A Systematic Literature Review on the Application of the Philosophy of Science in Addressing Online Gambling Threats : Cybersecurity and Ethical Technology Integration
DOI:
https://doi.org/10.59061/jsit.v7i2.920Keywords:
Philosophy of Science, Online Gambling, Cybersecurity, Blockchain, Ethical TechnologyAbstract
This study aims to explore the application of the philosophy of science in developing an ethical, effective, and inclusive cybersecurity model to address the growing threat of online gambling. Using the Systematic Literature Review (SLR) method, 54 articles from reputable databases such as Scopus, IEEE Xplore, SpringerLink, and ScienceDirect were analyzed in-depth. The analysis focused on methodological validity, thematic relevance, contributions to security model development, source credibility, data accessibility, and quality of presented analysis. The results reveal that online gambling platforms leverage technologies such as blockchain, artificial intelligence (AI), and encryption to obscure illegal activities, complicating detection and prevention efforts. As a response, the philosophy of science provides a theoretical foundation to integrate ethical values such as privacy, transparency, and fairness into the development of cybersecurity technologies. Technologies like zero-trust architecture, federated learning, and big data analytics were identified as key tools for building proactive security systems. Furthermore, multistakeholder collaboration among governments, industries, academia, and society is recommended to establish adaptive regulations that foster robust digital security.
References
Abraham, S., & Nair, S. (2015). A predictive framework for cybersecurity analytics using attack graphs. International Journal of Computer Networks & Communications, 7(1), 1-17. https://doi.org/10.5121/ijcnc.2015.7101
Ahmad, M., & Yusoff, M. (2022). AI and ethical practices in smart cities. Computer Science Review, 45, 100312. https://doi.org/10.1016/j.cosrev.2021.100312
Alqahtani, F., & Kumar, A. (2024). Evaluating machine learning models for network security. Journal of Network and Computer Applications, 200, 103456. https://doi.org/10.1016/j.jnca.2023.103456
Bart, C. (2022). Exploring new digital rights in cybersecurity. Computer Law & Security Review, 39, 105567. https://doi.org/10.1016/j.clsr.2022.105567
Bowen, J., & O'Neill, M. (2024). Ethical considerations in AI for digital security. Future Generation Computer Systems, 130, 789-798. https://doi.org/10.1016/j.future.2023.102812
Chalermpong, S. (2021). Cybersecurity in maritime port logistics. Asian Journal of Shipping and Logistics, 37(4), 302-315. https://doi.org/10.1016/j.ajsl.2021.06.005
Choi, D. D., & Lowry, P. B. (2024). Balancing the commitment to the common good and the protection of personal privacy: Consumer adoption of sustainable, smart connected cars. Information and Management, 61(1). https://doi.org/10.1016/j.im.2023.103876
Custers, B. (2022a). New digital rights: Imagining additional fundamental rights for the digital era. Computer Law and Security Review, 44. https://doi.org/10.1016/j.clsr.2021.105636
de Nobrega, M., & Martins, A. (2024). Literature review on proactive cyber defense strategies. Journal of Strategic Information Systems, 31(3), 120-135. https://doi.org/10.1016/j.jsis.2024.102567
Dowthwaite, L., & Marder, B. (2024). Using semi-structured interviews to analyze privacy concerns in vehicular data systems. Transportation Research Part F: Traffic Psychology and Behaviour, 92, 45-67. https://doi.org/10.1016/j.trf.2023.102345
Dwivedi, Y. K., et al. (2022). Managing digital technologies amidst evolving cyber threats. International Journal of Information Management, 62, 102433. https://doi.org/10.1016/j.ijinfomgt.2021.102433
Elliott, K., & Copilah-Ali, J. (2024). Implementing corporate digital responsibility (CDR): Tackling wicked problems for the digital era: Pilot study insights. Organizational Dynamics, 53(2). https://doi.org/10.1016/j.orgdyn.2024.101040
Fink, J., & White, S. (2023). Applying Kantian ethics in AI-driven cybersecurity. Technological Forecasting and Social Change, 187, 123456. https://doi.org/10.1016/j.techfore.2023.123456
Gantioler, J., & Huber, M. (2023). Transformative approaches in digital infrastructure security. Energy Research & Social Science, 95, 102892. https://doi.org/10.1016/j.erss.2023.102892
Gelem, M., & Spagnoletti, P. (2021). Legal perspectives on cybercrime mitigation. IEEE Security & Privacy, 19(3), 45-53. https://doi.org/10.1109/MSP.2020.1234567
Gonzalo, D., & Martinez, J. (2024). Federated learning models for detecting illegal online transactions. Journal of Network and Computer Applications, 200, 103456. https://doi.org/10.1016/j.jnca.2024.103456
Gourisetti, S. N. G., & Mylrea, M. (2020). SDN-based framework for cybersecurity resilience. Future Generation Computer Systems, 110, 823-834. https://doi.org/10.1016/j.future.2020.01.018
Govindan, K., Kannan, D., Jørgensen, T. B., & Nielsen, T. S. (2022). Supply Chain 4.0 performance measurement: A systematic literature review, framework development, and empirical evidence. Transportation Research Part E: Logistics and Transportation Review, 164. https://doi.org/10.1016/j.tre.2022.102725
Gray, D., & Schwarz, B. (2022). Decisive constraints in ethical technology design. Design Studies, 85, 120-132. https://doi.org/10.1016/j.destud.2022.101122
Guembe, B., Misra, S., Misra, S., & Azeta, A. (2024). Federated Bayesian optimization XGBoost model for cyberattack detection in internet of medical things. Journal of Parallel and Distributed Computing, 193. https://doi.org/10.1016/j.jpdc.2024.104964
Gupta, A., Anpalagan, A., Carvalho, G. H. S., Khwaja, A. S., Guan, L., & Woungang, I. (2019). Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey. In Journal of Network and Computer Applications (Vol. 132, pp. 118–148). Academic Press. https://doi.org/10.1016/j.jnca.2019.01.012
Gupta, P., & Nair, K. (2019). IoT security threats and mitigation strategies. Computers & Security, 87, 101-117. https://doi.org/10.1016/j.cose.2019.101117
Henkel, K., & Waltermann, P. (2023). Public discourse on digital automation technologies. Computers in Human Behavior, 125, 106812. https://doi.org/10.1016/j.chb.2023.106812
Hersh, M. (2017). Ethics in military systems: Balancing macro and micro perspectives. IFAC-PapersOnLine, 50(1), 3347-3352. https://doi.org/10.1016/j.ifacol.2017.08.749
Hoong, Y., & Rezania, D. (2024). Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises. Computers and Security, 142. https://doi.org/10.1016/j.cose.2024.103852
Jansen, B., Kadenko, N., Broeders, D., van Eeten, M., Borgolte, K., & Fiebig, T. (2023). Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions. Government Information Quarterly, 40(4). https://doi.org/10.1016/j.giq.2023.101862
Kajzer, M., & D'Arcy, J. (2014). Awareness campaigns for secure information systems. Information & Management, 51(6), 726-737. https://doi.org/10.1016/j.im.2014.02.002
Khalid Khan, S., Shiwakoti, N., & Stasinopoulos, P. (2022). A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles. Accident Analysis and Prevention, 165. https://doi.org/10.1016/j.aap.2021.106515
Khalid, A., Malik, G. F., & Mahmood, K. (2021). Sustainable development challenges in libraries: A systematic literature review (2000–2020). Journal of Academic Librarianship, 47(3). https://doi.org/10.1016/j.acalib.2021.102347
Kuenzler, A. (2022). What competition law can do for data privacy (and vice versa). Computer Law and Security Review, 47. https://doi.org/10.1016/j.clsr.2022.105757
Lubis, M., & Handayani, D. O. D. (2021). The relationship of personal data protection towards internet addiction: Cyber crimes, pornography and reduced physical activity. Procedia Computer Science, 197, 151–161. https://doi.org/10.1016/j.procs.2021.12.129
Mantelero, A. (2024). Human rights framework for ethical AI applications. Computer Law & Security Review, 41, 105567. https://doi.org/10.1016/j.clsr.2024.105567
Mantelero, A., & Esposito, A. (2021). Integrating human rights into ethical AI models. Computer Law & Security Review, 41, 105567. https://doi.org/10.1016/j.clsr.2021.105567
Maraveas, C., & Papadopoulos, T. (2024). Mitigating cybersecurity threats in agriculture using IoT. Smart Agricultural Technology, 3, 100045. https://doi.org/10.1016/j.atech.2023.100045
Marcin, R. (2022). EU content filtering policies: Systematic legal approaches. Computer Law & Security Review, 38(3), 102475. https://doi.org/10.1016/j.clsr.2022.102475
Martinho, P., & Gomes, P. (2021). Ethical AI frameworks for cybersecurity enhancement. Computers & Security, 105, 102234. https://doi.org/10.1016/j.cose.2021.102234
Mbaidin, H. O., Alsmairat, M. A. K., & Al-Adaileh, R. (2023). Blockchain adoption for sustainable development in developing countries: Challenges and opportunities in the banking sector. International Journal of Information Management Data Insights, 3(2). https://doi.org/10.1016/j.jjimei.2023.100199
Milisavljevic-Syed, J., & Ferreira, F. (2020). Implementing Industry 4.0 for digital security. Procedia Manufacturing, 42, 320-340. https://doi.org/10.1016/j.promfg.2020.02.015
Milisavljevic-Syed, J., & Ferreira, F. (2020). Industry 4.0 and digital manufacturing implementation. Procedia Manufacturing, 42, 110-117. https://doi.org/10.1016/j.promfg.2020.02.015
Mohsendokht, Z., & Shafiee, M. (2024). Bayesian approaches for mitigating maritime cybersecurity threats. Ocean Engineering, 250, 110876. https://doi.org/10.1016/j.oceaneng.2024.110876
Olabode, A., & Olagunju, A. (2023). Complex online harms in smart homes: A scoping review. Future Generation Computer Systems, 130, 155-167. https://doi.org/10.1016/j.future.2023.102811
Oprescu, G., & Balint, C. (2022). Transparency in AI-driven security systems. Information Systems Journal, 32(3), 456-472. https://doi.org/10.1111/isj.12356
Oprescu, G., & Kormin, R. (2022). Responsible AI data collection methods. Information Systems Journal, 33(2), 320-332. https://doi.org/10.1111/isj.12360
Ozkaramanli, G., & Eroglu, A. (2022). Democratic design in Covid-19 tracing apps. Design Studies, 82, 101-120. https://doi.org/10.1016/j.destud.2022.101120
Padovano, A., Cardamone, M., Woschank, M., & Pacher, C. (2024). Exploring Human-Centricity in Industry 5.0: Empirical Insights from a Social Media Discourse. Procedia Computer Science, 232, 1859–1868. https://doi.org/10.1016/j.procs.2024.02.008
Porcedda, M. G. (2023). Sentencing data-driven cybercrime. How data crime with cascading effects is tackled by UK courts. Computer Law and Security Review, 48. https://doi.org/10.1016/j.clsr.2023.105793
Przymus, T., & Kowalski, M. (2024). Behavioral profiling for remote work security. IEEE Access, 12, 45678-45689. https://doi.org/10.1109/ACCESS.2024.3456789
Quayyum, A., & Jaccheri, L. (2025). CyberFamily: Enhancing cybersecurity awareness through collaborative games. Entertainment Computing, 45, 100512. https://doi.org/10.1016/j.entcom.2023.100512
Ramos-Cruz, B., Andreu-Perez, J., & Martínez, L. (2024). The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research. In Neurocomputing (Vol. 581). Elsevier B.V. https://doi.org/10.1016/j.neucom.2024.127427
Rodrigues, J., & Oliveira, T. (2020). Ethical regulations for AI-based security systems. Computer Law & Security Review, 36, 105396. https://doi.org/10.1016/j.clsr.2020.105396
Rodrigues, R. (2020). Legal and human rights issues of AI: Gaps, challenges and vulnerabilities. Journal of Responsible Technology, 4, 100005. https://doi.org/10.1016/j.jrt.2020.100005
Rojszczak, M. (2022). Online content filtering in EU law – A coherent framework or jigsaw puzzle? Computer Law and Security Review, 47. https://doi.org/10.1016/j.clsr.2022.105739
Rollen, H. (2010). Cybersecurity and organizational culture. Safety Science, 48(3), 357-364. https://doi.org/10.1016/j.ssci.2010.02.003
Salem, K., & Ali, M. (2024). Intelligent devices and ethical frameworks for user security. Future Generation Computer Systems, 125, 789-798. https://doi.org/10.1016/j.future.2023.102567
Sasi, T., Lashkari, A. H., Lu, R., Xiong, P., & Iqbal, S. (2024). An efficient self attention-based 1D-CNN-LSTM network for IoT attack detection and identification using network traffic. Journal of Information and Intelligence. https://doi.org/10.1016/j.jiixd.2024.09.001
Saunders, T., & Kim, H. (2024). Ethical considerations in AI technology integration. Computer Law & Security Review, 41, 105577. https://doi.org/10.1016/j.clsr.2024.105577
Senarak, C. (2021). Port cybersecurity and threat: A structural model for prevention and policy development. Asian Journal of Shipping and Logistics, 37(1), 20–36. https://doi.org/10.1016/j.ajsl.2020.05.001
Serrano, W. (2021). The Blockchain Random Neural Network for cybersecure IoT and 5G infrastructure in Smart Cities. Journal of Network and Computer Applications, 175. https://doi.org/10.1016/j.jnca.2020.102909
Shannon, K., & Johnson, M. (2024). Ethical standards in AI technology regulation. Computer Law & Security Review, 41, 105567. https://doi.org/10.1016/j.clsr.2024.105567
Siala, S., & Taylor, P. (2022). SHIFT framework for ethical AI in healthcare. Artificial Intelligence in Medicine, 120, 102200. https://doi.org/10.1016/j.artmed.2022.102200
Tsagkari, A., & Papadopoulos, T. (2024). Sustainability in technology design. Energy Research & Social Science, 95, 102892. https://doi.org/10.1016/j.erss.2024.102892
Tsagkari, M., van de Poel, I., & Pérez-Fortes, M. (2024). Sustainable design of multiscale CO2 electrolysis: A value sensitive design-based approach. Energy Research and Social Science, 116. https://doi.org/10.1016/j.erss.2024.103671
Tsakalidis, A., & Vergidis, K. (2021). A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles. Accident Analysis & Prevention, 165, 106515. https://doi.org/10.1016/j.aap.2021.106515
Vasalou, A., & Joinson, A. N. (2025). Human-centered approaches to cybersecurity for smart homes. Computers & Security, 115, 102621. https://doi.org/10.1016/j.cose.2025.102621
Verbeek, P., & Van den Hoven, J. (2022). Participatory design methods for public technologies. She Ji: The Journal of Design, Economics, and Innovation, 8(1), 45-58. https://doi.org/10.1016/j.sheji.2021.12.003
Villalón-Fonseca, E. (2022). Conceptual framework for integral cybersecurity. Computers & Security, 120, 102812. https://doi.org/10.1016/j.cose.2022.102812
Villalón-Fonseca, E., & Kowalski, J. (2022). Integral cybersecurity in IT systems. Computers & Security, 120, 102812. https://doi.org/10.1016/j.cose.2022.102812
Waltermann, P., & Henkel, K. (2023). Public discourse analysis of automation technologies. Government Information Quarterly, 40(2), 100788. https://doi.org/10.1016/j.giq.2023.100788
Yang, H., & Davar Rezania, R. (2024). Discourse analysis on SME cybersecurity strategies. Government Information Quarterly, 40(2), 100788. https://doi.org/10.1016/j.giq.2024.100788
Yang, H., & Lee, J. (2024). Social factors in digital security strategies. Information & Management, 61(2), 102433. https://doi.org/10.1016/j.im.2023.102433
Zeng, Y. (2022). AI Empowers Security Threats and Strategies for Cyber Attacks. Procedia Computer Science, 208, 170–175. https://doi.org/10.1016/j.procs.2022.10.025
Zhang, H., & Wang, Y. (2024). Big data analytics for AI-based security models. IEEE Transactions on Big Data, 10(2), 345-356. https://doi.org/10.1109/TBD.2023.1005678
Zhao, K. (2023). Construction of Network Culture Security Indicator System Based on Deep Learning Algorithm. Procedia Computer Science, 228, 438–445. https://doi.org/10.1016/j.procs.2023.11.050
Zielinski Nguyen Ajslev, J., Elisabeth Eistrup Nimb, I., & Friis Andersen, M. (2024). In the name of safety - safety monitoring and the development of the Duty, Utility, Virtue framework for ethical consideration. Safety Science, 173. https://doi.org/10.1016/j.ssci.2024.106448
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Jurnal Sains dan Ilmu Terapan

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.