Challenges Faced by PNP in Resolving Cybercrime Cases
Maribel B. Fajardo | Mario N. Abragon | Lezeil Lopez Abuan | Justeofino M. Hinlayagan | Deodennis Joy Marmol | Anne B. Contreras | Rogelio Basbas Jr. | Elizabeth Villa
Discipline: Social Sciences
Abstract:
The research examined the correlation between the level of challenges faced by the PNP-ACG and various demographic factors. Additionally, it examined the specific components of cybercrime offenses,
which include offenses against the confidentiality, integrity, and availability of computer data and systems, as well as offenses related to
computers, content, and other areas.
The findings indicated that the PNP-ACG faced roughly the same
level of challenges as other law enforcement groups in the region. Interestingly, demographic factors such as age, length of service, educational attainment, and training attendance did not significantly affect
the level of obstacles faced by the PNP-ACG personnel.
Moreover, the study revealed a significant relationship between the
number of problems the PNP-ACG had and the types of privacy, honesty, and other crimes that happened during their digital forensic investigations and operations.
These findings suggest that the challenges faced by the PNP-ACG are
more systemic in nature and not primarily driven by individual or demographic characteristics. The study ends with suggestions for how to
improve the PNP-ACG in the region by doing a full organizational assessment, creating a strong digital forensic management system, running programs to build people's skills, and working together with other
groups to deal with the problems that were found.
References:
- Adopted by the State Duma on May 24. (n.d.). The Criminal Code Of The Russian Federation No. 63-Fz Of June 13, 1996. Retrieved January 17, 2021.
- AKDEMİR, N., & Bürke, B. (2020). International Security Congress Special Issue, 113–134. Retrieved from https://dergipark.org.tr/en/pub/gbd/issue/52738/695956#cited_by_articles
- AlZu’bi, S., Aqel, D., & Lafi, M. (2022). An intelligent system for blood donation process optimization—Smart techniques for minimizing blood wastages. Cluster Computing, 25(5), 3617–3627. https://doi.org/10.1007/s10586-022-03594-3
- Aqel, D., Al-Zubi, S., Mughaid, A., & Jararweh, Y. (2021). Extreme learning machine for plant diseases classification: A sustainable approach for smart agriculture. Cluster Computing, 25(3), 2007–2020. https://doi.org/10.1007/s10586-021-03397-y
- Arifi, D., & Arifi, B. (2020). Cybercrime: A Challenge to Law Enforcement. SEEU Review, 15, 42–55. https://doi.org/10.2478/seeur-2020-0016
- Back, S., & LaPrade, J. (2019). The future of cybercrime prevention strategies: Human factors and a holistic approach to cyber intelligence. The International Journal of Cybersecurity Intelligence and Cybercrime, 2(2), 1–4. https://doi.org/10.52306/02020119kdhz8339
- Bahaghighat, M., Ghasemi, M., & Ozen, F. (2023). A high-accuracy phishing website detection method based on machine learning. Journal of Information Security and Applications, 77, 103553. https://doi.org/10.1016/j.jisa.2023.103553
- Boussi, G. O., Gupta, H., & Hossain, S. A. (2024). A machine learning model for predicting phishing websites. International Journal of Electrical and Computer Engineering, 14(4), 4228–4238. https://doi.org/10.11591/ijece.v14i4.pp4228-4238
- CNN Philippines. (2023, September 14). Around 2% of over 16,000 cybercrime cases probed led to arrests. Retrieved from https://www.cnnphilippines.com/news/2023/9/14/police-probe-cybercrime-cases.html
- Criminal Code of the Republic of North Macedonia. (2002). Retrieved January 15, 2021, from Official Gazette of the Republic of Macedonia.
- Dupont, B. (2019). Enhancing the effectiveness of cybercrime prevention through policy monitoring. Journal of Crime and Justice, 42(5), 500–515. https://doi.org/10.1080/0735648X.2019.1691855
- Europe, C. o. (2003, January 28). Additional Protocol to the Convention on Cybercrime. Retrieved from https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/189
- Europe, C. o. (2007). Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse. Lanzarote.
- German Criminal Code Strafgesetzbuch – StGB. (n.d.). Retrieved from https://www.gesetze-im-internet.de/englisch_stgb/englisch_stgb.html
- Inquirer.net. (2023, July 21). CICC: Protecting the Philippines from cyber threats. Retrieved from https://technology.inquirer.net/126198/cicc-protects-the-philippines-from-cyber-threats
- Kemp, S. (2023). Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach. Computers and Security, 127. https://doi.org/10.1016/j.cose.2022.103089
- Kikerpill, K. (2020). The individual’s role in cybercrime prevention: Internal spheres of protection and our ability to safeguard them. Kybernetes, 50(4), 1015–1026. https://doi.org/10.1108/K-06-2020-0335
- Lau, F. (2017, February 27). Chapter 12: Methods for correlational studies. Handbook of eHealth Evaluation. https://www.ncbi.nlm.nih.gov/books/NBK481614/
- Lim, J. (2021, July 20). Cybercrime is rising, and APAC users can do more to fight it. Retrieved from https://techwireasia.com/2021/07/cybercrime-is-rising-and-apac-users-can-do-more-to-fight-it/
- Miralis, N. G., & Miralis, D. (2020, August 30). The 5 key challenges for law enforcement in fighting cybercrime. Retrieved from https://www.lexology.com/library/detail.aspx?g=12513d17-cff3-4d8f-b7dc-cd91826f05d4
- Nagunwa, T., Kearney, P., & Fouad, S. (2022). A machine learning approach for detecting fast flux phishing hostnames. Journal of Information Security and Applications, 65, 103125. https://doi.org/10.1016/j.jisa.2022.103125
- Philstar.com. (2024, February 6). Swindling tops list of cybercrimes in Philippines — PNP chief.
- Secretariat, M. o.-G. (n.d.). Criminal Code of the Kingdom of Spain (1995 as of 2013). Retrieved from https://www.legislationline.org/documents/section/criminalcodes/country/2/Spain/show
- Tarun, I. M. (2018). Legal consequences of social networking malpractices: Users’ perspectives versus the reality of Cybercrime Prevention Act of the Philippines. Advanced Science Letters, 24(11), 8111–8114. https://doi.org/10.1166/asl.2018.12503
- Thomas, M., Gupta, M. V., Rajan, V. G., Rajalakshmi, R., Dixit, R. S., & Choudhary, S. L. (2023). Soft computing in computer network security protection system with machine learning based on level protection in the cloud environment. Soft Computing. https://doi.org/10.1007/s00500-023-08395-3
- UNCTAD. (2020, April 2). Cybercrime legislation worldwide. Retrieved from https://unctad.org/page/cybercrime-legislation-worldwide
- Warraich, Z., & Morsi, W. (2023). Early detection of cyber–physical attacks on fast charging stations using machine learning considering vehicle-to-grid operation in microgrids. Sustainable Energy Grids and Networks, 34, 101027. https://doi.org/10.1016/j.segan.2023.101027
- Wyk, B. v. (2023, August 23). China’s cyber crime problem is growing. Retrieved from https://thechinaproject.com/2022/08/23/chinas-cyber-crime-problem-is-growing/.
- World Economic Forum. (2021, March 23). FBI report: How much internet crime cost the US in 2020. Retrieved from https://www.weforum.org/agenda/2021/03/fbi-report-shows-that-2020-was-the-worst-year-on-record-for-internet-crime/