{"id":387,"date":"2012-04-24T03:31:45","date_gmt":"2012-04-23T20:31:45","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=387"},"modified":"2012-04-24T03:32:35","modified_gmt":"2012-04-23T20:32:35","slug":"kamko-12","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-12\/","title":{"rendered":"Kamko 12"},"content":{"rendered":"<p>FRAUD<\/p>\n<div>\u2022The other area of ilegal information processing is a premeditated or conscious effort to defraud the system.<\/div>\n<div>\u2022Any ilegal entry into a computer system for the purpose of personal gain is considered fraud.<\/div>\n<div>\u2022Over 50% of all computer frauds are internal; that is, they are committed by employee.<\/div>\n<div>The privacy of personal information<\/div>\n<div>\n<div>\u2022Prinsip: 1) People should be made aware that data are being collected about them and made aware of how these data are to be used.<\/div>\n<div>\u2022Prinsip: 2) A person should be permitted to inspect his or her personal data and information.<\/div>\n<div>\u2022Prinsip: 3) A person should be permitted to supplement of clarify personal data and information.<\/div>\n<div>\n<div>\u2022Prinsip: 4) data and information found erroneous or irrelevant must be removed.<\/div>\n<div>\u2022Prinsip: 5) disclosure of personal information should be limited to those with a need to know.<\/div>\n<div>\u2022Prinsip: 6) A log should be maintained of all people inspecting any individual\u2019s personal information.<\/div>\n<div>\n<div>\u2022Prinsip: 7) Adequate safeguards must be in place to ensure the security of personal data and information [contoh: locked doors, passwords].<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>FRAUD \u2022The other area of ilegal information processing is a premeditated or conscious effort to defraud the system. \u2022Any ilegal entry into a computer system for the purpose of personal gain is considered fraud. \u2022Over 50% of all computer frauds are internal; that is, they are committed by employee. The privacy of personal information \u2022Prinsip: &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/kamko-12\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Kamko 12&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-387","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/387"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=387"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/387\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}