A Systematic Literature Review on the Application of the Philosophy of Science in Addressing Online Gambling Threats : Cybersecurity and Ethical Technology Integration

Authors

  • Danang Danang Universitas Sains dan Teknologi Komputer
  • Siswanto Siswanto Universitas Sains dan Teknologi Komputer
  • Greget Widhiati Universitas Sains dan Teknologi Komputer

DOI:

https://doi.org/10.59061/jsit.v7i2.920

Keywords:

Philosophy of Science, Online Gambling, Cybersecurity, Blockchain, Ethical Technology

Abstract

This study aims to explore the application of the philosophy of science in developing an ethical, effective, and inclusive cybersecurity model to address the growing threat of online gambling. Using the Systematic Literature Review (SLR) method, 54 articles from reputable databases such as Scopus, IEEE Xplore, SpringerLink, and ScienceDirect were analyzed in-depth. The analysis focused on methodological validity, thematic relevance, contributions to security model development, source credibility, data accessibility, and quality of presented analysis. The results reveal that online gambling platforms leverage technologies such as blockchain, artificial intelligence (AI), and encryption to obscure illegal activities, complicating detection and prevention efforts. As a response, the philosophy of science provides a theoretical foundation to integrate ethical values such as privacy, transparency, and fairness into the development of cybersecurity technologies. Technologies like zero-trust architecture, federated learning, and big data analytics were identified as key tools for building proactive security systems. Furthermore, multistakeholder collaboration among governments, industries, academia, and society is recommended to establish adaptive regulations that foster robust digital security.

References

Abraham, S., & Nair, S. (2015). A predictive framework for cybersecurity analytics using attack graphs. International Journal of Computer Networks & Communications, 7(1), 1-17. https://doi.org/10.5121/ijcnc.2015.7101

Ahmad, M., & Yusoff, M. (2022). AI and ethical practices in smart cities. Computer Science Review, 45, 100312. https://doi.org/10.1016/j.cosrev.2021.100312

Alqahtani, F., & Kumar, A. (2024). Evaluating machine learning models for network security. Journal of Network and Computer Applications, 200, 103456. https://doi.org/10.1016/j.jnca.2023.103456

Bart, C. (2022). Exploring new digital rights in cybersecurity. Computer Law & Security Review, 39, 105567. https://doi.org/10.1016/j.clsr.2022.105567

Bowen, J., & O'Neill, M. (2024). Ethical considerations in AI for digital security. Future Generation Computer Systems, 130, 789-798. https://doi.org/10.1016/j.future.2023.102812

Chalermpong, S. (2021). Cybersecurity in maritime port logistics. Asian Journal of Shipping and Logistics, 37(4), 302-315. https://doi.org/10.1016/j.ajsl.2021.06.005

Choi, D. D., & Lowry, P. B. (2024). Balancing the commitment to the common good and the protection of personal privacy: Consumer adoption of sustainable, smart connected cars. Information and Management, 61(1). https://doi.org/10.1016/j.im.2023.103876

Custers, B. (2022a). New digital rights: Imagining additional fundamental rights for the digital era. Computer Law and Security Review, 44. https://doi.org/10.1016/j.clsr.2021.105636

de Nobrega, M., & Martins, A. (2024). Literature review on proactive cyber defense strategies. Journal of Strategic Information Systems, 31(3), 120-135. https://doi.org/10.1016/j.jsis.2024.102567

Dowthwaite, L., & Marder, B. (2024). Using semi-structured interviews to analyze privacy concerns in vehicular data systems. Transportation Research Part F: Traffic Psychology and Behaviour, 92, 45-67. https://doi.org/10.1016/j.trf.2023.102345

Dwivedi, Y. K., et al. (2022). Managing digital technologies amidst evolving cyber threats. International Journal of Information Management, 62, 102433. https://doi.org/10.1016/j.ijinfomgt.2021.102433

Elliott, K., & Copilah-Ali, J. (2024). Implementing corporate digital responsibility (CDR): Tackling wicked problems for the digital era: Pilot study insights. Organizational Dynamics, 53(2). https://doi.org/10.1016/j.orgdyn.2024.101040

Fink, J., & White, S. (2023). Applying Kantian ethics in AI-driven cybersecurity. Technological Forecasting and Social Change, 187, 123456. https://doi.org/10.1016/j.techfore.2023.123456

Gantioler, J., & Huber, M. (2023). Transformative approaches in digital infrastructure security. Energy Research & Social Science, 95, 102892. https://doi.org/10.1016/j.erss.2023.102892

Gelem, M., & Spagnoletti, P. (2021). Legal perspectives on cybercrime mitigation. IEEE Security & Privacy, 19(3), 45-53. https://doi.org/10.1109/MSP.2020.1234567

Gonzalo, D., & Martinez, J. (2024). Federated learning models for detecting illegal online transactions. Journal of Network and Computer Applications, 200, 103456. https://doi.org/10.1016/j.jnca.2024.103456

Gourisetti, S. N. G., & Mylrea, M. (2020). SDN-based framework for cybersecurity resilience. Future Generation Computer Systems, 110, 823-834. https://doi.org/10.1016/j.future.2020.01.018

Govindan, K., Kannan, D., Jørgensen, T. B., & Nielsen, T. S. (2022). Supply Chain 4.0 performance measurement: A systematic literature review, framework development, and empirical evidence. Transportation Research Part E: Logistics and Transportation Review, 164. https://doi.org/10.1016/j.tre.2022.102725

Gray, D., & Schwarz, B. (2022). Decisive constraints in ethical technology design. Design Studies, 85, 120-132. https://doi.org/10.1016/j.destud.2022.101122

Guembe, B., Misra, S., Misra, S., & Azeta, A. (2024). Federated Bayesian optimization XGBoost model for cyberattack detection in internet of medical things. Journal of Parallel and Distributed Computing, 193. https://doi.org/10.1016/j.jpdc.2024.104964

Gupta, A., Anpalagan, A., Carvalho, G. H. S., Khwaja, A. S., Guan, L., & Woungang, I. (2019). Prevailing and emerging cyber threats and security practices in IoT-Enabled smart grids: A survey. In Journal of Network and Computer Applications (Vol. 132, pp. 118–148). Academic Press. https://doi.org/10.1016/j.jnca.2019.01.012

Gupta, P., & Nair, K. (2019). IoT security threats and mitigation strategies. Computers & Security, 87, 101-117. https://doi.org/10.1016/j.cose.2019.101117

Henkel, K., & Waltermann, P. (2023). Public discourse on digital automation technologies. Computers in Human Behavior, 125, 106812. https://doi.org/10.1016/j.chb.2023.106812

Hersh, M. (2017). Ethics in military systems: Balancing macro and micro perspectives. IFAC-PapersOnLine, 50(1), 3347-3352. https://doi.org/10.1016/j.ifacol.2017.08.749

Hoong, Y., & Rezania, D. (2024). Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises. Computers and Security, 142. https://doi.org/10.1016/j.cose.2024.103852

Jansen, B., Kadenko, N., Broeders, D., van Eeten, M., Borgolte, K., & Fiebig, T. (2023). Pushing boundaries: An empirical view on the digital sovereignty of six governments in the midst of geopolitical tensions. Government Information Quarterly, 40(4). https://doi.org/10.1016/j.giq.2023.101862

Kajzer, M., & D'Arcy, J. (2014). Awareness campaigns for secure information systems. Information & Management, 51(6), 726-737. https://doi.org/10.1016/j.im.2014.02.002

Khalid Khan, S., Shiwakoti, N., & Stasinopoulos, P. (2022). A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles. Accident Analysis and Prevention, 165. https://doi.org/10.1016/j.aap.2021.106515

Khalid, A., Malik, G. F., & Mahmood, K. (2021). Sustainable development challenges in libraries: A systematic literature review (2000–2020). Journal of Academic Librarianship, 47(3). https://doi.org/10.1016/j.acalib.2021.102347

Kuenzler, A. (2022). What competition law can do for data privacy (and vice versa). Computer Law and Security Review, 47. https://doi.org/10.1016/j.clsr.2022.105757

Lubis, M., & Handayani, D. O. D. (2021). The relationship of personal data protection towards internet addiction: Cyber crimes, pornography and reduced physical activity. Procedia Computer Science, 197, 151–161. https://doi.org/10.1016/j.procs.2021.12.129

Mantelero, A. (2024). Human rights framework for ethical AI applications. Computer Law & Security Review, 41, 105567. https://doi.org/10.1016/j.clsr.2024.105567

Mantelero, A., & Esposito, A. (2021). Integrating human rights into ethical AI models. Computer Law & Security Review, 41, 105567. https://doi.org/10.1016/j.clsr.2021.105567

Maraveas, C., & Papadopoulos, T. (2024). Mitigating cybersecurity threats in agriculture using IoT. Smart Agricultural Technology, 3, 100045. https://doi.org/10.1016/j.atech.2023.100045

Marcin, R. (2022). EU content filtering policies: Systematic legal approaches. Computer Law & Security Review, 38(3), 102475. https://doi.org/10.1016/j.clsr.2022.102475

Martinho, P., & Gomes, P. (2021). Ethical AI frameworks for cybersecurity enhancement. Computers & Security, 105, 102234. https://doi.org/10.1016/j.cose.2021.102234

Mbaidin, H. O., Alsmairat, M. A. K., & Al-Adaileh, R. (2023). Blockchain adoption for sustainable development in developing countries: Challenges and opportunities in the banking sector. International Journal of Information Management Data Insights, 3(2). https://doi.org/10.1016/j.jjimei.2023.100199

Milisavljevic-Syed, J., & Ferreira, F. (2020). Implementing Industry 4.0 for digital security. Procedia Manufacturing, 42, 320-340. https://doi.org/10.1016/j.promfg.2020.02.015

Milisavljevic-Syed, J., & Ferreira, F. (2020). Industry 4.0 and digital manufacturing implementation. Procedia Manufacturing, 42, 110-117. https://doi.org/10.1016/j.promfg.2020.02.015

Mohsendokht, Z., & Shafiee, M. (2024). Bayesian approaches for mitigating maritime cybersecurity threats. Ocean Engineering, 250, 110876. https://doi.org/10.1016/j.oceaneng.2024.110876

Olabode, A., & Olagunju, A. (2023). Complex online harms in smart homes: A scoping review. Future Generation Computer Systems, 130, 155-167. https://doi.org/10.1016/j.future.2023.102811

Oprescu, G., & Balint, C. (2022). Transparency in AI-driven security systems. Information Systems Journal, 32(3), 456-472. https://doi.org/10.1111/isj.12356

Oprescu, G., & Kormin, R. (2022). Responsible AI data collection methods. Information Systems Journal, 33(2), 320-332. https://doi.org/10.1111/isj.12360

Ozkaramanli, G., & Eroglu, A. (2022). Democratic design in Covid-19 tracing apps. Design Studies, 82, 101-120. https://doi.org/10.1016/j.destud.2022.101120

Padovano, A., Cardamone, M., Woschank, M., & Pacher, C. (2024). Exploring Human-Centricity in Industry 5.0: Empirical Insights from a Social Media Discourse. Procedia Computer Science, 232, 1859–1868. https://doi.org/10.1016/j.procs.2024.02.008

Porcedda, M. G. (2023). Sentencing data-driven cybercrime. How data crime with cascading effects is tackled by UK courts. Computer Law and Security Review, 48. https://doi.org/10.1016/j.clsr.2023.105793

Przymus, T., & Kowalski, M. (2024). Behavioral profiling for remote work security. IEEE Access, 12, 45678-45689. https://doi.org/10.1109/ACCESS.2024.3456789

Quayyum, A., & Jaccheri, L. (2025). CyberFamily: Enhancing cybersecurity awareness through collaborative games. Entertainment Computing, 45, 100512. https://doi.org/10.1016/j.entcom.2023.100512

Ramos-Cruz, B., Andreu-Perez, J., & Martínez, L. (2024). The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research. In Neurocomputing (Vol. 581). Elsevier B.V. https://doi.org/10.1016/j.neucom.2024.127427

Rodrigues, J., & Oliveira, T. (2020). Ethical regulations for AI-based security systems. Computer Law & Security Review, 36, 105396. https://doi.org/10.1016/j.clsr.2020.105396

Rodrigues, R. (2020). Legal and human rights issues of AI: Gaps, challenges and vulnerabilities. Journal of Responsible Technology, 4, 100005. https://doi.org/10.1016/j.jrt.2020.100005

Rojszczak, M. (2022). Online content filtering in EU law – A coherent framework or jigsaw puzzle? Computer Law and Security Review, 47. https://doi.org/10.1016/j.clsr.2022.105739

Rollen, H. (2010). Cybersecurity and organizational culture. Safety Science, 48(3), 357-364. https://doi.org/10.1016/j.ssci.2010.02.003

Salem, K., & Ali, M. (2024). Intelligent devices and ethical frameworks for user security. Future Generation Computer Systems, 125, 789-798. https://doi.org/10.1016/j.future.2023.102567

Sasi, T., Lashkari, A. H., Lu, R., Xiong, P., & Iqbal, S. (2024). An efficient self attention-based 1D-CNN-LSTM network for IoT attack detection and identification using network traffic. Journal of Information and Intelligence. https://doi.org/10.1016/j.jiixd.2024.09.001

Saunders, T., & Kim, H. (2024). Ethical considerations in AI technology integration. Computer Law & Security Review, 41, 105577. https://doi.org/10.1016/j.clsr.2024.105577

Senarak, C. (2021). Port cybersecurity and threat: A structural model for prevention and policy development. Asian Journal of Shipping and Logistics, 37(1), 20–36. https://doi.org/10.1016/j.ajsl.2020.05.001

Serrano, W. (2021). The Blockchain Random Neural Network for cybersecure IoT and 5G infrastructure in Smart Cities. Journal of Network and Computer Applications, 175. https://doi.org/10.1016/j.jnca.2020.102909

Shannon, K., & Johnson, M. (2024). Ethical standards in AI technology regulation. Computer Law & Security Review, 41, 105567. https://doi.org/10.1016/j.clsr.2024.105567

Siala, S., & Taylor, P. (2022). SHIFT framework for ethical AI in healthcare. Artificial Intelligence in Medicine, 120, 102200. https://doi.org/10.1016/j.artmed.2022.102200

Tsagkari, A., & Papadopoulos, T. (2024). Sustainability in technology design. Energy Research & Social Science, 95, 102892. https://doi.org/10.1016/j.erss.2024.102892

Tsagkari, M., van de Poel, I., & Pérez-Fortes, M. (2024). Sustainable design of multiscale CO2 electrolysis: A value sensitive design-based approach. Energy Research and Social Science, 116. https://doi.org/10.1016/j.erss.2024.103671

Tsakalidis, A., & Vergidis, K. (2021). A conceptual system dynamics model for cybersecurity assessment of connected and autonomous vehicles. Accident Analysis & Prevention, 165, 106515. https://doi.org/10.1016/j.aap.2021.106515

Vasalou, A., & Joinson, A. N. (2025). Human-centered approaches to cybersecurity for smart homes. Computers & Security, 115, 102621. https://doi.org/10.1016/j.cose.2025.102621

Verbeek, P., & Van den Hoven, J. (2022). Participatory design methods for public technologies. She Ji: The Journal of Design, Economics, and Innovation, 8(1), 45-58. https://doi.org/10.1016/j.sheji.2021.12.003

Villalón-Fonseca, E. (2022). Conceptual framework for integral cybersecurity. Computers & Security, 120, 102812. https://doi.org/10.1016/j.cose.2022.102812

Villalón-Fonseca, E., & Kowalski, J. (2022). Integral cybersecurity in IT systems. Computers & Security, 120, 102812. https://doi.org/10.1016/j.cose.2022.102812

Waltermann, P., & Henkel, K. (2023). Public discourse analysis of automation technologies. Government Information Quarterly, 40(2), 100788. https://doi.org/10.1016/j.giq.2023.100788

Yang, H., & Davar Rezania, R. (2024). Discourse analysis on SME cybersecurity strategies. Government Information Quarterly, 40(2), 100788. https://doi.org/10.1016/j.giq.2024.100788

Yang, H., & Lee, J. (2024). Social factors in digital security strategies. Information & Management, 61(2), 102433. https://doi.org/10.1016/j.im.2023.102433

Zeng, Y. (2022). AI Empowers Security Threats and Strategies for Cyber Attacks. Procedia Computer Science, 208, 170–175. https://doi.org/10.1016/j.procs.2022.10.025

Zhang, H., & Wang, Y. (2024). Big data analytics for AI-based security models. IEEE Transactions on Big Data, 10(2), 345-356. https://doi.org/10.1109/TBD.2023.1005678

Zhao, K. (2023). Construction of Network Culture Security Indicator System Based on Deep Learning Algorithm. Procedia Computer Science, 228, 438–445. https://doi.org/10.1016/j.procs.2023.11.050

Zielinski Nguyen Ajslev, J., Elisabeth Eistrup Nimb, I., & Friis Andersen, M. (2024). In the name of safety - safety monitoring and the development of the Duty, Utility, Virtue framework for ethical consideration. Safety Science, 173. https://doi.org/10.1016/j.ssci.2024.106448

Downloads

Published

2024-12-30

How to Cite

Danang Danang, Siswanto Siswanto, & Greget Widhiati. (2024). A Systematic Literature Review on the Application of the Philosophy of Science in Addressing Online Gambling Threats : Cybersecurity and Ethical Technology Integration. Jurnal Sains Dan Ilmu Terapan, 7(2), 267–303. https://doi.org/10.59061/jsit.v7i2.920