{"id":412,"date":"2012-05-14T07:41:37","date_gmt":"2012-05-14T00:41:37","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=412"},"modified":"2012-05-14T07:41:37","modified_gmt":"2012-05-14T00:41:37","slug":"kamko-13","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/14\/kamko-13\/","title":{"rendered":"kamko 13"},"content":{"rendered":"<p>Ethics and Computers<\/p>\n<div>\u2022Computer-professional societies adopted a code of ethics. The code warns members that they can be expelled or censured if they violate it.<\/div>\n<div>\u2022Other professional societies publish a code of ethics as well, and they too rarely or never take action against delinquent members.<\/div>\n<div>A carefully drafted code of ethics<\/div>\n<div>\n<div>\u2022Provides some guidelines for conduct, but professional societies cannot be expected to police\u00a0 the misdoings of their membership. In many instances, a code violation is also a violation of the law.<\/div>\n<div>\u2022A code of ethics provides direction for computer professionals and users so that they act responsibly in their application of computer technology.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ethics and Computers \u2022Computer-professional societies adopted a code of ethics. The code warns members that they can be expelled or censured if they violate it. \u2022Other professional societies publish a code of ethics as well, and they too rarely or never take action against delinquent members. A carefully drafted code of ethics \u2022Provides some guidelines &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/14\/kamko-13\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;kamko 13&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-412","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/412"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=412"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/412\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}