Penerapan Metode Systematic Literature Review (SLR) dalam Memetakan Topik Riset Unggulan Mahasiswa Informatika
Keywords:
Systematic Literature Review, Informatics, Research Trends, Computer Science, Mapping, Student ResearchAbstract
Latar Belakang: Perkembangan ilmu komputasi yang pesat menciptakan ekosistem penelitian yang kompleks, sehingga pemetaan literatur yang komprehensif sangat krusial untuk menyingkap tren riset mutakhir, mengidentifikasi celah penelitian, dan mencegah duplikasi karya ilmiah di kalangan mahasiswa informatika. Tujuan: Penelitian ini bertujuan untuk memetakan secara sistematis topik riset unggulan, metodologi dominan, serta tren interdisipliner pada publikasi riset informatika dari tahun 2020 hingga 2025. Metode: Penelitian ini murni merupakan tinjauan pustaka yang mengadopsi metodologi Systematic Literature Review (SLR) yang sepenuhnya didasarkan pada referensi yang ada tanpa pengambilan data di lapangan. Melalui perangkat lunak analitik, 50 artikel primer yang terbit antara tahun 2020 hingga 2025 diseleksi secara ketat dari basis data akademik untuk kemudian dilakukan ekstraksi data tematik. Hasil: Analisis tematik mengategorikan 50 literatur tersebut ke dalam empat klaster utama, yaitu: 1) Kecerdasan Buatan dan NLP (fokus pada model Transformers dan deteksi hate speech); 2) Rekayasa Perangkat Lunak (arsitektur microservice dan pola keamanan); 3) Teknologi Pendidikan (aplikasi Metaverse dan sistem tutoring cerdas); serta 4) Informatika Kesehatan (pemantauan kesehatan mental dan otomasi dataset klinis). Kesimpulan: Hasil kajian ini berhasil memetakan lintasan riset informatika, menunjukkan pergeseran fokus yang jelas menuju solusi sosio-teknis interdisipliner. Peta jalan riset berhasil dirumuskan untuk menjadi panduan akademis, dan penelitian selanjutnya disarankan untuk mengkaji implementasi AI yang etis serta keamanan siber berskala besar pada berbagai domain terapan tersebut.
Downloads
References
A. Razi et al., “A Human-Centered Systematic Literature Review of the Computational Approaches for Online Sexual Risk Detection,” Proc. ACM Hum.-Comput. Interact., vol. 5, no. CSCW2, p. 465:1-465:38, Oktober 2021, doi: 10.1145/3479609.
[2] J. Nakatumba-Nabende, S. Kagumire, C. Kantono, and P. Nabende, “A Systematic Literature Review on Bias Evaluation and Mitigation in Automatic Speech Recognition Models for Low-Resource African Languages,” ACM Comput. Surv., vol. 58, no. 4, p. 105:1-105:24, Oktober 2025, doi: 10.1145/3769089.
[3] A. F. Hidayatullah, A. Qazi, D. T. C. Lai, and R. A. Apong, “A Systematic Review on Language Identification of Code-Mixed Text: Techniques, Data Availability, Challenges, and Framework Development,” IEEE Access, vol. 10, pp. 122812–122831, 2022, doi: 10.1109/ACCESS.2022.3223703.
[4] I. García-Martínez, J. M. Fernández-Batanero, J. Fernández-Cerero, and S. P. León, “Analysing the Impact of Artificial Intelligence and Computational Sciences on Student Performance: Systematic Review and Meta-analysis,” J. New Approaches Educ. Res., vol. 12, no. 1, pp. 171–197, Jan. 2023, doi: 10.7821/naer.2023.1.1240.
[5] F. Eka Putra, N. Saputri, F. Rosi, and R. Loati, “Optimalisasi Infrastruktur Cloud Networking melalui Integrasi SDN, NFV, dan Multi-Cloud,” Jurnal Informatika Dan Tekonologi Komputer (JITEK), vol. 5, pp. 118–125, Mar. 2025, doi: 10.55606/jitek.v5i1.6099.
[6] H. Fissalma, A. Ferdinansyah, and B. Purwandari, “Investigating challenges in Agile software development: a cross-country comparative analysis.,” International Journal of Electrical & Computer Engineering (2088-8708), vol. 15, no. 1, p. 855, Feb. 2025, doi: 10.11591/ijece.v15i1.pp855-869.
[7] F. P. Eka Putra, I. N. Sudana Degeng, S. Ulfa, and W. Kamdi, “The Evolution of Quality Education: Impacts and Challenges of Using Open Educational Resources (OER) and Open Educational Practices (OEP) in the Conceive - Design - Implement - Operate (CDIO) Framework,” TEM Journal, pp. 386–395, Feb. 2024, doi: 10.18421/TEM131-40.
[8] I. A. Nanomi Arachchige, P. Sandanapitchai, and R. Weerasinghe, “Investigating Machine Learning & Natural Language Processing Techniques Applied for Predicting Depression Disorder from Online Support Forums: A Systematic Literature Review,” Information, vol. 12, no. 11, p. 444, Nov. 2021, doi: 10.3390/info12110444.
[9] T. Dillan and D. H. Fudholi, “LDAViewer: An Automatic Language-Agnostic System for Discovering State-of-the-Art Topics in Research Using Topic Modeling, Bidirectional Encoder Representations From Transformers, and Entity Linking,” IEEE Access, vol. 11, pp. 59142–59163, 2023, doi: 10.1109/ACCESS.2023.3285116.
[10] C. Sánchez-Martínez and I. Alpizar-Chacon, “Mapping Latin American Research in Computing Education: Participation and Disparities,” in Proceedings of the 2025 Conference on Research on Equitable and Sustained Participation in Engineering, Computing, and Technology, in RESPECT 2025. New York, NY, USA: Association for Computing Machinery, Jul. 2025, pp. 34–42. doi: 10.1145/3704637.3734756.
[11] V. K. Nadimpalli, F. Hauser, D. Bittner, L. Grabinger, S. Staufer, and J. Mottok, “Systematic Literature Review for the Use of AI Based Techniques in Adaptive Learning Management Systems,” in Proceedings of the 5th European Conference on Software Engineering Education, in ECSEE ’23. New York, NY, USA: Association for Computing Machinery, Jun. 2023, pp. 83–92. doi: 10.1145/3593663.3593681.
[12] F. Eka Putra, D. Siswoyo, M. Yaqin, and R. Oktavia, “Tinjauan Regulasi Siber dan Kebijakan Keamanan Jaringan 5G: Perspektif Nasional dan Internasional,” Jurnal Informatika Dan Tekonologi Komputer (JITEK), vol. 5, pp. 126–134, Mar. 2025, doi: 10.55606/jitek.v5i1.6141.
[13] O. S. Mawaddah, M. Arbarini, B. Subali3, and A. Widiyatmoko, “Systematic Literature Review: The Impact of Coding Education on Computational Thinking Skills in Elementary School (2020-2025),” Edu Cendikia: Jurnal Ilmiah Kependidikan, vol. 6, no. 01, pp. 428–442, Apr. 2026, doi: 10.47709/educendikia.v6i01.8145.
[14] S. Ibrahim, C. Catal, and T. Kacem, “The use of multi-task learning in cybersecurity applications: a systematic literature review,” Neural Comput & Applic, vol. 36, no. 35, pp. 22053–22079, Dec. 2024, doi: 10.1007/s00521-024-10436-3.
[15] F. P. E. Putra, U. Ubaidi, R. N. Saputra, F. M. Haris, and S. N. R. Barokah, “Application of Internet of Things Technology in Monitoring Water Quality in Fishponds,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 356–361, Feb. 2024, doi: 10.47709/brilliance.v4i1.4231.
[16] F. Alkomah and X. Ma, “A Literature Review of Textual Hate Speech Detection Methods and Datasets,” Information, vol. 13, no. 6, p. 273, Jun. 2022, doi: 10.3390/info13060273.
[17] Y. Zhang, C. Lyu, L. Chang, H. Yang, B. Ji, and L. Wei, “A systematic review of automated International Classification of Diseases coding models using the Medical Information Mart for Intensive Care dataset,” DIGITAL HEALTH, vol. 11, p. 20552076251404518, Aug. 2025, doi: 10.1177/20552076251404518.
[18] R. Celian, Gandon, Fabien, F. Catherine, M. Franck, and A. A. Hanna, “A systematic review of relation extraction task since the emergence of Transformers,” Nov. 21, 2025, arXiv: arXiv:2511.03610. doi: 10.48550/arXiv.2511.03610.
[19] F. Eka Putra, D. Agustina, T. Khotimah, and T. Ramadhanty, “Analisis Kinerja Jaringan 5G dalam Meningkatkan Konektivitas Internet of Things (IoT),” Jurnal Informatika Dan Tekonologi Komputer (JITEK), vol. 5, pp. 56–62, Mar. 2025, doi: 10.55606/jitek.v5i1.5836.
[20] S. A. Soomro, S. S. Yuhaniz, M. A. Dootio, G. Murtaza, and M. H. Mughal, “A Systematic Review on Sentiment Analysis for Sindhi Text,” Baghdad Sci.J, Nov. 2024, doi: 10.21123/bsj.2024.10954.
[21] M. A. Akbar, A. Alsanad, S. Mahmood, A. A. Alsanad, and A. Gumaei, “A Systematic Study to Improve the Requirements Engineering Process in the Domain of Global Software Development,” IEEE Access, vol. 8, pp. 53374–53393, 2020, doi: 10.1109/ACCESS.2020.2979468.
[22] R. Meylani and T. Kutluca, “AI-Powered Discourse in Mathematics Education in Support of SDG 4: A Systematic Review of Contemporary Research Literature,” Discourse and Communication for Sustainable Education, vol. 16, no. 2, pp. 25–43, Dec. 2025, doi: 10.2478/dcse-2025-0014.
[23] M. S. H. M. S. Hidayatullah, M. N. A. M. N. Arifin, F. P. E. P. F. P. E. Putra, and I. D. I. Darmawan, “Pengembangan Sistem Informasi Berbasis Web untuk Manajemen Pesanan, Produksi, dan Stok Pada UMKM Kripik Pisang Ibu Ira Bangkal Sumenep,” Jurnal Ilmu Komputer dan Multimedia, vol. 2, no. 2, pp. 7–13, Dec. 2025, doi: 10.46510/ilkomedia.v2i2.69.
[24] F. P. E. Putra, M. Surur, M. Mahendra, and G. Arifin, “Internet Network QOS Analysis at Yala Kopitiam pamekasan Using Wireshak,” Brilliance: Research of Artificial Intelligence, vol. 5, no. 1, pp. 190–200, Mar. 2025, doi: 10.47709/brilliance.v5i1.5940.
[25] V. C. Kaelin, M. Valizadeh, Z. Salgado, N. Parde, and M. A. Khetani, “Artificial Intelligence in Rehabilitation Targeting the Participation of Children and Youth With Disabilities: Scoping Review,” Journal of Medical Internet Research, vol. 23, no. 11, p. e25745, Nov. 2021, doi: 10.2196/25745.
[26] M. A. Botto Tobar, M. G. J. van den Brand, and A. Serebrenik, “Cross-Language Plagiarism Detection: Methods, Tools, and Challenges: A Systematic Review,” International Journal on Advanced Science, Engineering and Information Technology, vol. 12, no. 2, pp. 589–599, May 2022, doi: 10.18517/ijaseit.12.2.14711.
[27] M. M. Askarizadeh, L. Gholamhosseini, R. Khajouei, S. Homayee, F. Askarizadeh, and L. Ahmadian, “Determining the impact of mobile-based self-care applications on reducing anxiety in healthcare providers: a systematic review,” BMC Med Inform Decis Mak, vol. 25, no. 1, p. 37, Jan. 2025, doi: 10.1186/s12911-024-02817-4.
[28] F. P. E. Putra, M. Irfan, M. Aziz, and R. N. Saputra, “Wireless Network Design at Pamekasan Regency Public Library,” Brilliance: Research of Artificial Intelligence, vol. 5, no. 1, pp. 144–150, Mar. 2025, doi: 10.47709/brilliance.v5i1.5876.
[29] B. Kurniawan, M. Meyliana, H. L. H. S. Warnars, and B. Suharjo, “Development of Intelligent Tutoring System Model in the Learning System of the Indonesian National Armed Forces Completed with Bibliometric Analysis,” ASEAN Journal of Science and Engineering, vol. 4, no. 2, pp. 207–220, 2024, doi: 10.17509/ajse.v4i2.70375.
[30] E. Prosser, C. Peersman, and M. Edwards, “The Missing Resources for Child Online Risk Detection,” ACM Comput. Surv., vol. 58, no. 11, p. 286:1-286:36, Apr. 2026, doi: 10.1145/3806384.
[31] S. N. Jyothy, V. K. Kolil, R. Raman, and K. Achuthan, “Exploring large language models as an integrated tool for learning, teaching, and research through the Fogg Behavior Model: a comprehensive mixed-methods analysis,” Cogent Engineering, vol. 11, no. 1, p. 2353494, Dec. 2024, doi: 10.1080/23311916.2024.2353494.
[32] J. Park, J. Gracie, A. Alsoubai, G. Stringhini, V. Singh, and P. Wisniewski, “Towards Automated Detection of Risky Images Shared by Youth on Social Media,” in Companion Proceedings of the ACM Web Conference 2023, in WWW ’23 Companion. New York, NY, USA: Association for Computing Machinery, Apr. 2023, pp. 1348–1357. doi: 10.1145/3543873.3587607.
[33] J. Saefan, S. Wahyuni, W. Hardyanto, and Wiyanto, “How Computational Notebooks Are Implemented in the Classroom: Challenges and Impacts—A Systematic Review,” Mar. 17, 2026, Research Square. doi: 10.21203/rs.3.rs-9124168/v1.
[34] L. Setiyani, A. Gintings, A. Syamsudin, and D. Arifin, “Implementation Knowledge Management in Management Thesis for Higher Education in Indonesia,” Rekayasa, vol. 13, no. 2, pp. 144–153, Aug. 2020, doi: 10.21107/rekayasa.v13i2.5909.
[35] Z. Xing and W. Zhao, “K-means Clustering: A Review of the Past 70 Years,” Dec. 02, 2025, Social Science Research Network, Rochester, NY: 5842722. doi: 10.2139/ssrn.5842722.
[36] D. Richardson and B. Matthews, “Location-Based Games for Language Learning: A Scoping Review,” Research Synthesis in Applied Linguistics, vol. 1, no. 2, pp. 270–301, Jul. 2025, doi: 10.1080/29984475.2025.2527650.
[37] N. H. Di Cara, V. Maggio, O. S. P. Davis, and C. M. A. Haworth, “Methodologies for Monitoring Mental Health on Twitter: Systematic Review,” J Med Internet Res, vol. 25, p. e42734, May 2023, doi: 10.2196/42734.
[38] S. Born, M. May, C. Piau-Toffolon, and S. Iksal, “Model Selection for Homophone Spelling Correction in Low-Resource Languages: A Systematic Review with Khmer Case Study,” in AIJR, Phnom Penh, Cambodia: Paragon International University, Sep. 2025, pp. 6–17. doi: 10.21467/proceedings.8.1.2.
[39] S. A, “Research Data Management Practices and Challenges in Academic Libraries: A Comprehensive Review,” Jul. 19, 2023, Social Science Research Network, Rochester, NY: 4515473. doi: 10.2139/ssrn.4515473.
[40] T. L. M. Suryanto, A. P. Wibawa, H. Hariyono, and A. Nafalski, “Evolving Conversations: A Review of Chatbots and Implications in Natural Language Processing for Cultural Heritage Ecosystems,” International Journal of Robotics and Control Systems, vol. 3, no. 4, pp. 955–1006, Dec. 2023, doi: 10.31763/ijrcs.v3i4.1195.
[41] Y. Qian, J. Wang, and Y. Cai, “Revolutionizing educational landscapes: A systematic review of Metaverse applications, paradigms and emerging technologies,” Cogent Education, vol. 10, no. 2, p. 2264006, Dec. 2023, doi: 10.1080/2331186X.2023.2264006.
[42] A. S. Abdelfattah and T. Cerny, “Roadmap to Reasoning in Microservice Systems: A Rapid Review,” Applied Sciences, vol. 13, no. 3, p. 1838, Jan. 2023, doi: 10.3390/app13031838.
[43] H. Washizaki et al., “Systematic Literature Review of Security Pattern Research,” Information, vol. 12, no. 1, p. 36, Jan. 2021, doi: 10.3390/info12010036.
[44] F. P. E. Putra, U. Ubaidi, M. A. Huda, H. Hasbullah, and A. Rohman, “Computer Network Management Optimization Through Big Data Analysis Using Time Series Analysis Method,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 434–442, Feb. 2024, doi: 10.47709/brilliance.v4i1.4373.
[45] O. Estrada-Molina, D. R. Fuentes-Cancell, and A. A. Morales, “The assessment of the usability of digital educational resources: An interdisciplinary analysis from two systematic reviews,” Educ Inf Technol, vol. 27, no. 3, pp. 4037–4063, Apr. 2022, doi: 10.1007/s10639-021-10727-5.
[46] F. P. E. Putra, L. Fitriyah, Z. Naimah, and S. A. Rofika, “Evaluasi Kinerja Aplikasi Wireshark Dalam Monitoring Jaringan Kecil Dengan Topologi Star dan Bus,” Jurnal Ilmiah ILKOMINFO - Ilmu Komputer & Informatika, vol. 8, no. 2, pp. 164–176, Jul. 2025, doi: 10.47324/ilkominfo.v8i2.343.
[47] Y. Lian and J. Xie, “The Evolution of Digital Cultural Heritage Research: Identifying Key Trends, Hotspots, and Challenges through Bibliometric Analysis,” Sustainability, vol. 16, no. 16, p. 7125, Jan. 2024, doi: 10.3390/su16167125.
[48] Y. Sopianti, S. Lalenoh, and Y. Ramadhan, “Transformation of the Role of Accountants in the Digital Era: A Literature Review on the Impact of Data Analytics in Financial Reporting,” Indonesian Interdisciplinary Journal of Sharia Economics (IIJSE), vol. 9, no. 1, pp. 184–192, 2026, doi: 10.31538/iijse.v9i1.7457.
[49] M. Černý, “University Students’ Conceptualisation of AI Literacy: Theory and Empirical Evidence,” Social Sciences, vol. 13, no. 3, p. 129, Mar. 2024, doi: 10.3390/socsci13030129.
[50] F. P. E. Putra, M. Dafid, and I. Syafi’i, “Firewall Implementation as a Computer Network Security Strategy for Data Protection,” Brilliance: Research of Artificial Intelligence, vol. 5, no. 1, pp. 291–297, Mar. 2025, doi: 10.47709/brilliance.v5i1.6162.
Published
Issue
Section
License
Copyright (c) 2026 andreas fiki, Panji cahya prasetyo (Penulis)

This work is licensed under a Creative Commons Attribution 4.0 International License.








