{"id":372,"date":"2012-04-24T03:11:45","date_gmt":"2012-04-23T20:11:45","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=372"},"modified":"2012-04-24T03:11:45","modified_gmt":"2012-04-23T20:11:45","slug":"kamko-7","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-7\/","title":{"rendered":"Kamko 7"},"content":{"rendered":"<div>\u2022But the threat of computer crime may be even greater from managers and consultants because they are in the best position to commit it successfully. They know how the systems operate, and they know the passwords needed to gain access to the systems.<\/div>\n<div>\u2022The cashless society???<\/div>\n<div>The cashless society<\/div>\n<div>\n<div>\u2022Pertumbuhan ATM \u00e0 EFT (electronic funds transfer), sangat transparan ke publik. Debat: is this a reasonable and prudent manner in which to handle financial transactions?<\/div>\n<div>\u2022The scope of EFT may be expandedd because the buyer will be able to use a universal smart card (\u201csmart\u201d because of the tiny embedded microprocessor) and &#8230;<\/div>\n<div>\n<div>\u2022&#8230; And perhaps a password to buy everything from candy bars to automobiles. Upon purchasing an item, the buyer would give the card, called a debit card, to the seller.<\/div>\n<div>\u2022The seller would use the purchaser\u2019s card to log the sale on a point-of-sale (POS) terminal linked to a network of banking computers. The amount of the sale would then be transferred from the buyer\u2019s account to the seller\u2019s account.<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>\u2022But the threat of computer crime may be even greater from managers and consultants because they are in the best position to commit it successfully. They know how the systems operate, and they know the passwords needed to gain access to the systems. \u2022The cashless society??? The cashless society \u2022Pertumbuhan ATM \u00e0 EFT (electronic funds &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-7\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Kamko 7&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-372","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/372"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=372"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/372\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}