{"id":360,"date":"2012-04-24T02:55:16","date_gmt":"2012-04-23T19:55:16","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=360"},"modified":"2012-04-24T02:58:37","modified_gmt":"2012-04-23T19:58:37","slug":"kamko-3","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-3\/","title":{"rendered":"Kamko 3"},"content":{"rendered":"<div>\u2022For all practical purposes the abuse of this information has slipped out from under the legislative umbrella.<\/div>\n<div>\u2022Antiquated laws, combined with judicial unfamiliarity with computers, make policing, and prosecuting, abuses of the privacy of personal information difficult and, in many case, impossible.<\/div>\n<div>Computer matching<\/div>\n<div>\n<div>\u2022Computer matching is a procedure whereby separate databases are examined and individual common to both are identified.<\/div>\n<div>\u2022Computer matching has been referred to as Orwellian by some, while auditors think it is a great help in their jobs.<\/div>\n<div>\u2022The focus of most computer-matching application is to identify people engaged in wrong doing.<\/div>\n<\/div>\n<div>Securing the integrity of<br \/>\npersonal information<\/div>\n<div>\n<div>\u2022Computer experts feel that the integrity of personal data can be more secure in computer data bases than in file cabinets.<\/div>\n<div>\u2022They contend that we can continue to be masters and not victims if we implement proper safeguards for the maintenance and release of this information and enact effective legislation to cope with the abuse of it.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u2022For all practical purposes the abuse of this information has slipped out from under the legislative umbrella. \u2022Antiquated laws, combined with judicial unfamiliarity with computers, make policing, and prosecuting, abuses of the privacy of personal information difficult and, in many case, impossible. Computer matching \u2022Computer matching is a procedure whereby separate databases are examined and &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-3\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Kamko 3&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-360","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/360"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=360"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/360\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}