Mapping the Research Domains of Digital Monitoring: A Systematic Literature Review and Taxonomy

Authors

  • Yuli Astuti Diponegoro University, Indonesia
  • Purwanto Diponegoro University, Indonesia
  • Aries Susanty Diponegoro University, Indonesia
Pages Icon

DOI:

https://doi.org/10.63158/journalisi.v8i2.1523

Keywords:

Digital Monitoring, Decision Intelligence, Systematic Literature Review, PRISMA, Digital Monitoring Taxonomy

Abstract

Digital monitoring is increasingly central to modern information systems, enabling continuous observation of assets, processes, and services through real-time data collection. Although advances in analytics and machine learning support data-driven decisions, monitoring, analytics, and decision-making are still often developed in isolation, limiting effective integration. This study maps digital monitoring research, classifies monitoring characteristics, and identifies gaps in linking monitoring with decision-making. Using a PRISMA-based Systematic Literature Review of Scopus-indexed journal articles published between 2020 and 2025, 97 studies were selected and analysed through thematic synthesis. The review shows that digital monitoring spans nine major domains, with infrastructure, environmental, and manufacturing applications most dominant. The study’s main contribution is a multidimensional taxonomy that classifies monitoring approaches by monitoring object, mode, analytics type, application domain, and information system orientation. This taxonomy also positions digital monitoring within the evolution of information systems toward decision intelligence. Findings indicate that current research remains largely technical, relying mainly on descriptive and predictive analytics, while integration with decision intelligence is still limited. A notable gap appears in digital service contexts, especially proactive user-experience monitoring in Internet Service Providers (ISP).

Downloads

Download data is not yet available.

References

[1] A. Aleissa, M. Alhafith, and A. Hamam, “The crucial role of digital monitoring in communication facility equipment,” Int. J. Innov. Sci. Res. Technol., vol. 9, no. 8, pp. 245–246, 2024, doi: 10.38124/ijisrt/IJISRT24AUG046.

[2] P. Pustelnyk and Y. Levus, “Real-time anomaly detection in distributed IoT systems: a comprehensive review and comparative analysis,” Inf. Syst. NETWORKS, no. 17, pp. 160–169, 2025, doi: 10.23939/sisn2025.17.160.

[3] H. Li, X. Wang, Y. Feng, Y. Qi, and J. Tian, “Driving intelligent IoT monitoring and control through cloud computing and machine learning,” in International Conference on Computing and Data Science, 2024, pp. 75–80. doi: 10.54254/2755-2721/64/20241358.

[4] M. Dong et al., “Deformation prediction of unstable slopes based on real-time monitoring and deep AR model,” Sensors, pp. 1–18, 2020.

[5] N. Yousefpour, S. Downie, S. Walker, N. Perkins, and H. Dikanski, “Machine learning solutions for bridge scour forecast based on monitoring data,” Transp. Res. Rec., pp. 1–19, 2021, doi: 10.1177/03611981211012693.

[6] J. Ren, Q. Zhu, and C. Wang, “Edge Computing for Water Quality Monitoring Systems,” Mob. Inf. Syst., pp. 1–7, 2022, doi: 10.1155/2022/5056606.

[7] S. Seshan, D. Vries, J. Immink, A. Van Der Helm, and J. Poinapen, “LSTM-based autoencoder models for real-time quality control of wastewater treatment sensor data,” J. Hydroinformatics, vol. 26, no. 2, pp. 441–458, 2024, doi: 10.2166/hydro.2024.167.

[8] K. Yang, H. Ma, and S. Dou, “Fog intelligence for network anomaly detection,” IEEE Netw., pp. 78–82, 2020.

[9] K. Dornala and S. Senthilkumar, “Real-time threat identification and categorization in network traffic using deep learning behavioral analysis,” Int. J. SMART Sens. Intell. Syst., vol. 18, no. 1, pp. 1–18, 2025, doi: 10.2478/ijssis-2025-0017.

[10] W. Liu, P. Liu, X. Wang, Z. Meng, Y. Jiang, and Y. Xiao, “A condition monitoring strategy of looms based on DSmT theory and genetic multiobjective optimization improves the rough set method,” IEEE Access, vol. 10, pp. 59723–59736, 2022, doi: 10.1109/ACCESS.2022.3178692.

[11] A. Darwish, M. Persson, S. Ericson, and R. Ghasemi, “Weld defect detection in laser beam welding using multispectral emission sensor features and machine learning,” Sensors, pp. 1–27, 2025, doi: 10.3390/s25165120.

[12] A. Rasheed, “Digital twin : values , challenges and enablers from a modeling perspective,” IEEE Access, vol. 8, pp. 21980–22012, 2020.

[13] A. C. S. Araújo, L. M. Rabelo, P. C. M. Lamim Filho, and W. M. Caminhas, “A digital twin approach to smart monitoring and fault diagnosis,” IEEE Access, vol. 13, pp. 148384–148395, 2025, doi: 10.1109/ACCESS.2025.3601349.

[14] M. J. Page et al., “The PRISMA 2020 statement : an updated guideline for reporting systematic reviews systematic reviews and meta-analyses,” BMJ, vol. 372, pp. 1–9, 2021, doi: 10.1136/bmj.n71.

[15] B. Kitchenham and S. Charters, “Guidelines for performing systematic literature reviews in software engineering,” 2007.

[16] J. Thomas and A. Harden, “Methods for the thematic synthesis of qualitative research in systematic reviews,” vol. 10, pp. 1–10, 2008, doi: 10.1186/1471-2288-8-45.

[17] N. Raza and F. Moazeni, “Optimal cybersecurity framework for smart water system : detection , localization and severity assessment,” Water Res., vol. 281, no. November 2024, p. 123517, 2025, doi: 10.1016/j.watres.2025.123517.

[18] P. P. Ariza-colpas et al., “SISME, estuarine monitoring system based on IoT and machine learning for the detection of salt wedge in aquifers : case study of the magdalena river estuary,” Sensors, vol. 21, no. 7, pp. 1–19, 2021, doi: 10.3390/s21072374.

[19] K. Tejaswi, M. Vikas, H. Praharsha, and P. Mandal, “Detection of pre-ictal epileptic events using a self-attention based neural network from raw neonatal EEG data,” Comput. Biol. Med., vol. 195, no. June, p. 110518, 2025, doi: 10.1016/j.compbiomed.2025.110518.

[20] C. Mataczynski, A. Kazimierska, E. Beqiri, M. Czosnyka, P. Smielewski, and M. Kasprowicz, “Interpretable model committee for monitoring and early prediction of intracranial pressure crises,” Expert Syst. Appl., vol. 265, no. April 2024, pp. 1–15, 2025, doi: 10.1016/j.eswa.2024.126001.

[21] X. Zhou, W. Hu, Z. Zhang, J. Ye, and C. Zhao, “Adaptive mutation sparrow search algorithm-elman-adaboost model for predicting the deformation of subway tunnels,” Undergr. Sp., vol. 17, pp. 320–360, 2024, doi: 10.1016/j.undsp.2023.09.014.

[22] J. Gillespie et al., “Real time anomaly detection in cold chain transportation using IoT technology,” Sustain., vol. 15, no. 3, 2023, doi: 10.3390/su15032255.

[23] W. E. I. Shang et al., “Digipyramid : a multiresolution digital twin framework for reliable logistics implementation , and intelligentization,” IEEE Access, vol. 13, no. September, pp. 159796–159811, 2025, doi: 10.1109/ACCESS.2025.3606168.

[24] M. Rinaldi, M. Caterino, S. Riemma, R. Macchiaroli, and M. Fera, “Emergency supply chain resilience enhanced through blockchain and digital twin technology,” Logistics, vol. 9, no. 1, pp. 1–24, 2025, doi: 10.3390/logistics9010043.

[25] A. Dayal, S. Bonthu, V. N. T, and P. Saripalle, “Deep learning for multi-horizon water level forecasting in KRS reservoir,” Results Eng., vol. 21, no. December 2023, pp. 1–12, 2024, doi: 10.1016/j.rineng.2024.101828.

[26] J. Sarafaraz, F. Ahmadzadeh, and J. Mahmoudi, “Predicting river water quality : an imposing engagement between machine learning and the models,” Results Eng., vol. 21, no. December 2023, pp. 1–17, 2024, doi: 10.1016/j.rineng.2024.101921.

[27] M. C. Gkikas, D. C. Gkikas, G. Vonitsanos, J. A. Theodorou, and S. Sioutas, “Application of machine learning for predictive analysis and management of Mediterranean-farmed fish mortalities : a risk management case study using apache spark,” Appl. Sci., vol. 14, no. 22, pp. 1–26, 2024, doi: 10.3390/app142210112.

[28] D. Lee et al., “Machine learning-based near-real-time monitoring of wildfire spread extent using GK2A and VIIRS,” Korean J. Remote Sens., vol. 41, no. 5, pp. 869–881, 2025, doi: 10.7780/kjrs.2025.41.5.13.

[29] A. En-nhaili, A. Hachmoud, and A. Meddaoui, “Enhancing product predictive quality control using machine learning and explainable artificial intelligence,” Data Metadata, vol. 4, pp. 1–10, 2025, doi: 10.56294/dm2025500.

[30] Aarti and S. Suhag, “Artificial Intelligence in network security : transforming defence strategies through machine learning,” J. Internet Serv. Inf. Secur., vol. 15, no. 4, pp. 539–553, 2025, doi: 10.58346/JISIS.2025.I4.039.

[31] Z. Zhou, L. Zhou, and Z. Chen, “A distributed real-time monitoring scheme for air pressure stream data based on kafka,” Appl. Sci., vol. 14, no. 12, pp. 1–17, 2024, doi: 10.3390/app14124967.

Downloads

Published

2026-04-22

Issue

Section

Articles

How to Cite

[1]
Y. Astuti, Purwanto, and A. Susanty, “Mapping the Research Domains of Digital Monitoring: A Systematic Literature Review and Taxonomy”, journalisi, vol. 8, no. 2, pp. 2117–2133, Apr. 2026, doi: 10.63158/journalisi.v8i2.1523.

Most read articles by the same author(s)