{"id":383,"date":"2012-04-24T03:27:17","date_gmt":"2012-04-23T20:27:17","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=383"},"modified":"2012-04-24T03:28:52","modified_gmt":"2012-04-23T20:28:52","slug":"kamko-11","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-11\/","title":{"rendered":"Kamko 11"},"content":{"rendered":"<p>Computer and the law<\/p>\n<div>\u2022Sistem informasi tanpa hukum \u00e0 computer crime.<\/div>\n<div>\u2022Sophisticated computer crime can be extremely complex and may be well beyond the understanding of post prosecutors, judges, and jurors.<\/div>\n<div>\u2022Legislation must be enacted and prosecution issues resolved before the criminal justice system can begin to cope with computer crime.<\/div>\n<div>Illegal information processing<\/div>\n<div>\n<div>\u2022The two main causes of illegal information processing are negligence and fraud. Negligence cause some one outside the organization to be unnecessarily inconvenienced, and it is usually the result of poor input \/output control.<\/div>\n<div>\u2022This is a clear case of a misinterpretation of computer maxim \u2013 GIGO.<\/div>\n<\/div>\n<div>GIGO case<\/div>\n<div>\n<div>\u2022The company blamed the incident on a mistake by the computer. The court stated that the people enter data and interpret output and that the people affected should be treated differently from punched cards.<\/div>\n<div>\u2022Trust in the infallibility of a computer does not constitute a defense in a court of law. This incident points out the importance of careful system design and exhaustive testing.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Computer and the law \u2022Sistem informasi tanpa hukum \u00e0 computer crime. \u2022Sophisticated computer crime can be extremely complex and may be well beyond the understanding of post prosecutors, judges, and jurors. \u2022Legislation must be enacted and prosecution issues resolved before the criminal justice system can begin to cope with computer crime. Illegal information processing \u2022The &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-11\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Kamko 11&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-383","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/383"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=383"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/383\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=383"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=383"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=383"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}