Pemanfaatan Teknologi Informasi dalam Kegiatan Belajar Mahasiswa: Studi Literatur Sistematis
Kata Kunci:
teknologi informasi, pembelajaran mahasiswa, studi literatur sistematis, efisiensi belajar, Technology Acceptance ModelAbstrak
Pemanfaatan teknologi informasi (TI) dalam kegiatan belajar mahasiswa telah menjadi keniscayaan di era transformasi digital. Penelitian ini bertujuan untuk mengidentifikasi, mengevaluasi, dan mensintesis bukti-bukti ilmiah mengenai pola pemanfaatan TI oleh mahasiswa, faktor-faktor yang memengaruhinya, kontribusinya terhadap efisiensi dan motivasi belajar, serta tantangan yang dihadapi. Metode yang digunakan adalah systematic literature review (SLR) mengacu pada protokol PRISMA. Pencarian literatur dilakukan pada basis data Google Scholar, SINTA, Scopus, dan ERIC untuk periode 2019–2026, dengan kata kunci terstruktur. Dari 312 artikel yang teridentifikasi, 50 artikel memenuhi kriteria inklusi. Hasil sintesis menunjukkan bahwa mahasiswa menggunakan delapan kategori utama TI, dengan Learning Management System (LMS) sebagai yang paling dominan (92% literatur). Faktor kebiasaan (habit) merupakan prediktor terkuat penerimaan TI (koefisien 0,72), diikuti oleh persepsi kemanfaatan dan efikasi diri komputer. Pemanfaatan TI berkontribusi pada peningkatan kecepatan akses referensi (68%), pengurangan waktu penyelesaian tugas (45%), peningkatan keaktifan diskusi (42%), dan peningkatan hasil belajar (15% rata-rata nilai). Tantangan utama meliputi keterbatasan infrastruktur (78% keluhan), distraksi digital (74%), dan kesenjangan literasi digital (58%). Studi ini menyimpulkan bahwa pemanfaatan TI secara signifikan meningkatkan efisiensi dan motivasi belajar mahasiswa, namun diperlukan pendekatan holistik untuk mengatasi tantangan struktural dan individual.
Unduhan
Referensi
[1] S. Lu, J. Lu, K. An, X. Wang, and Q. He, “Edge Computing on IoT for Machine Signal Processing and Fault Diagnosis: A Review,” IEEE Internet Things J., vol. 10, no. 13, pp. 11093–11116, Jul. 2023, doi: 10.1109/JIOT.2023.3239944.
[2] M. Akçayır and G. Akçayır, “Advantages and challenges associated with augmented reality for education: A systematic review of the literature,” Educ. Res. Rev., vol. 20, pp. 1–11, Feb. 2017, doi: 10.1016/j.edurev.2016.11.002.
[3] D. A. Almajali, R. Masa’deh, and A. Tarhini, “Antecedents of ERP systems implementation success: a study on Jordanian healthcare sector,” Journal of Enterprise Information Management, vol. 29, no. 4, pp. 549–565, Jul. 2016, doi: 10.1108/JEIM-03-2015-0024.
[4] J. Radianti, T. A. Majchrzak, J. Fromm, and I. Wohlgenannt, “A systematic review of immersive virtual reality applications for higher education: Design elements, lessons learned, and research agenda,” Comput. Educ., vol. 147, p. 103778, Apr. 2020, doi: 10.1016/j.compedu.2019.103778.
[5] L. Chen, P. Chen, and Z. Lin, “Artificial Intelligence in Education: A Review,” IEEE Access, vol. 8, pp. 75264–75278, 2020, doi: 10.1109/ACCESS.2020.2988510.
[6] O. Zawacki-Richter, V. I. Marín, M. Bond, and F. Gouverneur, “Systematic review of research on artificial intelligence applications in higher education – where are the educators?,” International Journal of Educational Technology in Higher Education, vol. 16, no. 1, p. 39, Dec. 2019, doi: 10.1186/s41239-019-0171-0.
[7] M. Blikstad-Balas and K. Klette, “Still a long way to go,” Nordic Journal of Digital Literacy, vol. 15, no. 1, pp. 55–68, Apr. 2020, doi: 10.18261/issn.1891-943x-2020-01-05.
[8] M. Bower, “Technology‐mediated learning theory,” British Journal of Educational Technology, vol. 50, no. 3, pp. 1035–1048, May 2019, doi: 10.1111/bjet.12771.
[9] M. A. Mirza, K. Khurshid, K. Sohail, S. Biland, and A. A. Mirza, “Validation of ILS through Exploratory Factor Analysis and Internal Consistency Reliability for Secondary Grade,” International Journal of Information and Education Technology, vol. 11, no. 4, pp. 189–193, 2021, doi: 10.18178/ijiet.2021.11.4.1510.
[10] P. A. Tess, “The role of social media in higher education classes (real and virtual) – A literature review,” Comput. Human Behav., vol. 29, no. 5, pp. A60–A68, Sep. 2013, doi: 10.1016/j.chb.2012.12.032.
[11] L. de-Marcos, E. Garcia-Lopez, and A. Garcia-Cabot, “On the effectiveness of game-like and social approaches in learning: Comparing educational gaming, gamification & social networking,” Comput. Educ., vol. 95, pp. 99–113, Apr. 2016, doi: 10.1016/j.compedu.2015.12.008.
[12] A. E. E. Sobaih, M. A. Moustafa, P. Ghandforoush, and M. Khan, “To use or not to use? Social media in higher education in developing countries,” Comput. Human Behav., vol. 58, pp. 296–305, May 2016, doi: 10.1016/j.chb.2016.01.002.
[13] F. P. E. Putra, U. Ubaidi, A. Hamzah, and ..., “Systematic literature review: Security gap detection on websites using OWASP ZAP,” Brilliance: Research …, 2024, [Online]. Available: https://itscience-indexing.com/jurnal/index.php/brilliance/article/view/4227
[14] A. Sun and X. Chen, “Online Education and Its Effective Practice: A Research Review,” Journal of Information Technology Education: Research, vol. 15, pp. 157–190, 2016, doi: 10.28945/3502.
[15] F. P. E. Putra, U. Ubaidi, R. N. Saputra, and ..., “Application of Internet of Things technology in monitoring water quality in fishponds,” Brilliance: Research …, 2024, [Online]. Available: https://itscience-indexing.com/jurnal/index.php/brilliance/article/view/4231
[16] E. R. Kahu, “Framing student engagement in higher education,” Studies in Higher Education, vol. 38, no. 5, pp. 758–773, Jun. 2013, doi: 10.1080/03075079.2011.598505.
[17] P. Bawa, “Retention in Online Courses,” Sage Open, vol. 6, no. 1, Jan. 2016, doi: 10.1177/2158244015621777.
[18] X. Zhu and J. Liu, “Education in and After Covid-19: Immediate Responses and Long-Term Visions,” Postdigital Science and Education, vol. 2, no. 3, pp. 695–699, Oct. 2020, doi: 10.1007/s42438-020-00126-3.
[19] A. Muhyidin, M. A. F. Setiawan, and Nurkhamid, “Developing UNYSA Chatbot as Information Services about Yogyakarta State University,” J. Phys. Conf. Ser., vol. 1737, no. 1, p. 012038, Jan. 2021, doi: 10.1088/1742-6596/1737/1/012038.
[20] N. A. Al-Madi, K. A. Maria, M. A. Al-Madi, M. A. Alia, and E. A. Maria, “An Intelligent Arabic Chatbot System Proposed Framework,” in 2021 International Conference on Information Technology (ICIT), IEEE, Jul. 2021, pp. 592–597. doi: 10.1109/ICIT52682.2021.9491699.
[21] E. Nurdin, A. Ma’aruf, Z. Amir, R. Risnawati, N. Noviarni, and M. P. Azmi, “Pemanfaatan video pembelajaran berbasis Geogebra untuk meningkatkan kemampuan pemahaman konsep matematis siswa SMK,” Jurnal Riset Pendidikan Matematika, vol. 6, no. 1, pp. 87–98, May 2019, doi: 10.21831/jrpm.v6i1.18421.
[22] C. Sulistyowati and N. Asriati, “PEMANFAATAN TEKNOLOGI UNTUK MENINGKATKAN EFEKTIVITAS PEMBELAJARAN DAN KETERLIBATAN BELAJAR DI ERA DIGITAL,” Jurnal Ilmiah Pendidikan Citra Bakti, vol. 11, no. 4, pp. 1176–1188, Nov. 2024, doi: 10.38048/jipcb.v11i4.4542.
[23] J. Nainggolan, D. H. Tarigan, M. P. W. Habayahan, N. W. Manalu, and J. Tamba, “Peningkatan Literasi Siswa Melalui Pemanfaatan Teknologi Dalam Pembelajaran Untuk Meningkatkan Minat Belajar di Era Digital,” Journal Of Human And Education (JAHE), vol. 5, no. 2, pp. 243–249, Mar. 2025, doi: 10.31004/jh.v5i2.2390.
[24] A. Haleem, M. Javaid, M. A. Qadri, and R. Suman, “Understanding the role of digital technologies in education: A review,” Sustainable Operations and Computers, vol. 3, pp. 275–285, 2022, doi: 10.1016/j.susoc.2022.05.004.
[25] M. Bond, K. Buntins, S. Bedenlier, O. Zawacki-Richter, and M. Kerres, “Mapping research in student engagement and educational technology in higher education: a systematic evidence map,” International Journal of Educational Technology in Higher Education, vol. 17, no. 1, p. 2, Dec. 2020, doi: 10.1186/s41239-019-0176-8.
[26] N. H. Sutanto, E. Utami, and R. Rismayani, “Systematic Literature Review untuk Identifikasi Metode Evaluasi Website Layanan Pendidikan di Indonesia,” Jurnal Ilmiah IT CIDA, vol. 7, no. 1, Dec. 2021, doi: 10.55635/jic.v7i1.133.
[27] F. P. E. Putra, A. Zulfikri, G. Arifin, and ..., “Analysis of phishing attack trends, impacts and prevention methods: literature study,” … : Research of Artificial …, 2024, [Online]. Available: https://itscience-indexing.com/jurnal/index.php/brilliance/article/view/4357
[28] F. P. E. Putra, U. Ubaidi, D. Mayangsari, and N. Hasanah, “Netvista Public Wireless Network Quality Analysis Using Quality Of Service Parameters,” Brilliance: Research of Artificial Intelligence, vol. 4, no. 1, pp. 443–452, Aug. 2024, doi: 10.47709/brilliance.v4i1.4388.
[29] V. Nkemeni, F. Mieyeville, and P. Tsafack, “Energy Consumption Reduction in Wireless Sensor Network-Based Water Pipeline Monitoring Systems via Energy Conservation Techniques,” Future Internet, vol. 15, no. 12, p. 402, Dec. 2023, doi: 10.3390/fi15120402.
[30] M. J. Grant and A. Booth, “A typology of reviews: an analysis of 14 review types and associated methodologies,” Health Info. Libr. J., vol. 26, no. 2, pp. 91–108, Jun. 2009, doi: 10.1111/j.1471-1842.2009.00848.x.
[31] A. Bandura, “Self-efficacy: Toward a unifying theory of behavioral change.,” Psychol. Rev., vol. 84, no. 2, pp. 191–215, 1977, doi: 10.1037/0033-295X.84.2.191.
[32] V. Venkatesh, J. Y. L. Thong, and X. Xu, “Consumer Acceptance and Use of Information Technology: Extending the Unified Theory of Acceptance and Use of Technology1,” MIS Quarterly, vol. 36, no. 1, pp. 157–178, Mar. 2012, doi: 10.2307/41410412.
[33] V. Venkatesh, M. G. Morris, G. B. Davis, and F. D. Davis, “User Acceptance of Information Technology: Toward A Unified View1,” MIS Quarterly, vol. 27, no. 3, pp. 425–478, Sep. 2003, doi: 10.2307/30036540.
[34] M. A. Almaiah, M. M. Alamri, and W. Al-Rahmi, “Applying the UTAUT Model to Explain the Students’ Acceptance of Mobile Learning System in Higher Education,” IEEE Access, vol. 7, pp. 174673–174686, 2019, doi: 10.1109/ACCESS.2019.2957206.
[35] F. D. Davis, “Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology,” MIS Quarterly, vol. 13, no. 3, pp. 319–340, Sep. 1989, doi: 10.2307/249008.
[36] F. P. Eka Putra, I. N. Sudana Degeng, S. Ulfa, and W. Kamdi, “The Evolution of Quality Education: Impacts and Challenges of Using Open Educational Resources (OER) and Open Educational Practices (OEP) in the Conceive - Design - Implement - Operate (CDIO) Framework,” TEM Journal, pp. 386–395, Feb. 2024, doi: 10.18421/TEM131-40.
[37] T. S. Tagare and R. Narendra, “Design and implementation of duty cycle-based futuristic clustering technique in WSN,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 34, no. 2, p. 951, May 2024, doi: 10.11591/ijeecs.v34.i2.pp951-959.
[38] D. R. Garrison and H. Kanuka, “Blended learning: Uncovering its transformative potential in higher education,” Internet High. Educ., vol. 7, no. 2, pp. 95–105, Apr. 2004, doi: 10.1016/j.iheduc.2004.02.001.
[39] F. P. E. Putra, K. Mufidah, R. M. Ilhamsyah, and ..., “Tinjauan performa RouterOS Mikrotik dalam jaringan internet: Analisis kinerja dan kelayakan,” Digital …, 2023, [Online]. Available: https://itscience-indexing.com/jurnal/index.php/digitech/article/view/3446
[40] F. P. E. Putra, R. M. Ilhamsyah, and ..., “Implementation And Evaluation Of Zerotier-Based Virtual Network For Device Connectivity,” Brilliance: Research of …, 2025, [Online]. Available: https://itscience-indexing.com/jurnal/index.php/brilliance/article/view/5966
[41] S. L. Doyle Fosco, “Educational leader wellbeing: A systematic review,” Educ. Res. Rev., vol. 37, p. 100487, Nov. 2022, doi: 10.1016/j.edurev.2022.100487.
[42] M. Albeladi, K. Jambi, F. E. Eassa, and M. Khemakhem, “Optimizing Energy Efficiency and Increasing Scalability in 6G-IoT Networks Through SDN, Duty Cycling, and AI-Driven Slicing,” International Journal of Advanced Computer Science and Applications, vol. 16, no. 9, 2025, doi: 10.14569/IJACSA.2025.0160988.
[43] O. Khalifa et al., “Energy-Efficient Aerial Data Aggregation for IoT: From Prototyping to Large-Scale Implementation,” IEEE Trans. Instrum. Meas., vol. 74, pp. 1–18, 2025, doi: 10.1109/TIM.2024.3497061.
[44] F. P. E. Putra, U. Ubaidi, R. O. F. Kusuma, and ..., “Effect Of Distance On Wi-Fi Signal Quality In The Home Environment,” Brilliance: Research …, 2024, [Online]. Available: https://itscience-indexing.com/jurnal/index.php/brilliance/article/view/4319
[45] S. Arisdakessian, O. A. Wahab, A. Mourad, H. Otrok, and M. Guizani, “A Survey on IoT Intrusion Detection: Federated Learning, Game Theory, Social Psychology, and Explainable AI as Future Directions,” IEEE Internet Things J., vol. 10, no. 5, pp. 4059–4092, Mar. 2023, doi: 10.1109/JIOT.2022.3203249.
[46] F. P. E. Putra, M. Riski, M. S. Yahya, and ..., “Mengenal Teknologi Jaringan Nirkabel Terbaru Teknologi 5G,” Jurnal Sistim Informasi …, 2023, [Online]. Available: http://www.jsisfotek.org/index.php/JSisfotek/article/view/233
[47] B. Rana, Y. Singh, P. Kumar Singh, and W.-C. Hong, “A Priority Based Energy-Efficient Metaheuristic Routing Approach for Smart Healthcare System (SHS),” IEEE Access, vol. 12, pp. 85694–85708, 2024, doi: 10.1109/ACCESS.2024.3411564.
[48] F. P. E. Putra, M. Irfan, M. Aziz, and ..., “Wireless Network Design at Pamekasan Regency Public Library,” Brilliance: Research of …, 2025, [Online]. Available: https://itscience-indexing.com/jurnal/index.php/brilliance/article/view/5876
[49] S. Pawar, “IoT Solutions in Agriculture: Enhancing Efficiency and Productivity,” International Journal of Innovative Science and Research Technology (IJISRT), pp. 3388–3390, Jun. 2024, doi: 10.38124/ijisrt/IJISRT24MAY2442.
[50] F. P. E. Putra, M. Dafid, and I. Syafi’i, “Firewall Implementation as a Computer Network Security Strategy for Data Protection,” Brilliance: Research of Artificial …, 2025, [Online]. Available: https://itscience-indexing.com/jurnal/index.php/brilliance/article/view/6162
[51] F. P. E. Putra, A. Hamzah, W. Agel, and ..., “Impelementasi Sistem Keamanan Jaringan Mikrotik Menggunakan Firewall Filtering dan Port Knocking,” Jurnal Sistim Informasi …, 2023, [Online]. Available: https://ipv6.jsisfotek.org/index.php/JSisfotek/article/view/329
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2026 Alvin Hidayat Putra (Penulis)

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.








