Methodological Review: The Importance of Systematic Literature Review (SLR) in Strengthening the Foundation of Informatics Research for Beginner Researchers
Keywords:
Research Methodology, Systematic Literature Review, Informatics, Beginner Researchers, Academic Integrity, Keyword 6 (Min 3, Max 6 phrases/keywords. A combination of all keywords represents the content, contribution, or purpose of the manuscript.)Abstract
The rapid development of information technology requires researchers in the field of informatics to have a solid theoretical foundation before conducting technical experiments. This study aims to explain the urgency of the Systematic Literature Review (SLR) method as the primary instrument for mapping the state-of-the-art and identifying research gaps. The analysis was conducted through a systematic literature review of 50 scientific publications from national and international journals published between 2020 and 2025.
The data extraction process focused on mapping dominant topics such as wireless network infrastructure, cybersecurity, and the implementation of artificial intelligence in education. The study results indicate that the disciplined use of the SLR method can improve the quality of findings and maintain researchers' academic integrity from the risk of unintentional research duplication. Furthermore, this article identifies the significant contribution of local publications in enriching the variety of informatics research case studies in Indonesia. By outlining the stages from formulating research questions to data synthesis, this study provides practical guidance for novice researchers to produce credible and structured scientific papers. It is hoped that this review model can serve as a methodological reference in developing informatics research that is more adaptive to future technological challenges.
Downloads
References
[1] S. Safiuddin and F. P. E. Putra, “Strategi Efisiensi Wireless Sensor Network (WSN),” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 52, Jul. 2023, doi: 10.51211/itbi.v8i1.2441.
[2] F. P. E. Putra, N. Ramadhani, F. Fauzan, and ..., “Service Quality Analysis of RFID-Based Smart Door Lock in Front One Azana Style Hotel Area,” Brill. Res. …, 2024, doi: 10.47709/brilliance.v4i1.4292.
[3] F. P. E. Putra, A. B. Tamam, R. W. Efendi, and ..., “Optimasi Keamanan DNS: Eksplorasi Optimal dengan Implementasi DNS Security Extensions (DNSSEC),” REMIK Ris. dan E …, 2024, doi: 10.33395/remik.v8i1.13398.
[4] F. P. E. Putra, A. Baidawi, and A. A. Mubarok, “Merancang Jaringan Sensor Nirkabel dan IoT untuk Kota Pintar Pamekasan,” 2023, academia.edu. doi: https://doi.org/10.37034/jidt.v5i2.331.
[5] F. P. E. Putra, D. T. Agustina, T. S. K. Khotimah, and ..., “Analisis Kinerja Jaringan 5G dalam Meningkatkan Konektivitas Internet of Things (IoT),” 2025, researchgate.net. doi: https://doi.org/10.55606/jitek.v5i1.5836.
[6] F. Prasetyo Eka Putra, S. R. Sutarsih, S. Sofiyulloh, P. Permana, and M. Umar Mansyur, “OPTIMALISASI PERANCANGAN APLIKASI MANAJEMEN DATA KOLOMAN, DI DESA PULAU MANDANGIN SAMPANG – MADURA BERBASIS WEBSITE,” Rabit J. Teknol. dan Sist. Inf. Univrab, vol. 9, no. 2, pp. 285–294, Jul. 2024, doi: 10.36341/rabit.v9i2.4840.
[7] F. P. E. Putra, M. Nazir, and Y. Zain, “Optimasi Penilaian Pada E-Learning Universitas Madura Dengan Menggunakan Metode Scaffolding,” 2020, scholar.archive.org. doi: https://doi.org/10.30873/ji.v20i2.2414.
[8] F. P. Eka Putra, L. Fitriyah, Z. Naimah, and S. A. Rofika, “Evaluasi Kinerja Aplikasi Wireshark Dalam Monitoring Jaringan Kecil Dengan Topologi Star dan Bus,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 164–176, 2025, doi: 10.47324/ilkominfo.v8i2.343.
[9] N. H. Hari, F. P. E. Putra, M. N. Arifin, M. Y. Zain, and ..., “Desain dan Perancangan Smart Campus berbasis ZigBee Wireless Sensor Network,” 2021, academia.edu. doi: https://doi.org/10.17977/um068v1i112021p842-850.
[10] F. P. E. Putra, S. R. Sutarsih, S. Sofiyulloh, and ..., “OPTIMALISASI PERANCANGAN APLIKASI MANAJEMEN DATA KOLOMAN, DI DESA PULAU MANDANGIN SAMPANG –MADURA BERBASIS WEBSITE,” … J. Teknol. dan …, 2024, doi: https://doi.org/10.36341/rabit.v9i2.4840.
[11] J. A. Ariza and H. Baez, “Understanding the role of single‐board computers in engineering and computer science education: A systematic literature review,” Comput. Appl. Eng. …, 2022, doi: 10.1002/cae.22439.
[12] Y. Mekonnen, S. Namuduri, L. Burton, A. Sarwat, and S. Bhansali, “Review—Machine Learning Techniques in Wireless Sensor Network Based Precision Agriculture,” J. Electrochem. Soc., vol. 167, no. 3, p. 037522, 2020, doi: 10.1149/2.0222003jes.
[13] L. N. Mintarya, J. N. M. Halim, C. Angie, S. Achmad, and ..., “Machine learning approaches in stock market prediction: A systematic literature review,” … Comput. Sci., 2023, doi: https://doi.org/10.1016/j.procs.2022.12.115.
[14] M.-S. Hosseini, F. Jahanshahlou, M. A. Akbarzadeh, M. Zarei, and Y. Vaez-Gharamaleki, “Formulating research questions for evidence-based studies,” J. Med. Surgery, Public Heal., vol. 2, no. December 2023, p. 100046, 2024, doi: 10.1016/j.glmedi.2023.100046.
[15] M. K. Dehury, B. K. Mohanta, and S. Chedup, “Security issues and challenges in deploying a CPS using WSN,” … Secur. Mod. Trends …, 2024, doi: 10.1007/978-981-97-0407-1_2.
[16] J. C. Paiva, J. P. Leal, and Á. Figueira, “Automated assessment in computer science education: A state-of-the-art review,” ACM Trans. Comput. …, 2022, doi: 10.1145/3513140.
[17] M. Hussain, M. Hussain, N. Aamer, and F. Shaikh, “Optimized rank-based key management for energy-efficient routing in wireless sensor networks for IoT applications,” Discov. Internet Things, vol. 5, no. 1, 2025, doi: 10.1007/s43926-025-00224-3.
[18] E. Bicamumakuba, M. N. Reza, H. Jin, Samsuzzaman, K.-H. Lee, and S.-O. Chung, “Multi-Sensor Monitoring, Intelligent Control, and Data Processing for Smart Greenhouse Environment Management,” Sensors, vol. 25, no. 19, p. 6134, 2025, doi: 10.3390/s25196134.
[19] H. Q. Deng, J. Luo, K. C. Chang, Q. B. Li, and ..., “Research on security level evaluation method for cascading trips based on WSN,” Wirel. …, 2021, doi: 10.1155/2021/6649127.
[20] A. Alam and A. Mohanty, “Design, development, and implementation of software engineering virtual laboratory: A boon to computer science and engineering (CSE) education during Covid-19 …,” Proc. third Int. Conf. …, 2023, doi: 10.1007/978-981-19-7874-6_1.
[21] A. Zrelli and T. Ezzedine, “A New Approach of WSN Deployment, K-Coverage and Connectivity in Border Area,” Wirel. Pers. Commun., 2021, doi: 10.1007/s11277-021-08881-7.
[22] Z. Hu, Y. Wang, and M. He, Advances in intelligent systems, computer science and digital economics III. Springer, 2022. doi: 10.1007/978-3-030-97057-4.
[23] D. A. Sokolov, “Autonomous DevOps Framework for Multi - Cloud ERP Systems : AI - Driven Integration of SAP S / 4HANA with Apache Ecosystem and Wireless Sensor Networks,” vol. 7, no. 6, pp. 10917–10923, 2025, doi: 10.15662/IJEETR.2025.0706004.
[24] K. S. Adu-Manu et al., “Combinatorial bat optimization for wsn with hoover index clustering,” Wirel. Pers. …, 2020, doi: 10.1155/2022/1628537.
[25] Y. Zhang, L. Yang, and Y. Tan, “Energy-efficient adaptive routing in heterogeneous wireless sensor networks via hybrid PSO and dynamic clustering,” J. Cloud Comput., vol. 14, no. 1, 2025, doi: 10.1186/s13677-025-00768-3.
[26] S. Chauhan and K. Popat, “The role of IoT and M2M communication in fostering business innovation and driving organizational growth,” Discov. Internet Things, vol. 5, no. 1, 2025, doi: 10.1007/s43926-025-00231-4.
[27] R. Arya, J. Singh, and A. Kumar, “A survey of multidisciplinary domains contributing to affective computing,” Comput. Sci. Rev., 2021, doi: https://doi.org/10.1016/j.cosrev.2021.100399.
[28] A. Rana, S. Prajapat, P. Kumar, and K. Kumar, “Performance evaluation of machine learning models for intrusion detection in wireless sensor networks: a case study using the WSN DS dataset,” Int. Conf. …, 2023, doi: 10.1007/978-981-99-8129-8_15.
[29] G. Bakshi and H. Sahu, “WSN Security: Intrusion Detection Approaches Using Machine Learning,” … Intell. Wirel. Sens. Networks, 2022, doi: 10.1201/9781003102397-9.
[30] I. F. Parreño and D. F. Avila, “Analysis of the cybersecurity in wireless sensor networks (WSN): A review literature,” … Def. Secur. Proc. MICRADS …, 2021, doi: 10.1007/978-981-16-4884-7_8.
[31] S. Maurya, K. S, P. K, P. C. Karthik, and V. G. Saranya, “Hybrid compression-based routing strategies for enhanced energy efficiency in wireless sensor networks,” J. Cloud Comput., vol. 14, no. 1, 2025, doi: 10.1186/s13677-025-00787-0.
[32] C. H. Cao, Y. N. Tang, D. Y. Huang, and ..., “IIBE: An Improved Identity‐Based Encryption Algorithm for WSN Security,” 2021, Wiley Online Library. doi: 10.1155/2021/8527068.
[33] J. Medina-García, J. A. Gómez-Galán, J. M. Vilaplana-Guerrero, and J. A. Bogeat, “Efficient irrigation system using a combined wireless sensor network based on LoRaWAN and IEEE 802.15.4 technologies and photosynthetically active radiation measurements,” Internet Things (The Netherlands), vol. 34, no. October, 2025, doi: 10.1016/j.iot.2025.101801.
[34] D. Chouhan and S. S. Shrivastava, “A Study of Cryptographic Scheme for Safe Data Transfer in Wireless Sensor Network Involving Logic Gate,” vol. 4, pp. 94–104, 2025, doi: https://doi.org/10.70558/IJST.2025.v2.i4.241109.
[35] M. A. Talukder, S. Sharmin, M. A. Uddin, M. M. Islam, and ..., “MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs,” 2024, Springer. doi: 10.1007/s10207-024-00833-z.
[36] M. Liu and F. M’hiri, “Beyond traditional teaching: Large language models as simulated teaching assistants in computer science,” … 55th ACM Tech. Symp. Comput. Sci. …, 2024, doi: 10.1145/3626252.3630789.
[37] N. Raihan, M. L. Siddiq, J. C. S. Santos, and ..., “Large language models in computer science education: A systematic literature review,” … Comput. Sci. …, 2025, doi: 10.1145/3641554.3701863.
[38] C. N. Idika, U. U. James, O. M. Ijiga, and ..., “… with Zero Trust Policy Enforcement in Smart Manufacturing Cyber-Physical System International Journal of Scientific Research in Computer Science,” 2023, researchgate.net. doi: https://doi.org/10.32628/IJSRCSEIT.
[39] V. S. Kornilov and S. V Morozova, “Experimental pedagogical activity when teaching computer science to younger students,” Rudn J. Informatiz. …, 2020, doi: 10.22363/2312-8631-2020-17-1-18-25.
[40] K. Do, R. Y. Pang, J. Jiang, and K. Reinecke, “‘That’s important, but...’: How Computer Science Researchers Anticipate Unintended Consequences of Their Research Innovations,” … Hum. Factors Comput. …, 2023, doi: 10.1145/3544548.3581347.
[41] K. Bajaj, B. Sharma, and R. Singh, “Integration of WSN with IoT applications: a vision, architecture, and future challenges,” Integr. WSN IoT Smart Cities, 2020, doi: 10.1007/978-3-030-38516-3_5.
[42] J. Sun, H. Ma, Y. Zeng, D. Han, and Y. Jin, “Promoting the AI teaching competency of K-12 computer science teachers: A TPACK-based professional development approach,” Educ. Inf. …, 2023, doi: 10.1007/s10639-022-11256-5.
[43] N. Shaheen et al., “Appraising systematic reviews: a comprehensive guide to ensuring validity and reliability,” Front. Res. Metrics Anal., vol. 8, 2023, doi: 10.3389/frma.2023.1268045.
[44] J. Yates and A. C. Plagnol, “Female computer science students: A qualitative exploration of women’s experiences studying computer science at university in the UK,” 2022, Springer. doi: 10.1007/s10639-021-10743-5.
[45] D. Escudero-Mancebo, N. Fernández-Villalobos, Ó. Martín-Llorente, and A. Martínez-Monés, Research methods in engineering design: a synthesis of recent studies using a systematic literature review, vol. 34, no. 2. Springer London, 2023. doi: 10.1007/s00163-022-00406-y.
[46] K. Ávila, P. Sanmartin, D. Jabba, and J. Gómez, “An analytical survey of attack scenario parameters on the techniques of attack mitigation in WSN,” 2022, Springer. doi: 10.1007/s11277-021-09107-6.
[47] A. A. Salatino, T. Thanapalasingam, A. Mannocci, and ..., “The computer science ontology: A comprehensive automatically-generated taxonomy of research areas,” Data …, 2020, doi: https://doi.org/10.1162/dint_a_00055.
[48] A. J. Dhruv, R. Patel, and N. Doshi, “Python: the most advanced programming language for computer science applications,” 2021, scitepress.org. doi: 10.5220/0010307900003051.
[49] I. H. Sarker, “Deep learning: a comprehensive overview on techniques, taxonomy, applications and research directions,” SN Comput. Sci., 2021, doi: 10.1007/s42979-021-00815-1.
[50] A. Purnomo, T. Susanti, E. Rosyidah, N. Firdausi, and ..., “Digital economy research: Thirty-five years insights of retrospective review,” … Comput. Sci., 2022, [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1877050921023437
Published
Issue
Section
License
Copyright (c) 2026 Kukuh Dwi Nur Cahyo, Rayyan (Penulis)

This work is licensed under a Creative Commons Attribution 4.0 International License.








