Defense Information Systems Architecture for Cyber Threats: A Systematic Review of the Research Literature
DOI:
10.29303/jppipa.v11i10.12905Published:
2025-10-25Downloads
Abstract
Cyber threats have become a serious challenge to national defense. Although Indonesia has a high cybersecurity index, a series of significant incidents against government institutions indicate urgent vulnerabilities that need to be addressed through a more resilient defense architecture. This study conducted a systematic literature review (SLR) to identify the results and practices of implementing the TOGAF, DoDAF, and COBIT (TDC) frameworks in the cyber defense domain. The results indicate that the literature is dominated by qualitative studies (53%) and COBIT framework implementations (73%), especially in government agencies (67%). The analysis yielded four main themes: improved governance and compliance, optimized risk management, strengthened security posture, and architectural and operational efficiency. The literature's focus on the first two themes signals a strategic shift from technical solutions to a governance- and risk-based approach. The study concludes that an effective approach to modern cyber defense is through integrating the specific strengths of each framework: COBIT for governance, DoDAF for operations, and TOGAF for architecture.
Keywords:
Cyber risk, Cyber security, Cyber threats, Security architecture, Security resilienceReferences
A’yuni, A. Q., Muhammad, A. H., & Nasiri, A. (2023). Literature Review Audit Tata Kelola Teknologi Informasi Menggunakan Kerangka Kerja COBIT 2019. Jurnal Informa : Jurnal Penelitian Dan Pengabdian Masyarakat, 9(1), 47–52. https://doi.org/10.46808/INFORMA.V9I1.247
Aghamohammadpour, A., Mahdipour, E., & Attarzadeh, I. (2023). Architecting threat hunting system based on the DODAF framework. Journal of Supercomputing, 79(4), 4215–4242. https://doi.org/10.1007/s11227-022-04808-6
Aji, M. P., & Artikel, R. (2023). Sistem Keamanan Siber dan Kedaulatan Data di Indonesia dalam Perspektif Ekonomi Politik (Studi Kasus Perlindungan Data Pribadi) [Cyber Security System and Data Sovereignty in Indonesia in Political Economic Perspective]. Jurnal Politica Dinamika Masalah Politik Dalam Negeri Dan Hubungan Internasional, 13(2), 222–238. https://doi.org/10.22212/JP.V13I2.3299
Al Baihaqy, A. H., Yuwana, M. A. S. A., Surya, A. P. A., & Fauzi, M. A. N. (2024). Analisa Dampak Kebocoran Data Pusat Data Nasional (PDN) 2024 dalam Perspektif HAM. Wicarana, 4(1), 31–37. https://doi.org/10.57123/WICARANA.V3I1.167
Ali, T., Al-Khalidi, M., & Al-Zaidi, R. (2024). Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review. Journal of Computer Information Systems, 00(00), 1–28. https://doi.org/10.1080/08874417.2024.2329985
Arimurti, N. A., Nurtrisha, W. A., & Falahah, F. (2024). Penilaian Kapabilitas Tata Kelola Teknologi Informasi Menggunakan Kerangka Kerja Cobit 2019 dengan Fokus Domain APO pada RSPAU Dr. Suhardi Hardjolukito. Jurnal Teknologi Dan Manajemen Informatika, 10(1), 13–23. https://doi.org/10.26905/JTMI.V10I1.10939
Ariyadi, T., & Rizky Pohan, M. (2023). Implementation of Penetration Testing Tools to Test Wi-Fi Security Levels at the Directorate of Innovation and Business Incubators. Jurnal Penelitian Pendidikan IPA, 9(12), 10768–10775. https://doi.org/10.29303/JPPIPA.V9I12.5551
Balafif, S. (2023). Penyesuaian Model Ketahanan Siber UMKM di Indonesia Dengan NIST Cybersecurity Framework. Jurnal Informatika: Jurnal Pengembangan IT, 8(3), 291–301. https://doi.org/10.30591/JPIT.V8I3.5662
Bardin, J. S. (2024). Cyber Warfare. In Computer and Information Security Handbook (4th ed., Vol. 2, pp. 1345–1380). Morgan Kaufmann. https://doi.org/10.1016/B978-0-443-13223-0.00087-4
Barkat Ullah, A., Ma, W., Ahmed, M., Rashid, B., Saeed, M. A., Arshad, O., & Raghav, U. (2024). A comprehensive review of cyber security and current practices in global mining critical infrastructure. Journal of Cyber Security Technology, 00(00), 1–27. https://doi.org/10.1080/23742917.2025.2475563
Bernika, H., & I Kadek, D. N. (2021). Perancangan Tata Kelola Teknologi Informasi Menggunakan Kerangka Kerja COBIT 2019 (Studi Kasus: LPP RRI Madiun). Journal of Emerging Information Systems and Business Intelligence, 2(3), 63–70. https://doi.org/10.26740/JEISBI.V2I3.41630
Bhatia, K., Pandey, S. K., & Singh, V. K. (2023). Enterprise Architecture Frameworks for Security Establishment. 2023 International Conference on Artificial Intelligence and Smart Communication, AISC 2023, 11–17. https://doi.org/10.1109/AISC56616.2023.10085439
Braun, V., & Clarke, V. (2023). Toward good practice in thematic analysis: Avoiding common problems and be(com)ing a knowing researcher. International Journal of Transgender Health, 24(1), 1–6. https://doi.org/10.1080/26895269.2022.2129597
Busch, N. R., & Zalewski, A. (2024). A Systematic Literature Review of Enterprise Architecture Evaluation Methods. ACM Computing Surveys, 57(5). https://doi.org/10.1145/3706582
Carolina, A., & Bandeira, R. (2023). Towards A Sectoral Enterprise Architecture Framework Seaf (Issue July). University of Coimbra.
Costa, J. C., Roxo, T., Proença, H., & Morais Inácio, P. R. (2024). How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses. IEEE Access, 12, 61113–61136. https://doi.org/10.1109/ACCESS.2024.3395118
de Oliveira, K. V., Fernandes, E. C., & Borsato, M. (2021). A TOGAF-based Framework for the Development of Sustainable Product-Service Systems. Procedia Manufacturing, 55(C), 274–281. https://doi.org/10.1016/J.PROMFG.2021.10.039
Dehesh, P. (2024). Scientific writing in a systematic review and Meta-Analyses. In Systematic Review and Meta-Analysis: Stepwise Approach for Medical and Biomedical Researchers (pp. 195–208). Academic Press. https://doi.org/10.1016/B978-0-443-13428-9.00017-3
Douzet, F., & Gery, A. (2021). Cyberspace is used, first and foremost, to wage wars: proliferation, security and stability in cyberspace. Journal of Cyber Policy, 6(1), 96–113. https://doi.org/10.1080/23738871.2021.1937253
Dwi Shandika, M. (2024). Peran Arsitektur Data dalam Meningkatkan Efektivitas Tata Kelola Data di Era Transformasi Digital. Jurnal Ilmiah Research Student, 2(2), 191–195. https://doi.org/10.61722/JIRS.V2I2.5441
Elysia, C., Dethan, T., Clairine, J., Lolong, N., Wandi, S. A., & Kusmana, T. P. (2024). Perencanaan Metode TOGAF dalam Digitalisasi Pasar Swayalan melalui Integrasi Enterprise Architecture. Jurnal Komputer, Informasi Dan Teknologi, 5(1), 15–15. https://doi.org/10.53697/JKOMITEK.V5I1.2573
Fadya, M., & Utama, D. N. (2024). Towards Secure Information Systems: Developing and Implementing an Information Security Evaluation Model Using NIST CSF and COBIT 2019. TEM Journal, 14(1), 182–191. https://doi.org/10.18421/TEM141-17
Farhaoui, Y., Allaoui, A. El, Amounas, F., Mohammed, F., Ziani, S., Taherdoost, H., Triantafyllou, S. A., & Bhushan, B. (2024). A Multi-layered Protection System for Enhancing Data Security in Cloud Computing Environments. Lecture Notes in Networks and Systems, 1353 LNNS, 559–568. https://doi.org/10.1007/978-3-031-88304-0_77
Fatin, A., Muhaimin Putri, F., Fadlilah, I. N., Hanim, A. L., Faradilla, R. G., Dwiyantie, D. O., Zahroh, A., & Safitri, M. (2024). Audit Sistem Informasi Menggunakan COBIT 5 Domain DSS001 dan DSS005 (Studi Kasus Perpustakaan Upn Veteran Jawa Timur). Jurnal Informatika Dan Teknik Elektro Terapan, 13(1), 2830–7062. https://doi.org/10.23960/JITET.V13I1.5886
Firnaldo, F., Sholihah, U., & Yunita, S. (2023). Perancangan Enterprise Architecture Pada PT. Trisatya Cipta Hutama Menggunakan TOGAF. JIPI (Jurnal Ilmiah Penelitian Dan Pembelajaran Informatika), 8(3), 959–970. https://doi.org/10.29100/JIPI.V8I3.3998
Garrett, R. K., Anderson, S., Baron, N. T., & Moreland, J. D. (2011). Managing the interstitials, a System of Systems framework suited for the Ballistic Missile Defense System. Systems Engineering, 14(1), 87–109. https://doi.org/10.1002/SYS.20173
Gaudêncio, B., Ferraz, J., Martins, P., Váz, P., Silva, J., Abbasi, M., & Cardoso, F. (2024). A Comparison of DoDAF, TOGAF, and FEAF: Architectural Frameworks for Effective Systems Design. International Conference on Disruptive Technologies, Tech Ethics and Artificial Intelligence, 363–371. https://doi.org/10.1007/978-3-031-66635-3_31
Ghalib, Y. W., Gilang, E. F., Zumi M, Abdhe F, Nanda A, Serly D A, & Zurkiyah A. (2024). Analisis Perkembangan Keamanan Siber Dampak Dari Kebocoran Data Pusat Data Nasional Sementara 2 Surabaya. JISCO : Journal of Information System and Computing, 2(1), 27–41. https://doi.org/10.30631/JISCO.V2I1.100
Ghozie Afiansyah, H., Annisa, N., & Febriyani, K. (2023). Penyusunan Kebijakan Pengamanan dan Pengelolaan Infrastruktur Operasi Keamanan Siber Menggunakan NIST CSF 2.0 dan ISO/IEC 27001:2022. Info Kripto, 17(3). https://doi.org/10.56706/IK.V17I3.81
Hadiati, S., & Pramuda, A. (2024). Concept Attaiment Model Based on Traditional Technology Organizers for Strengthening Global Science Literacy and Creative Character. Jurnal Penelitian Pendidikan IPA, 10(6), 2927–2934. https://doi.org/10.29303/JPPIPA.V10I6.7270
Hambali, H. (2021). Penerapan Domain Monitor and Evaluate Framework COBIT 4.1 Dalam Pelaksanaan Audit Sistem Informasi. Journal of Science and Social Research, 4(2), 205–211. https://doi.org/10.54314/JSSR.V4I2.608
Hidayat, R. S., Indrajit, R. E., & Dazki, E.. (2024). TOGAF’s Approach in Developing an Enterprise Architecture for the Information Technology Security Industry. Journal La Multiapp, 5(5), 630–645. https://doi.org/10.37899/journallamultiapp.v5i5.1524
Hilmi, M. A. Al, Puspaningrum, A., Darsih, Siahaan, D. O., Samosir, H. S., & Rahma, A. S. (2023). Research Trends, Detection Methods, Practices, and Challenges in Code Smell: SLR. IEEE Access, 11, 129536–129551. https://doi.org/10.1109/ACCESS.2023.3334258
Hutagalung, N. M., Sudianto, Y., Kusumawati, A., & Fajria, A. (2024). Designing an Information System Architecture for the East Java Community Eye Hospital Pharmacy using TOGAF ADM 9.2 Approach. Sistemasi, 14(1), 406–420. https://doi.org/10.32520/STMSI.V14I1.4932
International Telecommunication Union. (2024). Global Cybersecurity Index 2024 (5th Editio). International Telecommunication Union. Retrieved from https://www.itu.int/en/ITU-D/Cybersecurity/Documents/GCIv5/2401416_1b_Global-Cybersecurity-Index-E.pdf
Isdiyanto, B. R. (2024). Analisis Sistem Pertahanan Udara Indonesia dalam Menghadapi Ancaman Keamanan Indo Pasifik Tahun 2022 – 2024. Diplomacy and Global Security Journal : Jurnal Mahasiswa Magister Hubungan Internasional, 2(2), 1065–1071. https://doi.org/10.36859/DGSJ.V2I2.4576
Jardim, R., dos Santos, M., Neto, E., Muradas, F. M., Santiago, B., & Moreira, M. (2022). Design of a framework of military defense system for governance of geoinformation. Procedia Computer Science, 199, 174–181. https://doi.org/10.1016/J.PROCS.2022.01.022
Juliana, J., Alamsyah, A., & Halim, S. (2024). Analysis of Electronic Medical Records Data Security: Case Study in Citra Husada Sigli Hospital. Jurnal Penelitian Pendidikan IPA, 11(6), 773–782. https://doi.org/10.29303/JPPIPA.V11I6.11081
Julianto, A. S., Hikmah, I. R., & Yasa, R. N. (2024). Cyber-Risk Management Menggunakan NIST Cyber Security Framework (CSF) dan Cobit 2019 pada Instansi XYZ. Info Kripto, 18(2), 41–47. https://doi.org/10.56706/IK.V18I2.99
Juma, A. H., Arman, A. A., & Hidayat, F. (2023). Cybersecurity Assessment Framework: A Systematic Review. 10th International Conference on ICT for Smart Society, ICISS 2023 - Proceeding. https://doi.org/10.1109/ICISS59129.2023.10291832
Kartika, A. D., & Yolanda, D. (2024). Pengembangan Arsitektur Bisnis Berbasis TOGAF untuk Penjaminan Mutu Proses Pembelajaran di Perguruan Tinggi (Studi Kasus Fakultas Teknologi Informasi, Universitas Andalas). Didaktika: Jurnal Kependidikan, 14(2), 2131–2148. https://doi.org/10.58230/27454312.1970
Katsantonis, M. N., Manikas, A., Mavridis, I., & Gritzalis, D. (2023). Cyber range design framework for cyber security education and training. International Journal of Information Security, 22(4), 1005–1027. https://doi.org/10.1007/S10207-023-00680-4/TABLES/1
Khusumawati, T. (2024). Pendekatan Geopolitik Terhadap Kekuatan Strategis Keamanan Nasional Indonesia dalam Menyikapi Rivalitas AS–China di Asia Tenggara: Penelitian. Jurnal Pengabdian Masyarakat Dan Riset Pendidikan, 4(1), 3357–3362. https://doi.org/10.31004/JERKIN.V4I1.2130
Konnon, M. A., Lodonou, N., Gaffan, R. H., & Ezin, E. (2023). An Extended Layered Information Security Architecture (ELISA) for e-Government in Developing Countries. International Journal of Engineering Trends and Technology, 71(1), 109–123. https://doi.org/10.14445/22315381/IJETT-V71I1P210
Kshetri, N. (2005). Information and communications technologies, strategic asymmetry and national security. Journal of International Management, 11(4), 563–580. https://doi.org/10.1016/J.INTMAN.2005.09.010
Kusnadi, S. A. (2021). Perlindungan Hukum Data Pribadi Sebagai Hak Privasi. AL WASATH Jurnal Ilmu Hukum, 2(1), 9–16. https://doi.org/10.47776/ALWASATH.V2I1.127
Lee, J. Y., Syn, S. Y., & Kim, S. (2024). Global research trends in research data management: A bibliometrics approach. Journal of Librarianship and Information Science, 57(3), 719–732. https://doi.org/10.1177/09610006241239083;page:string:article/chapter
Lestari, M., Puspita, M. E., Wijaya, A. F., & Vicky. (2024). Model Tata Kelola TI Terintegrasi untuk Keamanan Informasi di Sektor Fintech. Jurnal Teknologi Dan Manajemen Industri Terapan, 4(3), 766–776. https://doi.org/10.55826/JTMIT.V4I3.943
Li, W., Wang, Y., Jia, L., Peng, S., & He, R. (2024). Battlefield target intelligence system architecture modeling and system optimization. Journal of Systems Engineering and Electronics, 35(5), 1190–1210. https://doi.org/10.23919/JSEE.2024.000114
Liebetrau, T. (2022). Cyber conflict short of war: a European strategic vacuum. European Security, 31(4), 497–516. https://doi.org/10.1080/09662839.2022.2031991
Lubis, M., Safitra, M. F., Fakhrurroja, H., & Muttaqin, A. N. (2024). Guarding Our Vital Systems: A Metric for Critical Infrastructure Cyber Resilience. Sensors, 25(15), 4545. https://doi.org/10.3390/s25154545
Marvin Immanuel, J., Rahmadewi, R., & Saragih, Y. (2024). IoT-based Facelook and Fingerprint Safe Security System. Jurnal Penelitian Pendidikan IPA, 10(2), 500–505. https://doi.org/10.29303/JPPIPA.V10I2.6832
McIntosh, T. R., Susnjak, T., Liu, T., Watters, P., Xu, D., Liu, D., Nowrozy, R., & Halgamuge, M. N. (2024). From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models. Computers and Security, 144(June), 103964. https://doi.org/10.1016/j.cose.2024.103964
Mulyana, R. B., Riyadi, A. R., & Dhaipullah, D. (2024). Enterprise Architecture Dalam Transformasi Digital Perbankan: Studi Literatur Sistematis Menggunakan Kerangka Kerja TOGAF ADM. Jurnal Ilmu Komputer (JILKOMP), 1(1), 1–12. Retrieved from https://jurnal.or.id/index.php/jilkomp/article/view/1
Mustopo, A., Ramsi, O., & Gultom, R. A. G. (2024). Air Defense Transformation: Strategy in the Context of Multi-Domain Operations. Formosa Journal of Applied Sciences, 4(7), 2081–2092. https://doi.org/10.55927/FJAS.V4I7.237
Nasiri, A. (2023). Evaluasi Tingkat Kapabilitas Keamanan Sistem Informasi Menggunakan Kerangka Kerja Cobit 2019. Jurnal Tata Kelola Dan Kerangka Kerja Teknologi Informasi, 9(1), 34–41. https://doi.org/10.34010/JTK3TI.V9I1.9672
Nezameslami, R., Nezameslami, A., Mehdikhani, B., Mosavi-Jarrahi, A., Shahbazi, A., Rahmani, A., Masoudi, A., Yeganegi, M., Akhondzardaini, R., Bahrami, M., Aghili, K., & Neamatzadeh, H. (2024). Adapting PRISMA Guidelines to Enhance Reporting Quality in Genetic Association Studies: A Framework Proposal. Asian Pacific Journal of Cancer Prevention, 26(5), 1641–1651. https://doi.org/10.31557/APJCP.2025.26.5.1641
Noor, A. Z. M., Gernowo, R., & Nurhayati, O. D. (2023). Data Augmentation for Hoax Detection through the Method of Convolutional Neural Network in Indonesian News. Jurnal Penelitian Pendidikan IPA, 9(7), 5078–5084. https://doi.org/10.29303/JPPIPA.V9I7.4214
Nugraha, F., & Hendrik, B. (2024). Perbandingan Framework COBIT2019 dan TOGAF dalam Manajemen Keamanan Informasi. Journal of Education Research, 6(2), 462–467. https://doi.org/10.37985/JER.V6I2.2156
Pandey, D. K., & Kumar, R. (2023). Russia-Ukraine War and the global tourism sector: A 13-day tale. Current Issues in Tourism, 26(5), 692–700. https://doi.org/10.1080/13683500.2022.2081789
Parums, D. V. (2021). Editorial: Review Articles, Systematic Reviews, Meta-Analysis, and the Updated Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 Guidelines. Medical Science Monitor : International Medical Journal of Experimental and Clinical Research, 27, e934475--1. https://doi.org/10.12659/MSM.934475
Pemerintah Republik Indonesia. (2002). Undang-undang (UU) Nomor 3 Tahun 2002 tentang Pertahanan Negara. Pemerintah Republik Indonesia. Retrieved from https://peraturan.bpk.go.id/Details/44421/uu-no-3-tahun-2002
Perwej, Y., Syed, P., Abbas, Q., Dixit, J. P., Nikhat Akhtar, D., & Jaiswal, A. K. (2021). A Systematic Literature Review on the Cyber Security. International Journal of Scientific Research and Management, 9(12), 669–710. https://doi.org/10.18535/IJSRM/V9I12.EC04
Proudfoot, J. G., Cram, W. A., & Madnick, S. (2024). Weathering the storm: examining how organisations navigate the sea of cybersecurity regulations. European Journal of Information Systems, 34(3), 436–459. https://doi.org/10.1080/0960085X.2024.2345867
Putra, D., Mutiara, D., Nugraheni, K., & Suseno, J. E. (2024). Information Technology Risk-based Enterprise Architecture Design for Training Systems: Integration of COBIT 2019 and TOGAF ADM. JST (Jurnal Sains Dan Teknologi), 14(1), 35–46. https://doi.org/10.23887/JSTUNDIKSHA.V14I1.93498
Putra, K. R., & Anggreani, F. (2022). Perancangan Arsitektur Enterprise Pada Instansi Pemerintahan: Systematic Literature Review. Computing and Education Technology Journal, 2(0), 10–25. https://doi.org/10.20527/CETJ.V2I0.5293
Ramadhanty, N. (2024). Implementasi Kerangka Keamanan NIST Dan ISO/IEC 27001 Dalam Menghadapi Ancaman Risiko Siber. Journal of Indonesian Management, 4(4). https://doi.org/10.53697/JIM.V4I4.1973
Russo, N., Reis, L., Silveira, C., & Mamede, H. S. (2024). Towards a Comprehensive Framework for the Multidisciplinary Evaluation of Organizational Maturity on Business Continuity Program Management: A Systematic Literature Review. Information Security Journal, 33(1), 54–72. https://doi.org/10.1080/19393555.2023.2195577
Safarudin, M. S. (2021). Analisis dan Desain Sistem Informasi Sumber Daya Manusia pada PT.DEF Metode TOGAF ADM (The Open Group Architecture Process Architecture Development Method). Zona Teknik: Jurnal Ilmiah, 15(2), 16–26. https://doi.org/10.37776/ZT.V15I2.813
Safitra, M. F., Lubis, M., & Fakhrurroja, H. (2023). Counterattacking Cyber Threats: A Framework for the Future of Cybersecurity. Sustainability 2023, Vol. 15, Page 13369, 15(18), 13369. https://doi.org/10.3390/SU151813369
Septipalan, M. L., Widiartha, I. B. K., Zubaidi, A., & Taufik, M. (2024). Integrated Notification System for Smart Parking Security Using Bot Telegram. Jurnal Penelitian Pendidikan IPA, 10(5), 2679–2686. https://doi.org/10.29303/jppipa.v10i5.7447
Seyboth, C., & Beckmann, H. (2024). Erstellung von Enterprise Architectures mit COBIT, TOGAF und ArchiMate. Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft Fur Informatik (GI), 352, 1639–1648. https://doi.org/10.18420/inf2024_142
Siregar, A. A., Simanungkalit, E., & Nasrudin. (2024). Telegram-Based Earthquake Early Warning. Jurnal Penelitian Pendidikan IPA, 11(5), 85–94. https://doi.org/10.29303/jppipa.v11i5.11080
Siroli, G. P. (2018). Considerations on the Cyber Domain as the New Worldwide Battlefield. The International Spectator, 53(2), 111–123. https://doi.org/10.1080/03932729.2018.1453583
Steingartner, W., Galinec, D., Kozina, A., Su, C., Cha, S.-C., & Tu, F. (2021). Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model. Symmetry 2021, Vol. 13, Page 597, 13(4), 597. https://doi.org/10.3390/SYM13040597
Stephanie, Darianty, R., Ayumi, & Fayola, A. (2024). Tinjauan Literatur terhadap Persiapan dan Tantangan Implementasi Enterprise Architecture di Pemerintahan. JDMIS: Journal of Data Mining and Information Systems, 2(2), 97–104. https://doi.org/10.54259/JDMIS.V2I2.2958
Tristantie, N., & Dwi Nitami, D. (2024). Critical Thinking Implied to Fashion Research Competencies. Jurnal Penelitian Pendidikan IPA, 11(2), 685–690. https://doi.org/10.29303/JPPIPA.V11I2.10185
Vernandy, F., & Herdi, T. (2023). Enterprise Architecture untuk Travel Haji dan Umroh Berdasarkan The Open Group Architectur Framework. Jutisi : Jurnal Ilmiah Teknik Informatika Dan Sistem Informasi, 12(3), 922–933. https://doi.org/10.35889/JUTISI.V12I3.1337
Vors, O., & Bourcier, L. A. (2022). Synthesis and literature review of different mixed methods designs in pedagogical research in physical education. Physical Education and Sport Pedagogy, 27(2), 117–129. https://doi.org/10.1080/17408989.2021.1999920
Wang, S., Li, J., Zhao, J., & Yang, J. (2024). Research on Architecture Design and Description Methods Based on DoDAF. Lecture Notes in Electrical Engineering, 1187 LNEE, 366–372. https://doi.org/10.1007/978-981-97-2120-7_45
Wibisono, I. (2023). The Algorithm of Digital Branding of Presidential Candidacy on Instagram: Duty of Computer Technology. Jurnal Penelitian Pendidikan IPA, 9(SpecialIssue), 379–384. https://doi.org/10.29303/jppipa.v9ispecialissue.6270
Willett, M. (2023). The Cyber Dimension of the Russia-Ukraine War. In Survival: October - November 2022 (1st Editio, pp. 7–26). Routledge. https://doi.org/10.4324/9781003422211-1
Yasmin, T. S., & Yulianto, T. (2024). Enhancing Email Security Against Phishing Attacks Through User Behavior Analysis and Data Loss Prevention (DLP). Jurnal Penelitian Pendidikan IPA, 11(4), 590–600. https://doi.org/10.29303/JPPIPA.V11I4.10781
Yolanda, S., Hendra, H., Hita, H., & Ginting, T. W. (2023). Analisis Tata Kelola Teknologi Informasi Menggunakan Kerangka Kerja COBIT 2019 Domain BAI03 (Studi Kasus: PT. Berlian Tangguh Sejahtera). Jurnal Sifo Mikroskil, 24(2), 173–186. https://doi.org/10.55601/JSM.V24I2.1035
Younas, A., Inayat, S., & Sundus, A. (2021). Joint displays for qualitative-quantitative synthesis in mixed methods reviews. Research Methods in Medicine & Health Sciences, 2(3), 91–101. https://doi.org/10.1177/2632084320984374
License
Copyright (c) 2025 Martanto Dwi Saksomo Hadi, Rudy Agus Gemilang Gultom, Ansori, Bambang Kustiawan

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with Jurnal Penelitian Pendidikan IPA, agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution 4.0 International License (CC-BY License). This license allows authors to use all articles, data sets, graphics, and appendices in data mining applications, search engines, web sites, blogs, and other platforms by providing an appropriate reference. The journal allows the author(s) to hold the copyright without restrictions and will retain publishing rights without restrictions.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in Jurnal Penelitian Pendidikan IPA.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).






