Kurnia Wahyu Prima
Universitas Negeri Makassar

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Smart Recycle: Teknologi Solusi Pencegahan Limbah Sampah Industri dan Rumah Tangga Kurnia Wahyu Prima; Asmaul Husnah
Journal of Vocational, Informatics and Computer Education Vol 2, No 2 (2024): December 2024
Publisher : Academic Bright Collaboration

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/voice.v2i2.20249

Abstract

Tingginya volume limbah rumah tangga dan industri yang tidak terkelola dengan baik menimbulkan dampak lingkungan serius dan mencerminkan rendahnya kesadaran serta partisipasi masyarakat dalam praktik daur ulang. Penelitian ini bertujuan untuk mengembangkan dan mengimplementasikan aplikasi Smart Recycle sebagai solusi digital untuk meningkatkan efisiensi dan keterlibatan masyarakat dalam pengelolaan sampah. Metode penelitian yang digunakan mencakup tahapan identifikasi kebutuhan, perancangan sistem, pengembangan fitur aplikasi, serta uji implementasi berbasis pendekatan rekayasa perangkat lunak. Hasil menunjukkan bahwa aplikasi ini berhasil menyediakan fitur pemilahan sampah, panduan edukatif, serta konektivitas dengan lembaga daur ulang yang memudahkan pengguna dalam proses pengelolaan limbah. Fitur pemantauan dan pelaporan memungkinkan pengguna melihat kontribusinya terhadap lingkungan, sementara sistem insentif berbasis poin mendorong peningkatan partisipasi aktif. Aplikasi ini juga berpotensi dikembangkan lebih lanjut dengan integrasi teknologi seperti IoT dan Augmented Reality untuk meningkatkan akurasi dan pengalaman pengguna. Temuan ini menunjukkan bahwa teknologi digital melalui aplikasi Smart Recycle memiliki kontribusi signifikan dalam mendorong perubahan perilaku masyarakat terhadap pengelolaan sampah yang berkelanjutan.
Balancing Data Security: A Comparative Review of Hashing and Non-Hashing Approaches in Data Storage Kurnia Wahyu Prima
Journal of Embedded Systems, Security and Intelligent Systems Vol 6, No 2 (2025): June 2025
Publisher : Program Studi Teknik Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59562/jessi.v6i2.9257

Abstract

Data security is a vital pillar in modern information system management, particularly in preventing unauthorized access, data breaches, and internal misuse. Among the core techniques to protect sensitive information, hashing stands out as an essential approach, transforming original data into a fixed, non-reversible format to ensure confidentiality and integrity. However, many systems still store passwords or other sensitive data in plaintext, leaving them highly vulnerable to exploitation. This study conducts a comparative experimental analysis between two system prototypes: one implementing the SHA-256 hashing algorithm and another storing data without hashing. Tests were conducted through brute-force attack simulations and direct database inspections using phpMyAdmin on a local server environment. The findings show that the non-hashing system exposed 100% of stored passwords in readable form, allowing immediate access and manipulation by internal actors. In contrast, the hashing-based system successfully obscured password content, making it computationally infeasible to reverse even with administrative database access. These results affirm the crucial role of hashing in enhancing data protection. Beyond technical validation, this study underscores the urgency of adopting hashing as a minimum security standard in any system managing confidential data. The results highlight that incorporating cryptographic hashing not only defends against external attacks but also mitigates insider threats. Therefore, organizations and developers must treat hashing as a non-negotiable part of system architecture to ensure long-term data security, compliance with global standards, and the preservation of user trust in the digital era.