Pengantar Riset Informatika Konsep Dasar Dan Metodologi Penelitian
Kata Kunci:
Penelitian Informatika, Metodologi Penelitian, Penelitian Kualitatif, Penelitian Kuantitatif, Metode Campuran, InformatikaAbstrak
Riset informatika merupakan landasan penting bagi mahasiswa dan peneliti dalam memahami proses ilmiah di bidang teknologi informasi. Artikel ini membahas konsep dasar riset informatika yang meliputi pengertian penelitian, tujuan, serta karakteristik penelitian ilmiah. Selain itu, dijelaskan pula berbagai jenis metodologi penelitian yang umum digunakan, seperti penelitian kualitatif, kuantitatif, dan metode campuran (mixed methods). Penelitian dalam bidang informatika tidak hanya berfokus pada pengembangan perangkat lunak, tetapi juga mencakup analisis data, kecerdasan buatan, sistem informasi, serta interaksi manusia dan komputer. Proses penelitian dijelaskan secara sistematis mulai dari perumusan masalah, studi literatur, penentuan metode, pengumpulan data, hingga analisis dan pelaporan hasil penelitian. Dengan memahami konsep dasar dan metodologi penelitian yang tepat, diharapkan peneliti mampu menghasilkan karya ilmiah yang valid, sistematis, dan dapat memberikan kontribusi nyata terhadap perkembangan ilmu informatika
Unduhan
Referensi
[1] Creswell, J. W. (2018). Research Design: Qualitative, Quantitative, and Mixed Methods Approaches. Sage. doi: 10.4135/9781506335193.
[2] Creswell, J. W. (2014). Educational Research. Pearson.doi: 10.4324/9781315658914
[3] Sugiyono (2019). Metode Penelitian Kuantitatif, Kualitatif, dan R&D. Alfabeta,
[4] Sugiyono (2017). Statistika untuk Penelitian. Alfabeta.
[5] Sekaran, U., & Bougie, R. (2016). Research Methods for Business. Wiley. doi: 10.1002/9781119266846
[6] Kothari, C. R. (2014). Research Methodology: Methods and Techniques. New Age.
[7] Neuman, W. L. (2014). Social Research Methods. Pearson.
[8] Kerlinger, F. N. (2006). Foundations of Behavioral Research. Holt.
[9] S Arikunto, S. (2013). Prosedur Penelitian. Rineka Cipta.
[10] Moleong, L. J. (2017). Metodologi Penelitian Kualitatif. Remaja Rosdakarya.
[11] Laudon, K. C., & Laudon, J. P. (2020). Management Information Systems. Pearson.
doi: 10.1016/C2018-0-02417-5
[12] Stair, R., & Reynolds, G. (2018).Principles of Information Systems. Cengage.
[13] Turban, E. (2015).Information Technology for Management. Wiley.doi: 10.1002/9781118890790
[14] O’Brien, J. A. (2011).Introduction to Information Systems. McGraw-Hill.
[15] Alter, S. (2013). Information Systems: Foundation of E-Business. Pearson.
[16] Pressman, R. S., & Maxim, B. (2020).Software Engineering: A Practitioner's Approach. McGraw-Hill.
[17] Sommerville, I. (2016).Software Engineering. Pearson.
[18] Ian Sommerville (2011). Software Systems Engineering. Addison-Wesley.
[19] Brooks, F. (1995). The Mythical Man-Month. Addison-Wesley.
[20] Boehm, B. (1988). “A Spiral Model of Software Development and Enhancement,” IEEE Computer.
doi: 10.1109/2.59.
[21] Russell, S., & Norvig, P. (2021).Artificial Intelligence: A Modern Approach, 4th ed. Pearson.
[22] Goodfellow, I. (2016).Y. Bengio, and A. Courville, Deep Learning. MIT Press,
doi: 10.7551/mitpress/10243.001.0001
[23] Mitchell, T. (2017). Machine Learning. McGraw-Hill.
[24] Han, J., Kamber, M., & Pei, J. (2012). Data Mining: Concepts and Techniques, 3rd ed. Morgan Kaufmann.
doi: 10.1016/C2009-0-61819-5
[25] Witten, I. H. (2016). E. Frank, M. A. Hall, and C. J. Pal, Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann. doi: 10.1016/C2015-0-01874-7
[26] Tanenbaum, A. S., & Wetherall, D. (2018). Computer Networks, 5th ed. Pearson.
[27] Kurose, J. F. (2017).Computer Networking: A Top-Down Approach, 7th ed. Pearson.
[28] Stallings, W. (2017). Data and Computer Communications, 10th ed. Pearson.
[29] Forouzan, B. A. (2012).Data Communications and Networking, 5th ed. McGraw-Hill.
[30] Comer, D. (2014)., Computer Networks and Internets, 6th ed. Pearson.
[31] Stallings, W. (2017).Cryptography and Network Security: Principles and Practice, 7th ed. Pearson.
[32] Bishop, M. (2018).Computer Security: Art and Science, 2nd ed. Addison-Wesley.
[33] Whitman, M. (2012). Principles of Information Security, 5th ed. Cengage.
[34] Anderson, R. (2020). Security Engineering: A Guide to Building Dependable Distributed Systems,
3rd ed.Wiley. doi: 10.1002/9781119642787
[35] Pfleeger, C. (2015). Security in Computing, 5th ed. Pearson.
[36] Mell, P., & Grance, T. (2011). “The NIST Definition of Cloud Computing,” NIST Special Publication 800- 145, 2011. doi: 10.6028/NIST.SP.800-145
[37] Buyya, R. (2013).Cloud Computing: Principles and Paradigms. Wiley. doi: 10.1002/9780470940105
[38] Gubbi, J. (2013). “Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions,” Future Generation Computer Systems. doi: 10.1016/j.future.2013.01.010
[39] Atzori, L. (2017). “The Internet of Things: A Survey,” Computer Networks, 2010.
doi: 10.1016/j.comnet.2010.05.010
[40] Marz, N. (2015).Big Data: Principles and Best Practices of Scalable Real-Time Data Systems.
Manning, 2015.
[41] A. Field, Field, A. (2013).Discovering Statistics Using IBM SPSS Statistics, 4th ed. Sage.
[42] Montgomery, D. (2012).Introduction to Statistical Quality Control, 7th ed. Wiley. doi: 10.1002/9781118146811
[43] Hair, J. (2014).Multivariate Data Analysis, 7th ed. Pearson.
[44] Walpole, R. (2012). Probability and Statistics for Engineers and Scientists, 9th ed. Pearson.
[45] Triola, M. (2018).Elementary Statistics, 13th ed. Pearson.
[46] Denning, P. J. (2003).“Great Principles of Computing,” Communications of the ACM. doi: 10.1145/948383.948400
[47] Brookshear, J. G. (2015).Computer Science: An Overview, 12th ed. Pearson.
[48] Suyanto. (2017). Artificial Intelligence. Informatika.
[49] Jogiyanto. (2017).Sistem Informasi Keperilakuan.
[50] Indrajani. (2015). Database Design. Elex Media Komputindo.
Diterbitkan
Terbitan
Bagian
Lisensi
Hak Cipta (c) 2026 nur beilqis anastasya, alfiyatus zahroh (Penulis)

Artikel ini berlisensi Creative Commons Attribution 4.0 International License.








