DATA SECURITY STRATEGY BASED ON STORED PROGRAMS: A CASE STUDY OF DSS FOR TEACHING ASSISTANT SELECTION
DOI:
https://doi.org/10.61677/jth.v2i3.371Keywords:
Data security strategy, stored programs, DSS teaching assistant selectionAbstract
Data security is becoming increasingly crucial in information system management, especially in academic environments that handle sensitive information. The reliance on digital systems demands the protection of data integrity, confidentiality, and availability. High-level data security is also required in the Decision Support System (DSS) application for selecting Teaching Assistants at Universitas PGRI Yogyakarta. The DSS helps determine candidates based on GPA, experience, and skills. However, this system is vulnerable to threats such as unauthorized data modifications, access abuse, SQL Injection, and cyber-attacks that can impact decision-making. Stored Programs in databases provide an effective solution to enhance data security. This research aims to design Stored Programs as a security strategy for data input into database tables. The types of Stored Programs designed in this study include Stored Procedures, Functions, and control programs. The design methodology for the Stored Programs follows the waterfall method. The test results indicate that the Stored Programs function as expected and execute in a very short time. The execution of Stored Programs takes only 0.0059 seconds.
References
Aulia, C. P., Pratama, M. Y., & Dewi, H. L. (2023). Perbandingan Performa Query Select Dasar, View, Dan Stored Procedure Pada Database Mysql. Prosiding Seminar Nasional Teknologi dan Sistem Informasi, 3(1), 456–464. https://doi.org/10.33005/sitasi.v3i1.413
Dm, M. Y., Agustantia, M., & Zulaiha, S. (n.d.). Tindak Pidana Kejahatan Pemalsuan data (Data Forgery) dalam Bentuk Kejahatan Siber (Cyber Crime). Jurnal Pendidikan dan Konseling, 4(6), 6635–6640. https://doi.org/10.31004/jpdk.v4i6.9365
Fathulloh, A. H., & Adauwiyah, H. I. (2021). Perbandingan Tingkat Efisiensi Waktu Query SELECT pada Database Interface Navicat dan SQLYog di MySQL DBMS. Applied Information System and Management (AISM), 4(2), 101–105. https://doi.org/10.15408/aism.v4i2.18369
Firdaus, M. (2024). Penerapan Stored Procedure untuk Memudahkan Modifikasi dan Update Formula Logic pada ETL. Remik: Riset dan E-Jurnal Manajemen Informatika Komputer, 8(3). https://doi.org/10.33395/remik.v8i3.13752
Hartono, N. (2021). Comparison of Stored Procedures on Relational Database Management Systems. JOURNAL TECH-E, 4(2), 8–15. https://doi.org/10.31253/te.v4i2.529
Information Functions. (n.d.). [MySQL Official Website]. Information Functions. Retrieved January 23, 2025, from https://dev.mysql.com/doc/refman/8.4/en/information-functions.html#function_row-count
Kuntadi, A., & Feriandi, Y. (2023). Penggunaan SQL Server dalam Pengolahan Data Warehouse yang Praktis dan Berkelanjutan. Jurnal Algoritma, 20(2), 457–468. https://doi.org/10.33364/algoritma/v.20-2.1522
Putri, C. A., Melan, M., Ulgina, S., Lestari, A., Firmansyah, D., & Zaliman, I. (2024). Meningkatkan Kesadaran Dan Pemahaman Mengenai Keamanan Data Pribadi Melalui Kegiatan Sosialisasi Di SMPN 2 Merawang. IJDe: Indonesian Journal of Dedication and Education, 3(1), 18–23. https://doi.org/10.33019/ijde.v3i1.50
Rathore, S., & Sharma, A. (2017). Database Security- Attacks, Threats and Challenges. International Journal of Engineering Research, 5(10), 1–4. https://doi.org/10.17577/IJERTCONV5IS10008
Rohmana, A. D. A., Mubarok, H., & Gunawan, R. (2019). Pengukuran Kinerja Stored Procedure Pada Database Relasional. Jurnal Siliwangi Seri Sains dan Teknologi (Saintek), 5(2), 51–55. https://doi.org/10.37058/jssainstek.v5i2.1197
Saputra, D. F. (2023). Literasi Digital Untuk Perlindungan Data Pribadi. Jurnal Ilmu Kepolisian, 17(3), 1–8. https://doi.org/10.35879/jik.v17i3.454
Satria, A., Ulina, N. P. H., Safira, P., & Pangestu, B. (2024). Perspektif Hukum Terhadap Keamanan Data: Tantangan Dan Solusi Di Era Teknologi Informasi. Warta Dharmawangsa, 18(1), 177–192. https://doi.org/10.46576/wdw.v18i1.4264
Sidharta, K., & Wibowo, T. (2020). Studi Efisiensi Sumber Daya Terhadap Efektivitas Penggunaan Database : Studi Kasus Sql Server Dan. 1(1), 508–515.
Triyono, J. (2023). Penerapan Hak Akses pada Perancangan Database Akademik untuk Meningkatkan Keamanan Data: Application of Access Rights in Academic Database Design to Improve Data Security. MALCOM: Indonesian Journal of Machine Learning and Computer Science, 3(1), 50–59. https://doi.org/10.57152/malcom.v3i1.747
Ujung, A. M., & Nasution, M. I. P. (2023). Pentingnya Sistem Keamanan Database Untuk Melindungi Data Pribadi. Jurnal Sistem Informasi Dan Informatika, 1(2), 44–47. https://doi.org/10.47233/jiska.v1i2.929
Yolanda Sari Ks, Madiasa Ablisar, Mahmud Mulyadi, & Jelly Leviza. (2022). Analisis Yuridis Terhadap Tindak Pidana Manipulasi Informasi Pengguna E-Commerce Menurut Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi Dan Transaksi Elektronik Studi Putusan No. 542/Pid.Sus/2019/PN.Mlg. Locus: Jurnal Konsep Ilmu Hukum, 2(2), 53–67. https://doi.org/10.56128/jkih.v2i2.22
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Prahenusa Wahyu Ciptadi, Tri Hastono, Gema Kharismajati, Firdiyan Syah, Nayaka Anung Fahriza

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.