DATA SECURITY STRATEGY BASED ON STORED PROGRAMS: A CASE STUDY OF DSS FOR TEACHING ASSISTANT SELECTION

Authors

  • Prahenusa Wahyu Ciptadi Informatika, Universitas PGRI Yogyakarta
  • Tri Hastono Informatika, Universitas PGRI Yogyakarta
  • Gema Kharismajati Informatika, Universitas PGRI Yogyakarta
  • Firdiyan Syah Informatika, Universitas PGRI Yogyakarta
  • Nayaka Anung Fahriza TKIT Al Farabi

DOI:

https://doi.org/10.61677/jth.v3i2.365

Keywords:

Data security strategy; stored programs; DSS teaching assistant selection

Abstract

Data security is increasingly crucial in managing information systems, especially in academic environments handling sensitive data. The reliance on digital systems demands protection of data integrity, confidentiality, and availability. Educational institutions must secure student, faculty, and administrative data to prevent unauthorized access and manipulation. One system requiring high security is the Decision Support System (DSS) for Teaching Assistant selection. DSS helps determine candidates based on GPA, experience, and skills. However, it is vulnerable to unauthorized data changes, access abuse, SQL Injection, and cyber threats that may affect decision accuracy. Stored Programs in databases provide an effective solution for enhancing data security. With Stored Procedures, Functions, Triggers, and Events, data management becomes more secure and structured. These features enable stricter access control, database operation automation, and direct validation to reduce errors and misuse. In the DSS case study, Stored Programs ensure that only authorized users can access and modify data. Authentication and authorization mechanisms restrict access based on user roles. This study analyzes security risks, system architecture design, Stored Program implementation, and its effectiveness in maintaining data integrity. Research results confirm that the developed Stored Programs meet expectations. The CRUD feature operates optimally with a processing time of 0.0059 seconds.

References

Aulia, C. P., Pratama, M. Y., & Dewi, H. L. (2023). Perbandingan Performa Query Select Dasar, View, Dan Stored Procedure Pada Database Mysql. Prosiding Seminar Nasional Teknologi dan Sistem Informasi, 3(1), 456–464. https://doi.org/10.33005/sitasi.v3i1.413

Dm, M. Y., Agustantia, M., & Zulaiha, S. (n.d.). Tindak Pidana Kejahatan Pemalsuan data (Data Forgery) dalam Bentuk Kejahatan Siber (Cyber Crime). Jurnal Pendidikan dan Konseling, 4(6), 6635–6640. https://doi.org/10.31004/jpdk.v4i6.9365

Fathulloh, A. H., & Adauwiyah, H. I. (2021). Perbandingan Tingkat Efisiensi Waktu Query SELECT pada Database Interface Navicat dan SQLYog di MySQL DBMS. Applied Information System and Management (AISM), 4(2), 101–105. https://doi.org/10.15408/aism.v4i2.18369

Firdaus, M. (2024). Penerapan Stored Procedure untuk Memudahkan Modifikasi dan Update Formula Logic pada ETL. Remik: Riset dan E-Jurnal Manajemen Informatika Komputer, 8(3). https://doi.org/10.33395/remik.v8i3.13752

Hartono, N. (2021). Comparison of Stored Procedures on Relational Database Management Systems. JOURNAL TECH-E, 4(2), 8–15. https://doi.org/10.31253/te.v4i2.529

Information Functions. (n.d.). [MySQL Official Website]. Information Functions. Retrieved January 23, 2025, from https://dev.mysql.com/doc/refman/8.4/en/information-functions.html#function_row-count

Putri, C. A., Melan, M., Ulgina, S., Lestari, A., Firmansyah, D., & Zaliman, I. (2024). Meningkatkan Kesadaran Dan Pemahaman Mengenai Keamanan Data Pribadi Melalui Kegiatan Sosialisasi Di SMPN 2 Merawang. IJDe: Indonesian Journal of Dedication and Education, 3(1), 18–23. https://doi.org/10.33019/ijde.v3i1.50

Rohmana, A. D. A., Mubarok, H., & Gunawan, R. (2019). Pengukuran Kinerja Stored Procedure Pada Database Relasional. Jurnal Siliwangi Seri Sains dan Teknologi (Saintek), 5(2), 51–55. https://doi.org/10.37058/jssainstek.v5i2.1197

Saputra, D. F. (2023). Literasi Digital Untuk Perlindungan Data Pribadi. Jurnal Ilmu Kepolisian, 17(3), 1–8. https://doi.org/10.35879/jik.v17i3.454

Satria, A., Ulina, N. P. H., Safira, P., & Pangestu, B. (2024). Perspektif Hukum Terhadap Keamanan Data: Tantangan Dan Solusi Di Era Teknologi Informasi. Warta Dharmawangsa, 18(1), 177–192. https://doi.org/10.46576/wdw.v18i1.4264

Septiadi, A. D., & Tripustikasari, E. (2022). Analisa Perbandingan Kinerja Penyimpanan Query Database Antara Stored Procedure dengan Function. Peluang dan Tantangan Teknologi Terapan Untuk Mendukung Pembangunan Nasional Berkelanjutan, 1, 1–8. https://ejournal.pnc.ac.id/index.php/senovtek/article/view/1590

Triyono, J. (2023). Penerapan Hak Akses pada Perancangan Database Akademik untuk Meningkatkan Keamanan Data: Application of Access Rights in Academic Database Design to Improve Data Security. MALCOM: Indonesian Journal of Machine Learning and Computer Science, 3(1), 50–59. https://doi.org/10.57152/malcom.v3i1.747

Yolanda Sari Ks, Madiasa Ablisar, Mahmud Mulyadi, & Jelly Leviza. (2022). Analisis Yuridis Terhadap Tindak Pidana Manipulasi Informasi Pengguna E-Commerce Menurut Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi Dan Transaksi Elektronik Studi Putusan No. 542/Pid.Sus/2019/PN.Mlg. Locus: Jurnal Konsep Ilmu Hukum, 2(2), 53–67. https://doi.org/10.56128/jkih.v2i2.22

Published

2025-10-30

How to Cite

Prahenusa Wahyu Ciptadi, Tri Hastono, Gema Kharismajati, Firdiyan Syah, & Nayaka Anung Fahriza. (2025). DATA SECURITY STRATEGY BASED ON STORED PROGRAMS: A CASE STUDY OF DSS FOR TEACHING ASSISTANT SELECTION. JTH: Journal of Technology and Health, 3(2), 120 ~ 132. https://doi.org/10.61677/jth.v3i2.365