Introduction to Informatics Research Basic Concepts and Research Methodology
Keywords:
Informatics Research, Research methodology, Qualitative Research, Quantitative Research, Mixed Methods, InformaticsAbstract
Informatics research is an important foundation for students and researchers in understanding the scientific process in the field of information technology. This article discusses the basic concepts of informatics research, including the definition of research, objectives, and characteristics of scientific research. Furthermore, it explains various types of research methodologies commonly used, such as qualitative, quantitative, and mixed methods research. Research in informatics focuses not only on software development but also includes data, artificial intelligence, information systems, and human-computer interaction. The research process is explained systematically, starting from problem discussion, literature review, method determination, data collection, and analysis and reporting of research results. By understanding the basic concepts and appropriate research methodology, researchers are expected to be able to produce valid, systematic scientific work that can make a real contribution to the development of informatics.
Downloads
References
[1] Creswell, J. W. (2018). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Sage. doi: 10.4135/9781506335193.
[2] Creswell, J. W. (2014). Educational Research. Pearson.doi: 10.4324/9781315658914
[3] Sugiyono (2019). Metode Penelitian Kuantitatif, Kualitatif, dan R&D. Alfabeta,
[4] Sugiyono (2017). Statistika untuk Penelitian. Alfabeta.
[5] Sekaran, U., & Bougie, R. (2016). Research Methods for Business. Wiley. doi: 10.1002/9781119266846
[6] Kothari, C. R. (2014). Research Methodology: Methods and Techniques. New Age.
[7] Neuman, W. L. (2014). Social Research Methods. Pearson.
[8] Kerlinger, F. N. (2006). Foundations of Behavioral Research. Holt.
[9] S Arikunto, S. (2013). Prosedur Penelitian. Rineka Cipta.
[10] Moleong, L. J. (2017). Metodologi Penelitian Kualitatif. Remaja Rosdakarya.
[11] Laudon, K. C., & Laudon, J. P. (2020). Management Information Systems. Pearson.
doi: 10.1016/C2018-0-02417-5
[12] Stair, R., & Reynolds, G. (2018).Principles of Information Systems. Cengage.
[13] Turban, E. (2015).Information Technology for Management. Wiley.doi: 10.1002/9781118890790
[14] O’Brien, J. A. (2011).Introduction to Information Systems. McGraw-Hill.
[15] Alter, S. (2013). Information Systems: Foundation of E-Business. Pearson.
[16] Pressman, R. S., & Maxim, B. (2020).Software Engineering: A Practitioner's Approach. McGraw-Hill.
[17] Sommerville, I. (2016).Software Engineering. Pearson.
[18] Ian Sommerville (2011). Software Systems Engineering. Addison-Wesley.
[19] Brooks, F. (1995). The Mythical Man-Month. Addison-Wesley.
[20] Boehm, B. (1988). “A Spiral Model of Software Development and Enhancement,” IEEE Computer.
doi: 10.1109/2.59.
[21] Russell, S., & Norvig, P. (2021).Artificial Intelligence: A Modern Approach, 4th ed. Pearson.
[22] Goodfellow, I. (2016).Y. Bengio, and A. Courville, Deep Learning. MIT Press,
doi: 10.7551/mitpress/10243.001.0001
[23] Mitchell, T. (2017). Machine Learning. McGraw-Hill.
[24] Han, J., Kamber, M., & Pei, J. (2012). Data Mining: Concepts and Techniques, 3rd ed. Morgan Kaufmann.
doi: 10.1016/C2009-0-61819-5
[25] Witten, I. H. (2016). E. Frank, M. A. Hall, and C. J. Pal, Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann. doi: 10.1016/C2015-0-01874-7
[26] Tanenbaum, A. S., & Wetherall, D. (2018). Computer Networks, 5th ed. Pearson.
[27] Kurose, J. F. (2017).Computer Networking: A Top-Down Approach, 7th ed. Pearson.
[28] Stallings, W. (2017). Data and Computer Communications, 10th ed. Pearson.
[29] Forouzan, B. A. (2012).Data Communications and Networking, 5th ed. McGraw-Hill.
[30] Comer, D. (2014)., Computer Networks and Internets, 6th ed. Pearson.
[31] Stallings, W. (2017).Cryptography and Network Security: Principles and Practice, 7th ed. Pearson.
[32] Bishop, M. (2018).Computer Security: Art and Science, 2nd ed. Addison-Wesley.
[33] Whitman, M. (2012). Principles of Information Security, 5th ed. Cengage.
[34] Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems,
3rd ed.Wiley. doi: 10.1002/9781119642787
[35] Pfleeger, C. (2015). Security in Computing, 5th ed. Pearson.
[36] Mell, P., & Grance, T. (2011). “The NIST Definition of Cloud Computing,” NIST Special Publication 800- 145, 2011. doi: 10.6028/NIST.SP.800-145
[37] Buyya, R. (2013).Cloud Computing: Principles and Paradigms. Wiley. doi: 10.1002/9780470940105
[38] Gubbi, J. (2013). “Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions,” Future Generation Computer Systems. doi: 10.1016/j.future.2013.01.010
[39] Atzori, L. (2017). “The Internet of Things: A Survey,” Computer Networks, 2010.
doi: 10.1016/j.comnet.2010.05.010
[40] Marz, N. (2015).Big Data: Principles and Best Practices of Scalable Real-Time Data Systems.
Manning, 2015.
[41] A. Field, Field, A. (2013).Discovering Statistics Using IBM SPSS Statistics, 4th ed. Sage.
[42] Montgomery, D. (2012).Introduction to Statistical Quality Control, 7th ed. Wiley. doi: 10.1002/9781118146811
[43] Hair, J. (2014).Multivariate Data Analysis, 7th ed. Pearson.
[44] Walpole, R. (2012). Probability and Statistics for Engineers and Scientists, 9th ed. Pearson.
[45] Triola, M. (2018).Elementary Statistics, 13th ed. Pearson.
[46] Denning, P. J. (2003).“Great Principles of Computing,” Communications of the ACM. doi: 10.1145/948383.948400
[47] Brookshear, J. G. (2015).Computer Science: An Overview, 12th ed. Pearson.
[48] Suyanto. (2017). Artificial Intelligence. Informatika.
[49] Jogiyanto. (2017).Sistem Informasi Keperilakuan.
[50] Indrajani. (2015). Database Design. Elex Media Komputindo.
Published
Issue
Section
License
Copyright (c) 2026 nur beilqis anastasya, alfiyatus zahroh (Penulis)

This work is licensed under a Creative Commons Attribution 4.0 International License.








