{"id":420,"date":"2012-05-14T07:50:45","date_gmt":"2012-05-14T00:50:45","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=420"},"modified":"2012-05-14T07:50:45","modified_gmt":"2012-05-14T00:50:45","slug":"kamko-17","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/14\/kamko-17\/","title":{"rendered":"kamko 17"},"content":{"rendered":"<p>franking privileges<\/p>\n<div>\u2022Legislator \u00e0 fasilitas free mail. Is massive amount of correspondence an attempt to better inform the constituents, or is it politically motivated and an abuse of the power of the computer?<\/div>\n<div>\u2022Is this application a violation of code of ethics?<\/div>\n<div>Computer-center and system security<\/div>\n<div>\n<div>\u2022Pertimbangan terpenting dalam membangun dan mengoperasikan sistem informasi adalah keamaan. Semakin lama sistem go on-line, banyak orang yang mengakses sistem.<\/div>\n<div>\u2022Perusahaan harus extremely careful untuk tidak berkompromi terhadap integritas sistem. Sistem informasi mempunyai beberapa point of vulnerability and too much is at stake to overlook the threats to the security of an information system and computer center.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>franking privileges \u2022Legislator \u00e0 fasilitas free mail. Is massive amount of correspondence an attempt to better inform the constituents, or is it politically motivated and an abuse of the power of the computer? \u2022Is this application a violation of code of ethics? Computer-center and system security \u2022Pertimbangan terpenting dalam membangun dan mengoperasikan sistem informasi adalah &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/05\/14\/kamko-17\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;kamko 17&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-420","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/420"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=420"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/420\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}