Securing Public Trust Through Blockchain Integration: The Case of the National Police Clearance System in the Philippines

Authors

  • Jhoanna Gracia M Fabro Philippine National Police
  • Solitaire M Reyes Philippine National Police
  • Arvin B Fabro Philippine National Police
  • Roque Q Gelacio United Nations Mission in South Sudan (UNMISS)
  • Gary A Reyes Philippine National Police
  • Cedric G Train Philippine National Police
  • Yolanda G Tanigue Philippine National Police
  • Alrien F Dausan De La Salle University – Dasmariñas, Graduate School

DOI:

https://doi.org/10.11594/ijmaber.06.09.37

Keywords:

Blockchain technology, Philippine National Police, National Police Clearance System, Transactional system, Availability, Security, Immutability, Transparency, Law enforcement, Technological determination, Relational database management system, Explanatory sequential method

Abstract

This study examined the use of blockchain technology in the PNP National Police Clearance System (NPCS) to improve public trust. It first assessed trust in the current Relational Database Management System (RDBMS) based on availability, security, immutability, and transparency. Using an explanatory sequential method, the research surveyed 950 applicants and 175 end-users, and conducted 20 key informant interviews. Findings showed that while the public generally trusts the RDBMS (Availability M=3.25; Security M=3.32; Immutability M=3.29; Transparency M=3.22), they also viewed challenges as serious (Availability M=2.95; Security M=2.83; Immutability M=2.79; Transparency M=2.84). Issues included limited access, weak security, data integrity problems, lack of history logs, and poor control mechanisms. Blockchain technology was recommended as an alternative (Availability M=3.18; Security M=3.23; Immutability M=3.27; Transparency M=3.21). Statistical tests revealed significant differences based on awareness, gender, occupation, application purpose, and location. Regression showed a low dependency of blockchain on RDBMS (r²=0.27), but a moderate correlation between the two (0.52, t=16.75). Overall, the study recommends adopting blockchain in the NPCS to strengthen public trust.

Downloads

Download data is not yet available.

References

Abrogar, S. (April 19, 2023). Over 1M records from NBI, PNP, other agencies leaked in massive data breach. Retrieved from https://newsinfo.inquirer.net/1758456/over-1-million-records-from-nbi-pnp-other-agencies-leaked-in-huge-data-breach

AWS. (n.d.). UnionBank & Consensys – Using blockchain to boost financial inclusivity across the Philippines. AWS Partner Net-work Blog. Retrieved September 3, 2023 from https://aws.amazon.com/partners/success/uniobank/#:~:text=The%20Intersection%20of%20Blockchain%20%26%20Banking,and%20inclusivity%20in%20the%20Philippines

ACG Report, (2023). Conference Meeting on January 25, 2023, Comments on the Rec-ommendation of Re-Opening of CRMIS

APNIC (2021). Asia-Pacific internet registry APNIC says WHOIS admin passwords were mistakenly exposed for three months. Retrieved from https://portswigger.net/daily-swig/asia-pacific-internet-registry-apnic-says-whois-admin-passwords-were-mistakenly-exposed-for-three-months

Bannister, A. (2022, January 21). Was COME-LEC hacked? Philippines Commission on Elections casts doubt on data breach claims. The Daily Swig. Retrieved from https://portswigger.net/daily-swig/was-comelec-hacked-philippines-commission-on-elections-casts-doubt-on-data-breach-claims

Batubara, F. R., Ubacht, J., & Janssen, M. (2019, June). Unraveling transparency and ac-countability in blockchain. In Y.-C. Chen, F. Salem, & A. Zuiderwjik (Eds.), Proceed-ings of the 20th Annual International Conference on Digital Government Re-search (pp. 204-213). ACM. https://doi.org/10.1145/3325112.3325262

Bhawana, Kumar, S., Rathore, R. S., Mahmud, M., Kaiwartya, O., & Lloret, J. (2022). BEST—Blockchain-Enabled Secure and Trusted Public Emergency Services for Smart

Cities Environment. Sensors, 22(15), 5733. https://doi.org/10.3390/s155733

Bhoyar, N. G. (2022). A Case Study of RDBMS and OODBMS: Importance in Business. In-ternational Journal of Research in Engi-neering, Science and Management, 5(11), 1-6

Bluepoint Foundation (2023). Bluepoint Foun-dation, Retrieved August 15, 2023, from https://bluepoint.foundation/

Bongo, M. F., & Culaba, A. B. (2019, Novem-ber). Blockchain technology in the Phil-ippines: Status, trends, and ways forward. In 2019 IEEE 11th International Confer-ence on Humanoid, Nanotechnology, In-formation Technology, Communication and Control, Environment, and Manage-ment (HNICEM) (pp. 1-8). IEEE. https://doi.org/10.1109/HNICEM48295.2019.90703349

Brusca, I., Manes Rossi, F., & Aversano, N. (2018). Accountability and transparency to fight against corruption: An interna-tional comparative analysis. Journal of Comparative Policy Analysis: Research and Practice, 20(5), 486-504. https://doi.org/10.10.1080/13876988.2017.1393951

Cabugwang, K. A. F., Enriquez, R.C.K., Villabro-za, E.E., & Pulmano, C.E. (2023). Towards the development of a blockchain system for Philippine government processes for enhanced transparency and verifiability. Procedia Computer Science (Vol. 219, pp 107-114). https://doi.org/10.1016/j.procs.2023.01.270

Dafoe, A. (2015). On technological determin-ism: A typology, scope conditions, and a mechanism. Science, Technology, & Hu-man Values, 40(6), 1047-1076. https://doi.org/10.1177/0162243915579283

De Dios, E. S., & Ferrer, R. D. (2001). Corrup-tion in the Philippines: Framework and context. Public Policy, 5(1), 1-42. Univer-sity of the Philippines Center for Integra-tive and Development Studies. Retrieved from https:/cids.up.edu.ph/download/corruption-philippines-framework-context/July 23,2023

Dhande, M., Mehta, B., Panchal, M., & Trivedi, S. (2020). E-Crime Management for Trust Building. International Research Journal of Engineering and Technology (IRJET), 7(5)

El Khatib, M., Al Mulla, A., & Al Ketbi, W. (2022). The Role of Blockchain in E- Gov-ernance and Decision-Making in Project and Program Management. Advances in Internet of Things, 12(3), 88-109. https://doi.org/10.4236/ait.2022.123006

Gillis, A. S. & Brush, K. (2024). What is an RDBMS (Relational Database Manage-ment System)? Tech Target. Retrieved Ju-ly 28, 2023 from https://www.techtarget.com/searchdatamangement/definition/rdbms-relational-database-management-system

Golosova, J., & Romanovs, A. (2018, Novem-ber). The advantages and disadvantages of the blockchain technology. In 2018 IEEE 6th Workshop on Advances in In-formation, Electronic and Electrical En-gineering (AIEEE) (pp. 1-6). IEEE. https://doi.org/10.1109/AIEEE.2018.8592253

Haworth-Elsayed, J. (2019, January 21). Filipi-no pawn shop breach leaks 900k clients’ data. The Daily Swig (PortSwigger). Re-trieved from https://portswigger.net/daily-swig/filipino-pawn-shop-breach-leaks-900k-clients-data

Heimdall (2023). Sobre a Heimdall. Retrieved September 5, 2023, from https://ph.linkedin.com/company/heimdall-digital?trk=public_profile_topcard-current-company

Hellani, H., Sliman, L., Samhat, A. E., & Exposi-to, E. (2021). On blockchain integration with supply chain: Overview on data transparency. Logistics, 5(3), 46. https://doi.org/10.3390/logistics5030046

Hingorani, I; Khara, R.; Pomendkar, D.; Raul, N. (2020). Police Complaint Management System using Blockchain Technology. In 2020 3rd International Conference on In-telligent Sustainable Systems (ICISS) (pp. 1214-1219). IEEE. https://doi.org/ 10.1109/ICISS49785.2020.9315884

Howcroft, D. & Taylor, P. (2022). Automation and the future of work: A social shaping of technology approach. New Technolo-gy, Work and Employment, 38(2), 351-370. https://doi.org/10.1111/ntwe.12240

Huang, H., Shen, B., Zhong, L., & Zhou, Y. (2023, January). Protecting data integrity of web applications with database con-straints inferred from application code. In Proceedings of the 28th ACM Interna-tional Conference on Architectural Sup-port for Programming Languages and Operating Systems (ASPLOS ’23) (Vol. 2, pp. 632-645. Association for Computing Machinery. https://doi.org/10.1145/3575693.3575699

IBM (n.d.). What is blockchain technology? How blockchain works. IBM. Retrieved September 10, 2023 from https://ibm.com/topics/blockchain

Kaspersky (n.d.). What is smishing and how to defend it. Kaspersky Resource Center. Retrieved August 26, 2024 from https://www.kaspersky.com/resource-center/threats/what-is-smishing-and-how- to-defend-against-it/

Kushwaha, S. S., Joshi, S., Singh, D., Kaur, M., & Lee, H. N. (2022). Ethereum smart con-tract analysis tools: A systematic review. IEEE Access, 10, 57037-57062. https://doi.org/10.1109/ACCESS.2022.3169902

Landerreche, E., & Stevens, M. (2018, May). On immutability of blockchains. In W. Prinx & P. Hoschka (Eds.), Proceedings of the 1st ERCIM Blockchain Workshop. Euro-pean Society for Socially Embedded Technologies. https://doi.org/10.18420/blockchain2018_04

Liu, D., Zhang, Y., Jia, D., Zhang, Q., Zhao, X., & Rong, H. (2022). Toward secure distrib-uted data storage with error locating in blockchain enabled edge computing. Computer Standards & Interfaces, 79, 103560. https://doi.org/10.1016/j.csi.2021.103560

Martin, L. (2023). Blockchain vs. relational da-tabase: Which is right for your applica-tion? TechBeacon. Retrieved August 18, 2023 from https://techbeacon.com/security/blockchain-vs-relational-database-which-right-your-application

McBee, M. P., & Wilcox, C. (2020). Blockchain technology: Principles and applications in medical imaging. Journal of Digital Imag-ing, 33(3), 726-734. https://doi.org/10.1007/s10278-019-00310-3

McGregor, A., (2021, March 1). A journey through the ages. Retrieved from https://www.capita.com/our-thinking/evolution-of-data-policing

Mislos, M. (2023, September 21). Department of Budget and Management launches blockchain project with Bayanichain. Bit-Pinas. Retrieved September 1, 2023 from https://bitpinas.com/business/budget-department-bayanichain-blockchain-project/

Momani, A. M. (2020). The unified theory of acceptance and use of technology: A new approach in technology acceptance. In-ternational Journal of Sociotechnology and Knowledge Development (IJSKD), 12(3), 79-98. https://doi.org/10.4018/IJSKD.2020070105

Nakamoto, S. (2008, October 31). Bitcoin: A Peer-to-Peer Electronic Cash System. Re-trieved August 16, 2023, from https://bitcoin.org/bitcoin.pdf

Oesch, S., & Ruoti, S. (2020, August). That was then, this is now: A security evaluation of password generation, storage, and au-tofill in browser-based password manag-ers. In Proceedings of the 29th USENIX Conference on Security Symposium (pp. 2165-2182). USENIX Association. Re-trieved July 20, 2023, from https://www.usenix.org/conference/usenixsecurity20/presentation/oesch

Philippine National Police (2019). PNP PA-TROL Plan 2030. Retrieved September 5, 2023, from https://www.pnp.gov.ph/images/Announcement/2019/PATROL_PLAN_2030.pdf

Philippine National Police. Directorate for In-formation and Communications Technol-ogy Management. (2018, November 5). Approved PNP ICT Master Plan (SMART Policing) for the period CY 2020 to CY 2025 [Memorandum]. Philippine Nation-al Police. Retrieved August 9, 2023, from https://www.scribd.com/document/837652755/Approved-PNP-ICT-Master-Plan-SMART-Policing-1

Philippine Statistics Authority (2022). Crime statistics. Retrieved from https://psa.gov.ph/content/crime-statistics-O

Pink, S., Lanzeni, D., Horst, H. 2018. Data anxi-eties: finding trust in everyday digital mess. Big Data Soc. 5 (1), 1–10. https://doi.org/10.1177/2053951718756685

Philippine National Police. (2018, November 16). PNP ICT Master Plan (SMART Polic-ing) [Memorandum]. Referenced in PNP Memorandum Circular No. 2022 – 135

Philippine National Police. (2022, April 18) Revised Guidelines and Procedures in the Implementation of the National Police Clearance System

Philippine National Police. (2021). Privacy Management Program, Guidelines and Procedures in Compliance with Data Pri-vacy Act of 2012. (Memorandum Circular No. 2021-179). Retrieved from https://www.scribd.com/document/770719788/MC-2021-179-Privacy-Management-Program-Guidelines-and-Procedures-in-Compliance-with-Data-Privacy-Act-of-2012

Purdue Global (2018, April 9). Criminal Justice: The Growing Role of Technology in the Criminal Justice Field. Purdue Global. https://www.purdueglobal.edu/blog/criminal-justice/growing-role-technology- criminal-justice/

Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., & Fang, B. (2020). A survey on access control in the age of internet of things. IEEE Internet of Things Journal, 7(6), 4682-4696. https://doi.org/10.1109/JIOT.2020.2978707

Ronda, R. A. (2023, October 12). After Phil-Health, PSA suffers data breach. The Phil-ippine Star. https://www.philstar.com/headlines/2023/10/12/2303082/after-philhealth-psa-suffers-data-breach

Rovnyagin, M. M., Dmitriev, S. O., Hrapov, A. S., Maksutov, A. A., & Turovskiy, I. A. (2021). Database Storage Format for High Per-formance Analytics of Immutable Data. In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus) (pp. 618-622). IEEE. https://doi.org/10.1109/EIConRus51938.2021.9396453

Sadiku, M. N. O.; Alam, S. & Musa, S. M. (2017). Information assurance benefits and chal-lenges: An Introduction. Information and Security: An International Journal, (36). https://doi: 10.11610/isij.3604

Schuhknecht, F., & Jörz, S. (2022). The Easiest Way of Turning your Relational Database into a Blockchain — and the Cost of Do-ing So. Journal of Blockchain Technology. https://doi.org/10.48550/arXiv.2210.04484

Shang, Q. & Price, A. (2019). A blockchain-based land titling project in the Republic of Georgia: rebuilding public trust and lessons for future pilot projects. Innova-tions: Technology, Governance, Globali-zation, 12(3-4): 72–78. https://doi.org/10.1162/inov_a_00276

Sharma, Y., & Sharma, Y. (2019). Case study of traditional RDBMS and NoSQL database system. International Journal of Research Granthaalayah, 7, 351- 359. https://doi.org/10.29121/granthaalayah.v7.i7.2019.777

Shay, R., Blumenthal, U., Gadepally, V., Hamlin, A., Mitchell, J. D., & Cunningham, R. K. (2019). Don't even ask: Database access control through query control. ACM SIG-MOD Record, 47(3), 17-22. https://doi.org/10.1145/3316416.3316420

Shin. D. D. H. (2019). Blockchain: The emerg-ing technology of digital trust. Telematics and Informatics, 45, 101278. https://doi.org/10.1016/j.tele.2019.101278

Stephen, R., & Alex, A. (2018, August). A re-view on blockchain security. In IOP con-ference series: materials science and en-gineering (Vol. 396, No. 1, p. 012030). IOP Publishing. https://doi.org/10.1088/1757-899X/396/1/012030

Stonebraker, M., Madden, S., Abadi, D. J., Hari-zopoulos, S., Hachem, N., & Helland, P. (2018). The end of an architectural era: It's time for a complete rewrite. In M. Stonebraker & U. Cetintenel (Eds.), Mak-ing Databases Work: The Pragmatic Wis-dom of Michael Stonebraker (pp. 463-489). ACM Books. https://doi.org/10.1145/3226595.3226637

The Asia Foundation (2022, March). Cyberse-curity in the Philippines: Global Context and Local Challenges. https://asiafoundation.org/wp-con-tent/uploads/2022/03/Cybersecurity-in-the-Philippines-Global-Context-and-Local-Challenges-.pdf

White, S. K. (2021). What is CMMI? A model for optimizing development processes. CIO. Retrieved from https://www.cio.com/article/274530/process-improvement-capability-maturity-model-integration-cmmi-definition-and-solutions.html

Yavaprabhas, K., Pournader, M., & Seuring, S. (2023). Blockchain as the “trust-building machine” for supply chain management. Annals of operations research, 327(1), 49-88. https://doi.org/10.1007/s10479-022-04868-0

Zaeid, H. F. (2016). Technological determin-ism: A critique. Global Journal of Human-Social Science: G Linguistics & Education, 16(3), 7-13

Zeb, A. (2018). Security of Relational Database Management System: Threats and Securi-ty Techniques. Scribd. https://www.scribd.com/document/725019356/Security-of-Relational-Database-Management-System

Zhang, Y., Li, B., Wu, J., Liu, B., Chen, R., & Chang, J. (2022). Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT. IEEE Internet of Things Journal, 9(22), 22501-22515. https://doi.org/10.1109/JIOT.2022.3192488.

Downloads

Published

2025-09-23

How to Cite

Fabro, J. G. M. ., Reyes, S. M., Fabro, A. B., Gelacio, R. Q. ., Reyes, G. A. ., Train, C. G. ., Tanigue, Y. G. ., & Dausan, A. F. (2025). Securing Public Trust Through Blockchain Integration: The Case of the National Police Clearance System in the Philippines. International Journal of Multidisciplinary: Applied Business and Education Research, 6(9), 4719-4760. https://doi.org/10.11594/ijmaber.06.09.37