{"id":357,"date":"2012-04-24T02:50:57","date_gmt":"2012-04-23T19:50:57","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=357"},"modified":"2012-04-24T02:50:57","modified_gmt":"2012-04-23T19:50:57","slug":"kamko-2","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-2\/","title":{"rendered":"Kamko 2"},"content":{"rendered":"<p>Source of personal data<\/p>\n<div>\u2022Some people fear that computer-based record-keeping offers too much of an opportunity for the invansion of an individual\u2019s privacy. There is indeed reason for concern.<\/div>\n<div>\u2022For example, credit-card users unknowingly leave a \u201ctrail\u201d of activities and interest that, when examined and evaluated, can provide a rather comprehensive personal profile.<\/div>\n<div>From this information,<\/div>\n<div>\u2022A good analyst could compile a very accurate picture of your lifestyle. On a more personal level, records are kept that detail the duration, time, and numbers of all your telephone calls.<\/div>\n<div>Violating the privacy of<br \/>\npersonal information<\/div>\n<div>\n<div>\u2022Most will agree that the potential exists for abuse, but are these data being misused? Personal information has become the product of a growing industry.<\/div>\n<div>\u2022Companies have been formed that do nothing but sell information about people. The use of personal information for profit and other purposes is growing at such a rapid rate that ..<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Source of personal data \u2022Some people fear that computer-based record-keeping offers too much of an opportunity for the invansion of an individual\u2019s privacy. There is indeed reason for concern. \u2022For example, credit-card users unknowingly leave a \u201ctrail\u201d of activities and interest that, when examined and evaluated, can provide a rather comprehensive personal profile. From this &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-2\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Kamko 2&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-357","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/357"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=357"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/357\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}