":"Kamko 1"},"content":{"rendered":"<p>There is nothing wrong with<br \/>\nthis attitude<\/p>\n<div>\u2022But we must recognize that society has made a very real commitment to computers. Whether it is good or bad, society has reached the point of no return in its dependence on computers.<\/div>\n<div>\u2022On the more personal level, we are reluctant to forfeit the every day conveniences made possible by computers.<\/div>\n<div>controversy<\/div>\n<div>\n<div>\u2022Another world for computer &#8230; Intense controversy is a by-product of the computer revolution. The emotions of both the general public and the computer community run high on computer-related issues.<\/div>\n<div>\u2022THE MISUSE OF PERSONAL INFORMATION: Source of personal data, violating the privacy of personal information, computer matching, securing the integrity of personal information.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>There is nothing wrong with this attitude \u2022But we must recognize that society has made a very real commitment to computers. Whether it is good or bad, society has reached the point of no return in its dependence on computers. \u2022On the more personal level, we are reluctant to forfeit the every day conveniences made &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-1\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Kamko 1&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-354","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/354"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=354"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/354\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}