DATA SECURITY STRATEGY BASED ON STORED PROGRAMS: A CASE STUDY OF DSS FOR TEACHING ASSISTANT SELECTION
DOI:
https://doi.org/10.61677/jth.v3i2.365Keywords:
Data security strategy; stored programs; DSS teaching assistant selectionAbstract
Data security is increasingly crucial in managing information systems, especially in academic environments handling sensitive data. The reliance on digital systems demands protection of data integrity, confidentiality, and availability. Educational institutions must secure student, faculty, and administrative data to prevent unauthorized access and manipulation. One system requiring high security is the Decision Support System (DSS) for Teaching Assistant selection. DSS helps determine candidates based on GPA, experience, and skills. However, it is vulnerable to unauthorized data changes, access abuse, SQL Injection, and cyber threats that may affect decision accuracy. Stored Programs in databases provide an effective solution for enhancing data security. With Stored Procedures, Functions, Triggers, and Events, data management becomes more secure and structured. These features enable stricter access control, database operation automation, and direct validation to reduce errors and misuse. In the DSS case study, Stored Programs ensure that only authorized users can access and modify data. Authentication and authorization mechanisms restrict access based on user roles. This study analyzes security risks, system architecture design, Stored Program implementation, and its effectiveness in maintaining data integrity. Research results confirm that the developed Stored Programs meet expectations. The CRUD feature operates optimally with a processing time of 0.0059 seconds.
References
Aulia, C. P., Pratama, M. Y., & Dewi, H. L. (2023). Perbandingan Performa Query Select Dasar, View, Dan Stored Procedure Pada Database Mysql. Prosiding Seminar Nasional Teknologi dan Sistem Informasi, 3(1), 456–464. https://doi.org/10.33005/sitasi.v3i1.413
Dm, M. Y., Agustantia, M., & Zulaiha, S. (n.d.). Tindak Pidana Kejahatan Pemalsuan data (Data Forgery) dalam Bentuk Kejahatan Siber (Cyber Crime). Jurnal Pendidikan dan Konseling, 4(6), 6635–6640. https://doi.org/10.31004/jpdk.v4i6.9365
Fathulloh, A. H., & Adauwiyah, H. I. (2021). Perbandingan Tingkat Efisiensi Waktu Query SELECT pada Database Interface Navicat dan SQLYog di MySQL DBMS. Applied Information System and Management (AISM), 4(2), 101–105. https://doi.org/10.15408/aism.v4i2.18369
Firdaus, M. (2024). Penerapan Stored Procedure untuk Memudahkan Modifikasi dan Update Formula Logic pada ETL. Remik: Riset dan E-Jurnal Manajemen Informatika Komputer, 8(3). https://doi.org/10.33395/remik.v8i3.13752
Hartono, N. (2021). Comparison of Stored Procedures on Relational Database Management Systems. JOURNAL TECH-E, 4(2), 8–15. https://doi.org/10.31253/te.v4i2.529
Information Functions. (n.d.). [MySQL Official Website]. Information Functions. Retrieved January 23, 2025, from https://dev.mysql.com/doc/refman/8.4/en/information-functions.html#function_row-count
Putri, C. A., Melan, M., Ulgina, S., Lestari, A., Firmansyah, D., & Zaliman, I. (2024). Meningkatkan Kesadaran Dan Pemahaman Mengenai Keamanan Data Pribadi Melalui Kegiatan Sosialisasi Di SMPN 2 Merawang. IJDe: Indonesian Journal of Dedication and Education, 3(1), 18–23. https://doi.org/10.33019/ijde.v3i1.50
Rohmana, A. D. A., Mubarok, H., & Gunawan, R. (2019). Pengukuran Kinerja Stored Procedure Pada Database Relasional. Jurnal Siliwangi Seri Sains dan Teknologi (Saintek), 5(2), 51–55. https://doi.org/10.37058/jssainstek.v5i2.1197
Saputra, D. F. (2023). Literasi Digital Untuk Perlindungan Data Pribadi. Jurnal Ilmu Kepolisian, 17(3), 1–8. https://doi.org/10.35879/jik.v17i3.454
Satria, A., Ulina, N. P. H., Safira, P., & Pangestu, B. (2024). Perspektif Hukum Terhadap Keamanan Data: Tantangan Dan Solusi Di Era Teknologi Informasi. Warta Dharmawangsa, 18(1), 177–192. https://doi.org/10.46576/wdw.v18i1.4264
Septiadi, A. D., & Tripustikasari, E. (2022). Analisa Perbandingan Kinerja Penyimpanan Query Database Antara Stored Procedure dengan Function. Peluang dan Tantangan Teknologi Terapan Untuk Mendukung Pembangunan Nasional Berkelanjutan, 1, 1–8. https://ejournal.pnc.ac.id/index.php/senovtek/article/view/1590
Triyono, J. (2023). Penerapan Hak Akses pada Perancangan Database Akademik untuk Meningkatkan Keamanan Data: Application of Access Rights in Academic Database Design to Improve Data Security. MALCOM: Indonesian Journal of Machine Learning and Computer Science, 3(1), 50–59. https://doi.org/10.57152/malcom.v3i1.747
Yolanda Sari Ks, Madiasa Ablisar, Mahmud Mulyadi, & Jelly Leviza. (2022). Analisis Yuridis Terhadap Tindak Pidana Manipulasi Informasi Pengguna E-Commerce Menurut Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi Dan Transaksi Elektronik Studi Putusan No. 542/Pid.Sus/2019/PN.Mlg. Locus: Jurnal Konsep Ilmu Hukum, 2(2), 53–67. https://doi.org/10.56128/jkih.v2i2.22
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 JTH: Journal of Technology and Health

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.



