{"id":418,"date":"2012-05-14T07:48:45","date_gmt":"2012-05-14T00:48:45","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=418"},"modified":"2012-05-14T07:48:45","modified_gmt":"2012-05-14T00:48:45","slug":"kamko-16","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/14\/kamko-16\/","title":{"rendered":"kamko 16"},"content":{"rendered":"<p>computerized dialers<\/p>\n<div>\u2022Sistem ini digunakan oleh telemarketing dari berbagai produk. Apakah ini invasi terhadap privasi individual?<\/div>\n<div>\u2022Berapa banyak dari kita yang menerima, welcome, kesempatan mendengarkan pesan komersial? Apakah telemarketing melanggar code of ethics?<\/div>\n<div>copyrighted software<\/div>\n<div>\n<div>\u2022Misalnya dibeli electronic spreadsheet software package. The purchase agreement permits the use of the software on any micro at the office or at his home.<\/div>\n<div>\u2022Biasanya purchase agreement melarang secara tegas penggandaan copyrighted software untuk keperluan selain back up. Bagai mana jikalau ada teman dekat orang tersebut minta copy? Apakah langgar kode etik?<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>computerized dialers \u2022Sistem ini digunakan oleh telemarketing dari berbagai produk. Apakah ini invasi terhadap privasi individual? \u2022Berapa banyak dari kita yang menerima, welcome, kesempatan mendengarkan pesan komersial? Apakah telemarketing melanggar code of ethics? copyrighted software \u2022Misalnya dibeli electronic spreadsheet software package. The purchase agreement permits the use of the software on any micro at the &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/14\/kamko-16\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;kamko 16&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-418","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/418"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=418"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/418\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}