SYSTEMATIC LITERATURE REVIEW: METODOLOGI, TEKNOLOGI KEAMANAN, DAN BIDANG IMPLEMENTASI DALAM PENGEMBANGAN SISTEM INFORMASI BERBASIS WEB
DOI:
https://doi.org/10.23969/jp.v10i4.33374Keywords:
security methodology, web information systems, systematic literature reviewAbstract
Web-based information systems are rapidly expanding across sectors, yet development methodologies and security practices remain inconsistent. This study aims to map trends in methodologies, security technologies, and implementation domains through a Systematic Literature Review (SLR). The review followed five stages: defining criteria, selecting sources, screening literature, collecting, and classifying data. Analysis of selected articles from 2021–2025 shows that the most common methodologies are Research and Development (R&D), Waterfall, and Rapid Application Development (RAD), while the adoption of Agile remains limited. In terms of security, most studies emphasize authentication and authorization, some apply encryption and data protection, and very few address web application security aligned with international standards. Regarding implementation, studies are concentrated in education, public service, and e-commerce, while finance and healthcare remain underexplored. These findings highlight research gaps in methodology adoption, security practices, and domain coverage, indicating the need for future studies to integrate modern approaches, apply international standards, and focus on critical sectors.
Downloads
References
Alshamrani, A., & Bahattab, A. (2019). A comparison between three SDLC models: Waterfall model, Spiral model, and Incremental/Agile model. International Journal of Computer Science Issues, 106–111.
Foundation., O. (2021). OWASP Top 10: The ten most critical web application security risks.
ISO/IEC. (2018). Systems and software engineering — Systems and software Quality Requirements and Evaluation (SQuaRE). Geneva: International Organization for Standardization.
McKenzie, J. E., Bossuyt, P. M., Boutron, I., Hoffmann, T. C., M. (2021). The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. https://doi.org/https://doi.org/10.1136/bmj.n71
Mittal, S., & Bansal, R. (2023). Web application security: An analysis of vulnerabilities and mitigation techniques. Journal of Information Security and Applications.
Pressman, R. S., & Maxim, B. R. (2020). Software engineering: A practitioner’s approach (9th ed.). New York: McGraw-Hill.
Sommerville, I. (2019). Software engineering (10th ed.). Boston: Pearson.
Widayat, W., Assiroj, P., Sohirin, Prabadhi, I. A., & Kautsar, P. A. (2024). Data mining implementation: a survey. Indonesian Journal of Electrical Engineering and Computer Science, 36(3), 1960–1968. https://doi.org/10.11591/ijeecs.v36.i3.pp1960-1968
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Pendas : Jurnal Ilmiah Pendidikan Dasar

This work is licensed under a Creative Commons Attribution 4.0 International License.
















