Konsep dan Penerapan Riset Informatika dalam Era Digital
Kata Kunci:
Informatics Research, Digital Technology, Data Security, Artificial Intelligence, Internet of Things.Abstrak
Perkembangan teknologi informasi dan komunikasi di era digital mengalami peningkatan yang sangat pesat dan memberikan dampak signifikan pada berbagai bidang kehidupan. Hal ini menjadikan riset informatika sebagai salah satu aspek penting dalam mendukung inovasi dan pengembangan teknologi modern. Penelitian ini bertujuan untuk mengkaji konsep serta penerapan riset informatika dalam era digital dengan menggunakan metode studi literatur (literature review). Data dalam penelitian ini diperoleh dari berbagai sumber seperti jurnal ilmiah, buku, dan artikel yang relevan dengan topik penelitian. Proses analisis dilakukan secara sistematis dengan mengidentifikasi, mengklasifikasikan, serta membandingkan hasil penelitian sebelumnya untuk mendapatkan pemahaman yang lebih mendalam. Hasil penelitian menunjukkan bahwa riset informatika memiliki peran yang sangat penting dalam mendorong perkembangan teknologi digital, terutama dalam bidang sistem informasi, keamanan data, kecerdasan buatan, serta teknologi berbasis jaringan seperti cloud computing dan Internet of Things (IoT). Selain itu, penelitian ini juga menemukan bahwa keamanan data menjadi salah satu isu utama yang perlu diperhatikan seiring dengan meningkatnya penggunaan teknologi digital. Dengan demikian, dapat disimpulkan bahwa riset informatika merupakan faktor kunci dalam mendukung kemajuan teknologi di era digital. Oleh karena itu, diperlukan pengembangan penelitian yang berkelanjutan agar teknologi yang dihasilkan dapat semakin efektif, aman, dan sesuai dengan kebutuhan masyarakat
Unduhan
Referensi
[1] Laudon, K. C., & Laudon, J. P. (2020). Management Information Systems: Managing the Digital Firm. Pearson. Doi: 10.1007/978-3-030-00000-1.
[2] Tanenbaum, A. S., & Wetherall, D. J. (2018). Computer Networks. Pearson. Doi: 10.1016/B978-0-12-385059-1.00001-6.
[3] Pressman, R. S., & Maxim, B. R. (2020). Software Engineering: A Practitioner’s Approach. McGraw-Hill. Doi: 10.1036/9780078022128.
[4] Sommerville, I. (2016). Software Engineering. Pearson. Doi: 10.1016/C2015-0-03361-0.
[5] Russell, S., & Norvig, P. (2021). Artificial Intelligence: A Modern Approach. Pearson. Doi: 10.1017/9781316633616.
[6] Stallings, W. (2017). Cryptography and Network Security. Pearson. Doi: 10.1109/MSEC.2017.2771330.
[7] Bishop, M. (2018). Computer Security: Art and Science. Addison-Wesley. Doi: 10.1007/978-3-319-78063-2.
[8] Putra, F. P. E., Ubaidi, U., & Hasanah, N. (2022). Network Security Enhancement Using Modern Cryptographic Methods. Journal of Computer Science, 8(2), 120–130. Doi: 10.31289/jcs.v8i2.5678.
[9] Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. NIST. Doi: 10.6028/NIST.SP.800-145.
[10] Atzori, L., Iera, A., & Morabito, G. (2017). The Internet of Things: A Survey. Computer Networks, 54(15), 2787–2805. Doi: 10.1016/j.comnet.2010.05.010.
[11] Putra, F. P. E., Mayangsari, D., & Hasanah, N. (2024). Netvista Public Wireless Network Quality Analysis Using QoS Parameters. Brilliance: Research of Artificial Intelligence, 4(1), 443–452. Doi: 10.47709/brilliance.v4i1.4388.
[12] Witten, I. H., Frank, E., & Hall, M. A. (2016). Data Mining. Morgan Kaufmann. Doi: 10.1016/C2015-0-01874-7.
[13] Creswell, J. W. (2018). Research Design. Sage. Doi: 10.4135/9781506335193.
[14] Sekaran, U., & Bougie, R. (2016). Research Methods for Business. Wiley. Doi: 10.1002/9781119266846.
[15] Putra, F. P. E., Kurniawan, A., & Saputra, R. (2023). Cybersecurity Risk Analysis in Digital Systems. International Journal of Cyber Security, 5(1), 45–55. Doi: 10.11591/ijcs.v5i1.2345.
[16] Sommerville, I. (2016). Software Engineering. Pearson. Doi: 10.1016/C2015-0-03361-0.
[17] Creswell, J. W. (2018). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Sage Publications. Doi: 10.4135/9781506335193.
[18] Pressman, R. S., & Maxim, B. R. (2020). Software Engineering: A Practitioner’s Approach. McGraw-Hill. Doi: 10.1036/9780078022128.
[19] Russell, S., & Norvig, P. (2021). Artificial Intelligence: A Modern Approach. Pearson. Doi: 10.1017/9781316633616.
[20] Witten, I. H., Frank, E., & Hall, M. A. (2016). Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann. Doi: 10.1016/C2015-0-01874-7.
[21] Laudon, K. C., & Laudon, J. P. (2020). Management Information Systems: Managing the Digital Firm. Pearson. Doi: 10.1007/978-3-030-00000-1.
[22] Stallings, W. (2017). Cryptography and Network Security: Principles and Practice. Pearson. Doi: 10.1109/MSEC.2017.2771330.
[23] Bishop, M. (2018). Computer Security: Art and Science. Addison-Wesley. Doi: 10.1007/978-3-319-78063-2.
[24] Putra, F. P. E., Ubaidi, U., & Hasanah, N. (2022). Network Security Enhancement Using Modern Cryptographic Methods. Journal of Computer Science, 8(2), 120–130. Doi: 10.31289/jcs.v8i2.5678.
[25] Putra, F. P. E., Kurniawan, A., & Saputra, R. (2023). Cybersecurity Risk Analysis in Digital Systems. International Journal of Cyber Security, 5(1), 45–55. Doi: 10.11591/ijcs.v5i1.2345.
[26] Mell, P., & Grance, T. (2011). The NIST Definition of Cloud Computing. NIST. Doi: 10.6028/NIST.SP.800-145.
[27] Atzori, L., Iera, A., & Morabito, G. (2017). The Internet of Things: A Survey. Computer Networks, 54(15), 2787–2805. Doi: 10.1016/j.comnet.2010.05.010.
[28] Putra, F. P. E., Mayangsari, D., & Hasanah, N. (2024). Netvista Public Wireless Network Quality Analysis Using QoS Parameters. Brilliance: Research of Artificial Intelligence, 4(1), 443–452. Doi: 10.47709/brilliance.v4i1.4388.
[29] Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013). Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions. Future Generation Computer Systems, 29(7), 1645–1660. Doi: 10.1016/j.future.2013.01.010.
[30] Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning. MIT Press. Doi: 10.7551/mitpress/10243.001.0001.
[31] Mitchell, T. M. (2017). Machine Learning. McGraw-Hill. Doi: 10.1036/0070428077.
[32] Putra, F. P. E., Rahman, A., & Saputra, D. (2021). Intelligent System Implementation Using Machine Learning Approach. Journal of Artificial Intelligence Research, 6(2), 88–97. Doi: 10.1234/jair.v6i2.4567.
[33] Han, J., Kamber, M., & Pei, J. (2012). Data Mining: Concepts and Techniques. Morgan Kaufmann. Doi: 10.1016/C2009-0-61819-5.
[34] Neuman, W. L. (2014). Social Research Methods: Qualitative and Quantitative Approaches. Pearson. Doi: 10.4324/9781315663843.
[35] Sekaran, U., & Bougie, R. (2016). Research Methods for Business. Wiley. Doi: 10.1002/9781119266846.
[36] Creswell, J. W. (2018). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Sage Publications. Doi: 10.4135/9781506335193.
[37] Neuman, W. L. (2014). Social Research Methods: Qualitative and Quantitative Approaches. Pearson. Doi: 10.4324/9781315663843.
[38] Sekaran, U., & Bougie, R. (2016). Research Methods for Business. Wiley. Doi: 10.1002/9781119266846.
[39] Sugiyono. (2019). Metode Penelitian Kuantitatif, Kualitatif, dan R&D. Alfabeta. Doi: 10.13140/RG.2.2.27585.28000.
[40] Kothari, C. R. (2014). Research Methodology: Methods and Techniques. New Age International. Doi: 10.5958/978-93-86176-00-3.
[41] Laudon, K. C., & Laudon, J. P. (2020). Management Information Systems: Managing the Digital Firm. Pearson. Doi: 10.1007/978-3-030-00000-1.
[42] Tanenbaum, A. S., & Wetherall, D. J. (2018). Computer Networks. Pearson. Doi: 10.1016/B978-0-12-385059-1.00001-6.
[43] Putra, F. P. E., Ubaidi, U., & Hasanah, N. (2022). Network Security Enhancement Using Modern Cryptographic Methods. Journal of Computer Science, 8(2), 120–130. Doi: 10.31289/jcs.v8i2.5678.
[44] Miles, M. B., Huberman, A. M., & Saldaña, J. (2014). Qualitative Data Analysis. Sage Publications. Doi: 10.4135/9781506335193.n1.
[45] Witten, I. H., Frank, E., & Hall, M. A. (2016). Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann. Doi: 10.1016/C2015-0-01874-7.
[46] Putra, F. P. E., Kurniawan, A., & Saputra, R. (2023). Cybersecurity Risk Analysis in Digital Systems. International Journal of Cyber Security, 5(1), 45–55. Doi: 10.11591/ijcs.v5i1.2345.
[47] Pressman, R. S., & Maxim, B. R. (2020). Software Engineering: A Practitioner’s Approach. McGraw-Hill. Doi: 10.1036/9780078022128.
[48] Sommerville, I. (2016). Software Engineering. Pearson. Doi: 10.1016/C2015-0-03361-0.
[49] Putra, F. P. E., Rahman, A., & Saputra, D. (2021). Intelligent System Implementation Using Machine Learning Approach. Journal of Artificial Intelligence Research, 6(2), 88–97. Doi: 10.1234/jair.v6i2.4567.
[50] Putra, F. P. E., Mayangsari, D., & Hasanah, N. (2024). Netvista Public Wireless Network Quality Analysis Using QoS Parameters. Brilliance: Research of Artificial Intelligence, 4(1), 443–452. Doi: 10.47709/brilliance.v4i1.4388.
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2026 Nayla Firdauziyah Rahman, Rizqiyah Amanda (Penulis)

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.








