Challenges Faced by PNP in Resolving Cybercrime Cases

Authors

  • Maribel B. Fajardo De La Salle University Dasmarinas, Philippines
  • Mario N. Abragon De La Salle University Dasmarinas, Philippines
  • Lezeil Lopez Abuan De La Salle University Dasmarinas, Philippines
  • Justeofino M. Hinlayagan De La Salle University Dasmarinas, Philippines
  • Deodennis Joy Marmol De La Salle University Dasmarinas, Philippines
  • Anne B. Contreras De La Salle University Dasmarinas, Philippines
  • Rogelio Basbas Jr. De La Salle University Dasmarinas, Philippines
  • Elizabeth B. Villa De La Salle University Dasmarinas, Philippines

DOI:

https://doi.org/10.11594/ijmaber.06.03.23

Keywords:

PNP Anti-Cybercrime Group (PNP ACG), Cybercrimes, Demographic Factors

Abstract

The research examined the correlation between the level of chal-lenges faced by the PNP-ACG and various demographic factors. Addi-tionally, it examined the specific components of cybercrime offenses, which include offenses against the confidentiality, integrity, and availability of computer data and systems, as well as offenses related to computers, content, and other areas.
The findings indicated that the PNP-ACG faced roughly the same level of challenges as other law enforcement groups in the region. In-terestingly, demographic factors such as age, length of service, educa-tional attainment, and training attendance did not significantly affect the level of obstacles faced by the PNP-ACG personnel.
Moreover, the study revealed a significant relationship between the number of problems the PNP-ACG had and the types of privacy, honesty, and other crimes that happened during their digital forensic investigations and operations.
These findings suggest that the challenges faced by the PNP-ACG are more systemic in nature and not primarily driven by individual or demographic characteristics. The study ends with suggestions for how to improve the PNP-ACG in the region by doing a full organiza-tional assessment, creating a strong digital forensic management sys-tem, running programs to build people's skills, and working together with other groups to deal with the problems that were found.

Downloads

Download data is not yet available.

References

Adopted by the State Duma on May 24, 1. A. (n.d.). The Criminal Code Of The Russian Federation No. 63-Fz Of June 13, 1996. Retrieved January 17, 2021

AlZu’bi, S., Aqel, D., & Lafi, M. (2022). An intel-ligent system for blood donation process optimization - smart techniques for min-imizing blood wastages. Cluster Compu-ting, 25(5), 3617–3627. https://doi.org/10.1007/s10586-022-03594-3

AKDEMİR, N., & Bürke , B. (2020). Retrieved from International Security Congress Spe-cial Issue, 113 - 134, 28.02.2020: https://dergipark.org.tr/en/pub/gbd/issu e/52738/695956#cited_by_articles

Aqel, D., Al-Zubi, S., Mughaid, A., & Jararweh, Y. (2021). Extreme learning machine for plant diseases classification: a sustain-able approach for smart agriculture. Cluster Computing, 25(3), 2007–2020. https://doi.org/10.1007/s10586-021- 03397-y

Arifi, Dora & Arifi, Besa. (2020). Cybercrime: A Challenge to Law Enforcement. SEEU Review. 15. 42-55. 10.2478/seeur-2020-0016.

Back, S., & LaPrade, J. (2019). The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Ap-proach to Cyber Intelligence. The Inter-national Journal of Cybersecurity Intelli-gence and Cybercrime, 2(2), 1–4. https://doi.org/10.52306/02020119kdhz8339

Bahaghighat, M., Ghasemi, M., & Ozen, F. (2023). A high-accuracy phishing website detection method based on machine learning. Journal of Information Security and Applications, 77, 103553. https://doi.org/10.1016/j.jisa.2023.103553

Boussi, G. O., Gupta, H., & Hossain, S. A. (2024). A machine learning model for predicting phishing websites. International Journal of Power Electronics and Drive Sys-tems/International Journal of Electri-cal and Computer Engineering, 14(4), 4228. https://doi.org/10.11591/ijece.v14i4.pp4228-4238

CNN Philippines. (2023, September 14). Re-trieved from Around 2% of over 16,000 cybercrime cases probed led to arrests: https://www.cnnphilippines.com/news/2023/9/14/police-probe-cybercrime-cases.html

Criminal Code of the Republic of North Mace-donia. (2002). Retrieved January 15, 2021, from Official Gazette of the Repub-lic of Macedonia "No. 80/99, No. 4/2002, No. 43/2003, No. 19/2004, No. 81/2005, No. 60/06, No. 73/06, No. 7/08, No. 139 / 08, number 114/09, number 51/11, number 135/11, 185/.

Dupont, B. (2019). Enhancing the effectiveness of cybercrime prevention through policy monitoring. Journal of Crime and Justice, 42(5), 500–515. https://doi.org/10.1080/0735648X.2019.1691855

Europe, C. o. (2003, January 28). Additional Protocol to the Convention on Cyber-crime. Retrieved January 18, 2021, from Additional Protocol to the Convention on Cybercrime, concerning the criminalisa-tion of acts of a racist and xenophobic na-ture committed through computer sys-tems: www.coe.int/en/web/conventions/full-list/-/conventions/treaty/189

Europe, C. o. (2007). Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse. Lanzarote: Council of Europe, Council of Europe Treaty Series-No. 201.

German Criminal Code Strafgesetzbuch – StGB. (n.d.). Retrieved from Criminal Code in the version published on 13 November 1998 (Federal Law Gazette I, p. 3322) as last amended by Article 2 of the Act of 19 June 2019 (Federal Law Gazette I, p. 844): https://www.gesetze-im inter-net.de/englisch_stgb/englisch_stgb.html

Inquirer.net. (2023, July 21). Retrieved from CICC: Protecting the Philippines from cyber threats: https://technology.inquirer.net/126198/cicc-protects-the-philippines-from-cyber-threats

Kemp, S. (2023). Exploring public cybercrime prevention campaigns and victimi-zation of businesses: A Bayesian model averaging approach. Computers and Security, 127. https://doi.org/10.1016/j.cose.2022.103089

Kikerpill, K. (2020). The individual’s role in cybercrime prevention: internal spheres of protection and our ability to safeguard them. Kybernetes, 50(4), 1015–1026. https://doi.org/10.1108/K-06-2020-0335

Lau, F. (2017, February 27). Chapter 12 Meth-ods for correlational Studies. Handbook of eHealth Evaluation: An Evidence-based Approach - NCBI Bookshelf. https://www.ncbi.nlm.nih.gov/books/NBK481614/

Lim, J. (2021, July 20). www.techwireasia.com. Retrieved from Cybercrime is rising, and APAC users can do more to fight it: https://techwireasia.com/2021/07/cybercrime-is-rising-and-apac-users-can-do-more-to-fight-it/

Miralis, N. G., & Miralis, D. (2020, August 30). The 5 key challenges for law en-forcement in fighting cybercrime. Retrieved January 17, 2021, from Lexology: https://www.lexology.com/library/detail.aspx?g=12513d17-cff3-4d8f-b7dccd91826f05d4

Nagunwa, T., Kearney, P., & Fouad, S. (2022). A machine learning approach for detecting fast flux phishing hostnames. Journal of Information Security and Applications, 65, 103125. https://doi.org/10.1016/j.jisa.2022.103125

Philstar.com February 6, 2024 Swindling tops list of cybercrimes in Philippines — PNP chief.

Secretariat, M. o.-G. (n.d.). Criminal codes - Criminal Code of the Kingdom of Spain

(1995 as of 2013). Retrieved January 16th, 2020, from Legislationline: https://www.legislationline.org/documents/section/criminalcodes/country/2/Spain/show.

Tarun, I. M. (2018). Legal Consequences of So-cial Networking Malpractices: Users’ Per-spectives versus the Reality of Cyber-crime Prevention Act of the Philippines. Advanced Science Letters, 24(11), 8111–8114. https://doi.org/10.1166/asl.2018.12503

Thomas, M., Gupta, M. V., Rajan, V. G., Raja-lakshmi, R., Dixit, R. S., & Choudhary, S. L. (2023). Soft computing in computer net-work security protection system with machine learning based on level protec-tion in the cloud environment. Soft Com-puting. https://doi.org/10.1007/s00500-023-08395-3

UNCTAD. (2020, April 02). UNCTAD. Retrieved January 17, 2021, from Cybercrime Legislation Worldwide: https://unctad.org/page/cybercrime-legislation-worldwide

Warraich, Z., & Morsi, W. (2023). Early detec-tion of cyber–physical attacks on fast charging stations using machine learning considering vehicle-to-grid opera-tion in microgrids. Sustainable Energy Grids and Networks, 34, 101027. https://doi.org/10.1016/j.segan.2023.101027

Wyk, B. v. (2023, August 23). China’s cyber crime problem is growing. Retrieved from https://thechinaproject.com/2022/08/23/chinas-cyber-crime-problem-is-growing/

World Economic Forum. (2021, March 23). FBI report: How much internet crime cost the US in 2020. Retrieved from https://www.weforum.org/agenda/202 1/03/fbi-report-shows-that-2020-was-the-worst-year-on-record-for-internet-crime/

Downloads

Published

24-03-2025

How to Cite

Fajardo, M. B. ., Abragon, M. N. ., Abuan, L. L. ., Hinlayagan, J. M. ., Marmol, D. J. ., Contreras, A. B. ., Basbas Jr., R. ., & Villa, E. B. . (2025). Challenges Faced by PNP in Resolving Cybercrime Cases. International Journal of Multidisciplinary: Applied Business and Education Research, 6(3), 1312-1332. https://doi.org/10.11594/ijmaber.06.03.23