Tinjauan Metodologis: Pentingnya Systematic Literature Review (SLR) dalam Memperkuat Fondasi Riset Informatika bagi Peneliti Pemula
Kata Kunci:
Metodologi Riset, Systematic Literature Review, Informatika, Peneliti Pemula, Integritas Akademik, Keyword 6 (Min 3, Max 6 phrases/keywords. A combination of all keywords represents the content, contribution, or purpose of the manuscript.)Abstrak
Pesatnya perkembangan teknologi informasi menuntut peneliti di bidang informatika untuk memiliki landasan teori yang kokoh sebelum melakukan eksperimen teknis. Penelitian ini bertujuan untuk memaparkan urgensi metode Systematic Literature Review (SLR) sebagai instrumen utama dalam memetakan state-of-the-art dan mengidentifikasi celah riset (research gap). Analisis dilakukan melalui kajian literatur sistematis terhadap 50 publikasi ilmiah dari jurnal nasional dan internasional yang diterbitkan dalam kurun waktu 2020 hingga 2025. Proses ekstraksi data difokuskan pada pemetaan topik dominan seperti infrastruktur jaringan nirkabel, keamanan siber, hingga implementasi kecerdasan buatan dalam pendidikan. Hasil kajian menunjukkan bahwa penggunaan metode SLR yang disiplin mampu meningkatkan kualitas temuan dan menjaga integritas akademik peneliti dari risiko duplikasi riset yang tidak disengaja. Selain itu, artikel ini mengidentifikasi kontribusi signifikan dari publikasi lokal dalam memperkaya variasi studi kasus riset informatika di Indonesia. Melalui penjabaran tahapan mulai dari perumusan Research Questions hingga sintesis data, penelitian ini memberikan panduan praktis bagi peneliti pemula untuk menghasilkan karya ilmiah yang kredibel dan terstruktur. Diharapkan model tinjauan ini dapat menjadi referensi metodologis dalam penyusunan riset informatika yang lebih adaptif terhadap tantangan teknologi di masa depan.
Unduhan
Referensi
[1] S. Safiuddin and F. P. E. Putra, “Strategi Efisiensi Wireless Sensor Network (WSN),” INFORMATICS Educ. Prof. J. Informatics, vol. 8, no. 1, p. 52, Jul. 2023, doi: 10.51211/itbi.v8i1.2441.
[2] F. P. E. Putra, N. Ramadhani, F. Fauzan, and ..., “Service Quality Analysis of RFID-Based Smart Door Lock in Front One Azana Style Hotel Area,” Brill. Res. …, 2024, doi: 10.47709/brilliance.v4i1.4292.
[3] F. P. E. Putra, A. B. Tamam, R. W. Efendi, and ..., “Optimasi Keamanan DNS: Eksplorasi Optimal dengan Implementasi DNS Security Extensions (DNSSEC),” REMIK Ris. dan E …, 2024, doi: 10.33395/remik.v8i1.13398.
[4] F. P. E. Putra, A. Baidawi, and A. A. Mubarok, “Merancang Jaringan Sensor Nirkabel dan IoT untuk Kota Pintar Pamekasan,” 2023, academia.edu. doi: https://doi.org/10.37034/jidt.v5i2.331.
[5] F. P. E. Putra, D. T. Agustina, T. S. K. Khotimah, and ..., “Analisis Kinerja Jaringan 5G dalam Meningkatkan Konektivitas Internet of Things (IoT),” 2025, researchgate.net. doi: https://doi.org/10.55606/jitek.v5i1.5836.
[6] F. Prasetyo Eka Putra, S. R. Sutarsih, S. Sofiyulloh, P. Permana, and M. Umar Mansyur, “OPTIMALISASI PERANCANGAN APLIKASI MANAJEMEN DATA KOLOMAN, DI DESA PULAU MANDANGIN SAMPANG – MADURA BERBASIS WEBSITE,” Rabit J. Teknol. dan Sist. Inf. Univrab, vol. 9, no. 2, pp. 285–294, Jul. 2024, doi: 10.36341/rabit.v9i2.4840.
[7] F. P. E. Putra, M. Nazir, and Y. Zain, “Optimasi Penilaian Pada E-Learning Universitas Madura Dengan Menggunakan Metode Scaffolding,” 2020, scholar.archive.org. doi: https://doi.org/10.30873/ji.v20i2.2414.
[8] F. P. Eka Putra, L. Fitriyah, Z. Naimah, and S. A. Rofika, “Evaluasi Kinerja Aplikasi Wireshark Dalam Monitoring Jaringan Kecil Dengan Topologi Star dan Bus,” J. Ilm. Ilk. - Ilmu Komput. Inform., vol. 8, no. 2, pp. 164–176, 2025, doi: 10.47324/ilkominfo.v8i2.343.
[9] N. H. Hari, F. P. E. Putra, M. N. Arifin, M. Y. Zain, and ..., “Desain dan Perancangan Smart Campus berbasis ZigBee Wireless Sensor Network,” 2021, academia.edu. doi: https://doi.org/10.17977/um068v1i112021p842-850.
[10] F. P. E. Putra, S. R. Sutarsih, S. Sofiyulloh, and ..., “OPTIMALISASI PERANCANGAN APLIKASI MANAJEMEN DATA KOLOMAN, DI DESA PULAU MANDANGIN SAMPANG –MADURA BERBASIS WEBSITE,” … J. Teknol. dan …, 2024, doi: https://doi.org/10.36341/rabit.v9i2.4840.
[11] J. A. Ariza and H. Baez, “Understanding the role of single‐board computers in engineering and computer science education: A systematic literature review,” Comput. Appl. Eng. …, 2022, doi: 10.1002/cae.22439.
[12] Y. Mekonnen, S. Namuduri, L. Burton, A. Sarwat, and S. Bhansali, “Review—Machine Learning Techniques in Wireless Sensor Network Based Precision Agriculture,” J. Electrochem. Soc., vol. 167, no. 3, p. 037522, 2020, doi: 10.1149/2.0222003jes.
[13] L. N. Mintarya, J. N. M. Halim, C. Angie, S. Achmad, and ..., “Machine learning approaches in stock market prediction: A systematic literature review,” … Comput. Sci., 2023, doi: https://doi.org/10.1016/j.procs.2022.12.115.
[14] M.-S. Hosseini, F. Jahanshahlou, M. A. Akbarzadeh, M. Zarei, and Y. Vaez-Gharamaleki, “Formulating research questions for evidence-based studies,” J. Med. Surgery, Public Heal., vol. 2, no. December 2023, p. 100046, 2024, doi: 10.1016/j.glmedi.2023.100046.
[15] M. K. Dehury, B. K. Mohanta, and S. Chedup, “Security issues and challenges in deploying a CPS using WSN,” … Secur. Mod. Trends …, 2024, doi: 10.1007/978-981-97-0407-1_2.
[16] J. C. Paiva, J. P. Leal, and Á. Figueira, “Automated assessment in computer science education: A state-of-the-art review,” ACM Trans. Comput. …, 2022, doi: 10.1145/3513140.
[17] M. Hussain, M. Hussain, N. Aamer, and F. Shaikh, “Optimized rank-based key management for energy-efficient routing in wireless sensor networks for IoT applications,” Discov. Internet Things, vol. 5, no. 1, 2025, doi: 10.1007/s43926-025-00224-3.
[18] E. Bicamumakuba, M. N. Reza, H. Jin, Samsuzzaman, K.-H. Lee, and S.-O. Chung, “Multi-Sensor Monitoring, Intelligent Control, and Data Processing for Smart Greenhouse Environment Management,” Sensors, vol. 25, no. 19, p. 6134, 2025, doi: 10.3390/s25196134.
[19] H. Q. Deng, J. Luo, K. C. Chang, Q. B. Li, and ..., “Research on security level evaluation method for cascading trips based on WSN,” Wirel. …, 2021, doi: 10.1155/2021/6649127.
[20] A. Alam and A. Mohanty, “Design, development, and implementation of software engineering virtual laboratory: A boon to computer science and engineering (CSE) education during Covid-19 …,” Proc. third Int. Conf. …, 2023, doi: 10.1007/978-981-19-7874-6_1.
[21] A. Zrelli and T. Ezzedine, “A New Approach of WSN Deployment, K-Coverage and Connectivity in Border Area,” Wirel. Pers. Commun., 2021, doi: 10.1007/s11277-021-08881-7.
[22] Z. Hu, Y. Wang, and M. He, Advances in intelligent systems, computer science and digital economics III. Springer, 2022. doi: 10.1007/978-3-030-97057-4.
[23] D. A. Sokolov, “Autonomous DevOps Framework for Multi - Cloud ERP Systems : AI - Driven Integration of SAP S / 4HANA with Apache Ecosystem and Wireless Sensor Networks,” vol. 7, no. 6, pp. 10917–10923, 2025, doi: 10.15662/IJEETR.2025.0706004.
[24] K. S. Adu-Manu et al., “Combinatorial bat optimization for wsn with hoover index clustering,” Wirel. Pers. …, 2020, doi: 10.1155/2022/1628537.
[25] Y. Zhang, L. Yang, and Y. Tan, “Energy-efficient adaptive routing in heterogeneous wireless sensor networks via hybrid PSO and dynamic clustering,” J. Cloud Comput., vol. 14, no. 1, 2025, doi: 10.1186/s13677-025-00768-3.
[26] S. Chauhan and K. Popat, “The role of IoT and M2M communication in fostering business innovation and driving organizational growth,” Discov. Internet Things, vol. 5, no. 1, 2025, doi: 10.1007/s43926-025-00231-4.
[27] R. Arya, J. Singh, and A. Kumar, “A survey of multidisciplinary domains contributing to affective computing,” Comput. Sci. Rev., 2021, doi: https://doi.org/10.1016/j.cosrev.2021.100399.
[28] A. Rana, S. Prajapat, P. Kumar, and K. Kumar, “Performance evaluation of machine learning models for intrusion detection in wireless sensor networks: a case study using the WSN DS dataset,” Int. Conf. …, 2023, doi: 10.1007/978-981-99-8129-8_15.
[29] G. Bakshi and H. Sahu, “WSN Security: Intrusion Detection Approaches Using Machine Learning,” … Intell. Wirel. Sens. Networks, 2022, doi: 10.1201/9781003102397-9.
[30] I. F. Parreño and D. F. Avila, “Analysis of the cybersecurity in wireless sensor networks (WSN): A review literature,” … Def. Secur. Proc. MICRADS …, 2021, doi: 10.1007/978-981-16-4884-7_8.
[31] S. Maurya, K. S, P. K, P. C. Karthik, and V. G. Saranya, “Hybrid compression-based routing strategies for enhanced energy efficiency in wireless sensor networks,” J. Cloud Comput., vol. 14, no. 1, 2025, doi: 10.1186/s13677-025-00787-0.
[32] C. H. Cao, Y. N. Tang, D. Y. Huang, and ..., “IIBE: An Improved Identity‐Based Encryption Algorithm for WSN Security,” 2021, Wiley Online Library. doi: 10.1155/2021/8527068.
[33] J. Medina-García, J. A. Gómez-Galán, J. M. Vilaplana-Guerrero, and J. A. Bogeat, “Efficient irrigation system using a combined wireless sensor network based on LoRaWAN and IEEE 802.15.4 technologies and photosynthetically active radiation measurements,” Internet Things (The Netherlands), vol. 34, no. October, 2025, doi: 10.1016/j.iot.2025.101801.
[34] D. Chouhan and S. S. Shrivastava, “A Study of Cryptographic Scheme for Safe Data Transfer in Wireless Sensor Network Involving Logic Gate,” vol. 4, pp. 94–104, 2025, doi: https://doi.org/10.70558/IJST.2025.v2.i4.241109.
[35] M. A. Talukder, S. Sharmin, M. A. Uddin, M. M. Islam, and ..., “MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs,” 2024, Springer. doi: 10.1007/s10207-024-00833-z.
[36] M. Liu and F. M’hiri, “Beyond traditional teaching: Large language models as simulated teaching assistants in computer science,” … 55th ACM Tech. Symp. Comput. Sci. …, 2024, doi: 10.1145/3626252.3630789.
[37] N. Raihan, M. L. Siddiq, J. C. S. Santos, and ..., “Large language models in computer science education: A systematic literature review,” … Comput. Sci. …, 2025, doi: 10.1145/3641554.3701863.
[38] C. N. Idika, U. U. James, O. M. Ijiga, and ..., “… with Zero Trust Policy Enforcement in Smart Manufacturing Cyber-Physical System International Journal of Scientific Research in Computer Science,” 2023, researchgate.net. doi: https://doi.org/10.32628/IJSRCSEIT.
[39] V. S. Kornilov and S. V Morozova, “Experimental pedagogical activity when teaching computer science to younger students,” Rudn J. Informatiz. …, 2020, doi: 10.22363/2312-8631-2020-17-1-18-25.
[40] K. Do, R. Y. Pang, J. Jiang, and K. Reinecke, “‘That’s important, but...’: How Computer Science Researchers Anticipate Unintended Consequences of Their Research Innovations,” … Hum. Factors Comput. …, 2023, doi: 10.1145/3544548.3581347.
[41] K. Bajaj, B. Sharma, and R. Singh, “Integration of WSN with IoT applications: a vision, architecture, and future challenges,” Integr. WSN IoT Smart Cities, 2020, doi: 10.1007/978-3-030-38516-3_5.
[42] J. Sun, H. Ma, Y. Zeng, D. Han, and Y. Jin, “Promoting the AI teaching competency of K-12 computer science teachers: A TPACK-based professional development approach,” Educ. Inf. …, 2023, doi: 10.1007/s10639-022-11256-5.
[43] N. Shaheen et al., “Appraising systematic reviews: a comprehensive guide to ensuring validity and reliability,” Front. Res. Metrics Anal., vol. 8, 2023, doi: 10.3389/frma.2023.1268045.
[44] J. Yates and A. C. Plagnol, “Female computer science students: A qualitative exploration of women’s experiences studying computer science at university in the UK,” 2022, Springer. doi: 10.1007/s10639-021-10743-5.
[45] D. Escudero-Mancebo, N. Fernández-Villalobos, Ó. Martín-Llorente, and A. Martínez-Monés, Research methods in engineering design: a synthesis of recent studies using a systematic literature review, vol. 34, no. 2. Springer London, 2023. doi: 10.1007/s00163-022-00406-y.
[46] K. Ávila, P. Sanmartin, D. Jabba, and J. Gómez, “An analytical survey of attack scenario parameters on the techniques of attack mitigation in WSN,” 2022, Springer. doi: 10.1007/s11277-021-09107-6.
[47] A. A. Salatino, T. Thanapalasingam, A. Mannocci, and ..., “The computer science ontology: A comprehensive automatically-generated taxonomy of research areas,” Data …, 2020, doi: https://doi.org/10.1162/dint_a_00055.
[48] A. J. Dhruv, R. Patel, and N. Doshi, “Python: the most advanced programming language for computer science applications,” 2021, scitepress.org. doi: 10.5220/0010307900003051.
[49] I. H. Sarker, “Deep learning: a comprehensive overview on techniques, taxonomy, applications and research directions,” SN Comput. Sci., 2021, doi: 10.1007/s42979-021-00815-1.
[50] A. Purnomo, T. Susanti, E. Rosyidah, N. Firdausi, and ..., “Digital economy research: Thirty-five years insights of retrospective review,” … Comput. Sci., 2022, [Online]. Available: https://www.sciencedirect.com/science/article/pii/S1877050921023437
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2026 Kukuh Dwi Nur Cahyo, Rayyan (Penulis)

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.








