{"id":374,"date":"2012-04-24T03:14:08","date_gmt":"2012-04-23T20:14:08","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=374"},"modified":"2012-04-24T03:17:56","modified_gmt":"2012-04-23T20:17:56","slug":"kamko-8","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-8\/","title":{"rendered":"Kamko 8"},"content":{"rendered":"<p>The advantages of an expanded use of<\/p>\n<div>\u2022EFT are note-worthy. EFT would eliminate the cumbersome administrative work associated with handling money and checks.<\/div>\n<div>\u2022It alse would eliminate the need to carry money, eliminate rubber checks and conterfeit money, and minimize the possibility of error.<\/div>\n<div>\u2022It would provide a detailed record of all transactions.<\/div>\n<div>EFT would also eliminate<\/div>\n<div>\n<div>\u2022The expense of making money. The cost of manufacturing a penny now exceeds the value of the coin!<\/div>\n<div>\u2022The disadvantages are equally note-worthy. The critical issue is EFT\u2019s potential for the misuse of personal information.<\/div>\n<div>\u2022EFT generates a chronological record of all purchases.<\/div>\n<\/div>\n<div>In effect, this type of system<\/div>\n<div>\n<div>\u2022Permits every thing about an individual to be monotired, from life style to location. Opponents of EFT are also concerned about its vulnerability to crime.<\/div>\n<div>\u2022Although there is a trend toward more electronic funds transfer, some experts feel that EFT is about to reach its peak of acceptance. Others think that total EFT is inevitable by the turn of the century.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The advantages of an expanded use of \u2022EFT are note-worthy. EFT would eliminate the cumbersome administrative work associated with handling money and checks. \u2022It alse would eliminate the need to carry money, eliminate rubber checks and conterfeit money, and minimize the possibility of error. \u2022It would provide a detailed record of all transactions. EFT would &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-8\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Kamko 8&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-374","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/374"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=374"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/374\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}