Main Article Content
Abstract
The research examined the correlation between the level of chal-lenges faced by the PNP-ACG and various demographic factors. Addi-tionally, it examined the specific components of cybercrime offenses, which include offenses against the confidentiality, integrity, and availability of computer data and systems, as well as offenses related to computers, content, and other areas.
The findings indicated that the PNP-ACG faced roughly the same level of challenges as other law enforcement groups in the region. In-terestingly, demographic factors such as age, length of service, educa-tional attainment, and training attendance did not significantly affect the level of obstacles faced by the PNP-ACG personnel.
Moreover, the study revealed a significant relationship between the number of problems the PNP-ACG had and the types of privacy, honesty, and other crimes that happened during their digital forensic investigations and operations.
These findings suggest that the challenges faced by the PNP-ACG are more systemic in nature and not primarily driven by individual or demographic characteristics. The study ends with suggestions for how to improve the PNP-ACG in the region by doing a full organiza-tional assessment, creating a strong digital forensic management sys-tem, running programs to build people's skills, and working together with other groups to deal with the problems that were found.
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.
References
AlZu’bi, S., Aqel, D., & Lafi, M. (2022). An intel-ligent system for blood donation process optimization - smart techniques for min-imizing blood wastages. Cluster Compu-ting, 25(5), 3617–3627. https://doi.org/10.1007/s10586-022-03594-3
AKDEMİR, N., & Bürke , B. (2020). Retrieved from International Security Congress Spe-cial Issue, 113 - 134, 28.02.2020: https://dergipark.org.tr/en/pub/gbd/issu e/52738/695956#cited_by_articles
Aqel, D., Al-Zubi, S., Mughaid, A., & Jararweh, Y. (2021). Extreme learning machine for plant diseases classification: a sustain-able approach for smart agriculture. Cluster Computing, 25(3), 2007–2020. https://doi.org/10.1007/s10586-021- 03397-y
Arifi, Dora & Arifi, Besa. (2020). Cybercrime: A Challenge to Law Enforcement. SEEU Review. 15. 42-55. 10.2478/seeur-2020-0016.
Back, S., & LaPrade, J. (2019). The Future of Cybercrime Prevention Strategies: Human Factors and A Holistic Ap-proach to Cyber Intelligence. The Inter-national Journal of Cybersecurity Intelli-gence and Cybercrime, 2(2), 1–4. https://doi.org/10.52306/02020119kdhz8339
Bahaghighat, M., Ghasemi, M., & Ozen, F. (2023). A high-accuracy phishing website detection method based on machine learning. Journal of Information Security and Applications, 77, 103553. https://doi.org/10.1016/j.jisa.2023.103553
Boussi, G. O., Gupta, H., & Hossain, S. A. (2024). A machine learning model for predicting phishing websites. International Journal of Power Electronics and Drive Sys-tems/International Journal of Electri-cal and Computer Engineering, 14(4), 4228. https://doi.org/10.11591/ijece.v14i4.pp4228-4238
CNN Philippines. (2023, September 14). Re-trieved from Around 2% of over 16,000 cybercrime cases probed led to arrests: https://www.cnnphilippines.com/news/2023/9/14/police-probe-cybercrime-cases.html
Criminal Code of the Republic of North Mace-donia. (2002). Retrieved January 15, 2021, from Official Gazette of the Repub-lic of Macedonia "No. 80/99, No. 4/2002, No. 43/2003, No. 19/2004, No. 81/2005, No. 60/06, No. 73/06, No. 7/08, No. 139 / 08, number 114/09, number 51/11, number 135/11, 185/.
Dupont, B. (2019). Enhancing the effectiveness of cybercrime prevention through policy monitoring. Journal of Crime and Justice, 42(5), 500–515. https://doi.org/10.1080/0735648X.2019.1691855
Europe, C. o. (2003, January 28). Additional Protocol to the Convention on Cyber-crime. Retrieved January 18, 2021, from Additional Protocol to the Convention on Cybercrime, concerning the criminalisa-tion of acts of a racist and xenophobic na-ture committed through computer sys-tems: www.coe.int/en/web/conventions/full-list/-/conventions/treaty/189
Europe, C. o. (2007). Council of Europe Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse. Lanzarote: Council of Europe, Council of Europe Treaty Series-No. 201.
German Criminal Code Strafgesetzbuch – StGB. (n.d.). Retrieved from Criminal Code in the version published on 13 November 1998 (Federal Law Gazette I, p. 3322) as last amended by Article 2 of the Act of 19 June 2019 (Federal Law Gazette I, p. 844): https://www.gesetze-im inter-net.de/englisch_stgb/englisch_stgb.html
Inquirer.net. (2023, July 21). Retrieved from CICC: Protecting the Philippines from cyber threats: https://technology.inquirer.net/126198/cicc-protects-the-philippines-from-cyber-threats
Kemp, S. (2023). Exploring public cybercrime prevention campaigns and victimi-zation of businesses: A Bayesian model averaging approach. Computers and Security, 127. https://doi.org/10.1016/j.cose.2022.103089
Kikerpill, K. (2020). The individual’s role in cybercrime prevention: internal spheres of protection and our ability to safeguard them. Kybernetes, 50(4), 1015–1026. https://doi.org/10.1108/K-06-2020-0335
Lau, F. (2017, February 27). Chapter 12 Meth-ods for correlational Studies. Handbook of eHealth Evaluation: An Evidence-based Approach - NCBI Bookshelf. https://www.ncbi.nlm.nih.gov/books/NBK481614/
Lim, J. (2021, July 20). www.techwireasia.com. Retrieved from Cybercrime is rising, and APAC users can do more to fight it: https://techwireasia.com/2021/07/cybercrime-is-rising-and-apac-users-can-do-more-to-fight-it/
Miralis, N. G., & Miralis, D. (2020, August 30). The 5 key challenges for law en-forcement in fighting cybercrime. Retrieved January 17, 2021, from Lexology: https://www.lexology.com/library/detail.aspx?g=12513d17-cff3-4d8f-b7dccd91826f05d4
Nagunwa, T., Kearney, P., & Fouad, S. (2022). A machine learning approach for detecting fast flux phishing hostnames. Journal of Information Security and Applications, 65, 103125. https://doi.org/10.1016/j.jisa.2022.103125
Philstar.com February 6, 2024 Swindling tops list of cybercrimes in Philippines — PNP chief.
Secretariat, M. o.-G. (n.d.). Criminal codes - Criminal Code of the Kingdom of Spain
(1995 as of 2013). Retrieved January 16th, 2020, from Legislationline: https://www.legislationline.org/documents/section/criminalcodes/country/2/Spain/show.
Tarun, I. M. (2018). Legal Consequences of So-cial Networking Malpractices: Users’ Per-spectives versus the Reality of Cyber-crime Prevention Act of the Philippines. Advanced Science Letters, 24(11), 8111–8114. https://doi.org/10.1166/asl.2018.12503
Thomas, M., Gupta, M. V., Rajan, V. G., Raja-lakshmi, R., Dixit, R. S., & Choudhary, S. L. (2023). Soft computing in computer net-work security protection system with machine learning based on level protec-tion in the cloud environment. Soft Com-puting. https://doi.org/10.1007/s00500-023-08395-3
UNCTAD. (2020, April 02). UNCTAD. Retrieved January 17, 2021, from Cybercrime Legislation Worldwide: https://unctad.org/page/cybercrime-legislation-worldwide
Warraich, Z., & Morsi, W. (2023). Early detec-tion of cyber–physical attacks on fast charging stations using machine learning considering vehicle-to-grid opera-tion in microgrids. Sustainable Energy Grids and Networks, 34, 101027. https://doi.org/10.1016/j.segan.2023.101027
Wyk, B. v. (2023, August 23). China’s cyber crime problem is growing. Retrieved from https://thechinaproject.com/2022/08/23/chinas-cyber-crime-problem-is-growing/
World Economic Forum. (2021, March 23). FBI report: How much internet crime cost the US in 2020. Retrieved from https://www.weforum.org/agenda/202 1/03/fbi-report-shows-that-2020-was-the-worst-year-on-record-for-internet-crime/