Securing Public Trust Through Blockchain Integration: The Case of the National Police Clearance System in the Philippines
DOI:
https://doi.org/10.11594/ijmaber.06.09.37Keywords:
Blockchain technology, Philippine National Police, National Police Clearance System, Transactional system, Availability, Security, Immutability, Transparency, Law enforcement, Technological determination, Relational database management system, Explanatory sequential methodAbstract
This study examined the use of blockchain technology in the PNP National Police Clearance System (NPCS) to improve public trust. It first assessed trust in the current Relational Database Management System (RDBMS) based on availability, security, immutability, and transparency. Using an explanatory sequential method, the research surveyed 950 applicants and 175 end-users, and conducted 20 key informant interviews. Findings showed that while the public generally trusts the RDBMS (Availability M=3.25; Security M=3.32; Immutability M=3.29; Transparency M=3.22), they also viewed challenges as serious (Availability M=2.95; Security M=2.83; Immutability M=2.79; Transparency M=2.84). Issues included limited access, weak security, data integrity problems, lack of history logs, and poor control mechanisms. Blockchain technology was recommended as an alternative (Availability M=3.18; Security M=3.23; Immutability M=3.27; Transparency M=3.21). Statistical tests revealed significant differences based on awareness, gender, occupation, application purpose, and location. Regression showed a low dependency of blockchain on RDBMS (r²=0.27), but a moderate correlation between the two (0.52, t=16.75). Overall, the study recommends adopting blockchain in the NPCS to strengthen public trust.
Downloads
References
Abrogar, S. (April 19, 2023). Over 1M records from NBI, PNP, other agencies leaked in massive data breach. Retrieved from https://newsinfo.inquirer.net/1758456/over-1-million-records-from-nbi-pnp-other-agencies-leaked-in-huge-data-breach
AWS. (n.d.). UnionBank & Consensys – Using blockchain to boost financial inclusivity across the Philippines. AWS Partner Net-work Blog. Retrieved September 3, 2023 from https://aws.amazon.com/partners/success/uniobank/#:~:text=The%20Intersection%20of%20Blockchain%20%26%20Banking,and%20inclusivity%20in%20the%20Philippines
ACG Report, (2023). Conference Meeting on January 25, 2023, Comments on the Rec-ommendation of Re-Opening of CRMIS
APNIC (2021). Asia-Pacific internet registry APNIC says WHOIS admin passwords were mistakenly exposed for three months. Retrieved from https://portswigger.net/daily-swig/asia-pacific-internet-registry-apnic-says-whois-admin-passwords-were-mistakenly-exposed-for-three-months
Bannister, A. (2022, January 21). Was COME-LEC hacked? Philippines Commission on Elections casts doubt on data breach claims. The Daily Swig. Retrieved from https://portswigger.net/daily-swig/was-comelec-hacked-philippines-commission-on-elections-casts-doubt-on-data-breach-claims
Batubara, F. R., Ubacht, J., & Janssen, M. (2019, June). Unraveling transparency and ac-countability in blockchain. In Y.-C. Chen, F. Salem, & A. Zuiderwjik (Eds.), Proceed-ings of the 20th Annual International Conference on Digital Government Re-search (pp. 204-213). ACM. https://doi.org/10.1145/3325112.3325262
Bhawana, Kumar, S., Rathore, R. S., Mahmud, M., Kaiwartya, O., & Lloret, J. (2022). BEST—Blockchain-Enabled Secure and Trusted Public Emergency Services for Smart
Cities Environment. Sensors, 22(15), 5733. https://doi.org/10.3390/s155733
Bhoyar, N. G. (2022). A Case Study of RDBMS and OODBMS: Importance in Business. In-ternational Journal of Research in Engi-neering, Science and Management, 5(11), 1-6
Bluepoint Foundation (2023). Bluepoint Foun-dation, Retrieved August 15, 2023, from https://bluepoint.foundation/
Bongo, M. F., & Culaba, A. B. (2019, Novem-ber). Blockchain technology in the Phil-ippines: Status, trends, and ways forward. In 2019 IEEE 11th International Confer-ence on Humanoid, Nanotechnology, In-formation Technology, Communication and Control, Environment, and Manage-ment (HNICEM) (pp. 1-8). IEEE. https://doi.org/10.1109/HNICEM48295.2019.90703349
Brusca, I., Manes Rossi, F., & Aversano, N. (2018). Accountability and transparency to fight against corruption: An interna-tional comparative analysis. Journal of Comparative Policy Analysis: Research and Practice, 20(5), 486-504. https://doi.org/10.10.1080/13876988.2017.1393951
Cabugwang, K. A. F., Enriquez, R.C.K., Villabro-za, E.E., & Pulmano, C.E. (2023). Towards the development of a blockchain system for Philippine government processes for enhanced transparency and verifiability. Procedia Computer Science (Vol. 219, pp 107-114). https://doi.org/10.1016/j.procs.2023.01.270
Dafoe, A. (2015). On technological determin-ism: A typology, scope conditions, and a mechanism. Science, Technology, & Hu-man Values, 40(6), 1047-1076. https://doi.org/10.1177/0162243915579283
De Dios, E. S., & Ferrer, R. D. (2001). Corrup-tion in the Philippines: Framework and context. Public Policy, 5(1), 1-42. Univer-sity of the Philippines Center for Integra-tive and Development Studies. Retrieved from https:/cids.up.edu.ph/download/corruption-philippines-framework-context/July 23,2023
Dhande, M., Mehta, B., Panchal, M., & Trivedi, S. (2020). E-Crime Management for Trust Building. International Research Journal of Engineering and Technology (IRJET), 7(5)
El Khatib, M., Al Mulla, A., & Al Ketbi, W. (2022). The Role of Blockchain in E- Gov-ernance and Decision-Making in Project and Program Management. Advances in Internet of Things, 12(3), 88-109. https://doi.org/10.4236/ait.2022.123006
Gillis, A. S. & Brush, K. (2024). What is an RDBMS (Relational Database Manage-ment System)? Tech Target. Retrieved Ju-ly 28, 2023 from https://www.techtarget.com/searchdatamangement/definition/rdbms-relational-database-management-system
Golosova, J., & Romanovs, A. (2018, Novem-ber). The advantages and disadvantages of the blockchain technology. In 2018 IEEE 6th Workshop on Advances in In-formation, Electronic and Electrical En-gineering (AIEEE) (pp. 1-6). IEEE. https://doi.org/10.1109/AIEEE.2018.8592253
Haworth-Elsayed, J. (2019, January 21). Filipi-no pawn shop breach leaks 900k clients’ data. The Daily Swig (PortSwigger). Re-trieved from https://portswigger.net/daily-swig/filipino-pawn-shop-breach-leaks-900k-clients-data
Heimdall (2023). Sobre a Heimdall. Retrieved September 5, 2023, from https://ph.linkedin.com/company/heimdall-digital?trk=public_profile_topcard-current-company
Hellani, H., Sliman, L., Samhat, A. E., & Exposi-to, E. (2021). On blockchain integration with supply chain: Overview on data transparency. Logistics, 5(3), 46. https://doi.org/10.3390/logistics5030046
Hingorani, I; Khara, R.; Pomendkar, D.; Raul, N. (2020). Police Complaint Management System using Blockchain Technology. In 2020 3rd International Conference on In-telligent Sustainable Systems (ICISS) (pp. 1214-1219). IEEE. https://doi.org/ 10.1109/ICISS49785.2020.9315884
Howcroft, D. & Taylor, P. (2022). Automation and the future of work: A social shaping of technology approach. New Technolo-gy, Work and Employment, 38(2), 351-370. https://doi.org/10.1111/ntwe.12240
Huang, H., Shen, B., Zhong, L., & Zhou, Y. (2023, January). Protecting data integrity of web applications with database con-straints inferred from application code. In Proceedings of the 28th ACM Interna-tional Conference on Architectural Sup-port for Programming Languages and Operating Systems (ASPLOS ’23) (Vol. 2, pp. 632-645. Association for Computing Machinery. https://doi.org/10.1145/3575693.3575699
IBM (n.d.). What is blockchain technology? How blockchain works. IBM. Retrieved September 10, 2023 from https://ibm.com/topics/blockchain
Kaspersky (n.d.). What is smishing and how to defend it. Kaspersky Resource Center. Retrieved August 26, 2024 from https://www.kaspersky.com/resource-center/threats/what-is-smishing-and-how- to-defend-against-it/
Kushwaha, S. S., Joshi, S., Singh, D., Kaur, M., & Lee, H. N. (2022). Ethereum smart con-tract analysis tools: A systematic review. IEEE Access, 10, 57037-57062. https://doi.org/10.1109/ACCESS.2022.3169902
Landerreche, E., & Stevens, M. (2018, May). On immutability of blockchains. In W. Prinx & P. Hoschka (Eds.), Proceedings of the 1st ERCIM Blockchain Workshop. Euro-pean Society for Socially Embedded Technologies. https://doi.org/10.18420/blockchain2018_04
Liu, D., Zhang, Y., Jia, D., Zhang, Q., Zhao, X., & Rong, H. (2022). Toward secure distrib-uted data storage with error locating in blockchain enabled edge computing. Computer Standards & Interfaces, 79, 103560. https://doi.org/10.1016/j.csi.2021.103560
Martin, L. (2023). Blockchain vs. relational da-tabase: Which is right for your applica-tion? TechBeacon. Retrieved August 18, 2023 from https://techbeacon.com/security/blockchain-vs-relational-database-which-right-your-application
McBee, M. P., & Wilcox, C. (2020). Blockchain technology: Principles and applications in medical imaging. Journal of Digital Imag-ing, 33(3), 726-734. https://doi.org/10.1007/s10278-019-00310-3
McGregor, A., (2021, March 1). A journey through the ages. Retrieved from https://www.capita.com/our-thinking/evolution-of-data-policing
Mislos, M. (2023, September 21). Department of Budget and Management launches blockchain project with Bayanichain. Bit-Pinas. Retrieved September 1, 2023 from https://bitpinas.com/business/budget-department-bayanichain-blockchain-project/
Momani, A. M. (2020). The unified theory of acceptance and use of technology: A new approach in technology acceptance. In-ternational Journal of Sociotechnology and Knowledge Development (IJSKD), 12(3), 79-98. https://doi.org/10.4018/IJSKD.2020070105
Nakamoto, S. (2008, October 31). Bitcoin: A Peer-to-Peer Electronic Cash System. Re-trieved August 16, 2023, from https://bitcoin.org/bitcoin.pdf
Oesch, S., & Ruoti, S. (2020, August). That was then, this is now: A security evaluation of password generation, storage, and au-tofill in browser-based password manag-ers. In Proceedings of the 29th USENIX Conference on Security Symposium (pp. 2165-2182). USENIX Association. Re-trieved July 20, 2023, from https://www.usenix.org/conference/usenixsecurity20/presentation/oesch
Philippine National Police (2019). PNP PA-TROL Plan 2030. Retrieved September 5, 2023, from https://www.pnp.gov.ph/images/Announcement/2019/PATROL_PLAN_2030.pdf
Philippine National Police. Directorate for In-formation and Communications Technol-ogy Management. (2018, November 5). Approved PNP ICT Master Plan (SMART Policing) for the period CY 2020 to CY 2025 [Memorandum]. Philippine Nation-al Police. Retrieved August 9, 2023, from https://www.scribd.com/document/837652755/Approved-PNP-ICT-Master-Plan-SMART-Policing-1
Philippine Statistics Authority (2022). Crime statistics. Retrieved from https://psa.gov.ph/content/crime-statistics-O
Pink, S., Lanzeni, D., Horst, H. 2018. Data anxi-eties: finding trust in everyday digital mess. Big Data Soc. 5 (1), 1–10. https://doi.org/10.1177/2053951718756685
Philippine National Police. (2018, November 16). PNP ICT Master Plan (SMART Polic-ing) [Memorandum]. Referenced in PNP Memorandum Circular No. 2022 – 135
Philippine National Police. (2022, April 18) Revised Guidelines and Procedures in the Implementation of the National Police Clearance System
Philippine National Police. (2021). Privacy Management Program, Guidelines and Procedures in Compliance with Data Pri-vacy Act of 2012. (Memorandum Circular No. 2021-179). Retrieved from https://www.scribd.com/document/770719788/MC-2021-179-Privacy-Management-Program-Guidelines-and-Procedures-in-Compliance-with-Data-Privacy-Act-of-2012
Purdue Global (2018, April 9). Criminal Justice: The Growing Role of Technology in the Criminal Justice Field. Purdue Global. https://www.purdueglobal.edu/blog/criminal-justice/growing-role-technology- criminal-justice/
Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., & Fang, B. (2020). A survey on access control in the age of internet of things. IEEE Internet of Things Journal, 7(6), 4682-4696. https://doi.org/10.1109/JIOT.2020.2978707
Ronda, R. A. (2023, October 12). After Phil-Health, PSA suffers data breach. The Phil-ippine Star. https://www.philstar.com/headlines/2023/10/12/2303082/after-philhealth-psa-suffers-data-breach
Rovnyagin, M. M., Dmitriev, S. O., Hrapov, A. S., Maksutov, A. A., & Turovskiy, I. A. (2021). Database Storage Format for High Per-formance Analytics of Immutable Data. In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus) (pp. 618-622). IEEE. https://doi.org/10.1109/EIConRus51938.2021.9396453
Sadiku, M. N. O.; Alam, S. & Musa, S. M. (2017). Information assurance benefits and chal-lenges: An Introduction. Information and Security: An International Journal, (36). https://doi: 10.11610/isij.3604
Schuhknecht, F., & Jörz, S. (2022). The Easiest Way of Turning your Relational Database into a Blockchain — and the Cost of Do-ing So. Journal of Blockchain Technology. https://doi.org/10.48550/arXiv.2210.04484
Shang, Q. & Price, A. (2019). A blockchain-based land titling project in the Republic of Georgia: rebuilding public trust and lessons for future pilot projects. Innova-tions: Technology, Governance, Globali-zation, 12(3-4): 72–78. https://doi.org/10.1162/inov_a_00276
Sharma, Y., & Sharma, Y. (2019). Case study of traditional RDBMS and NoSQL database system. International Journal of Research Granthaalayah, 7, 351- 359. https://doi.org/10.29121/granthaalayah.v7.i7.2019.777
Shay, R., Blumenthal, U., Gadepally, V., Hamlin, A., Mitchell, J. D., & Cunningham, R. K. (2019). Don't even ask: Database access control through query control. ACM SIG-MOD Record, 47(3), 17-22. https://doi.org/10.1145/3316416.3316420
Shin. D. D. H. (2019). Blockchain: The emerg-ing technology of digital trust. Telematics and Informatics, 45, 101278. https://doi.org/10.1016/j.tele.2019.101278
Stephen, R., & Alex, A. (2018, August). A re-view on blockchain security. In IOP con-ference series: materials science and en-gineering (Vol. 396, No. 1, p. 012030). IOP Publishing. https://doi.org/10.1088/1757-899X/396/1/012030
Stonebraker, M., Madden, S., Abadi, D. J., Hari-zopoulos, S., Hachem, N., & Helland, P. (2018). The end of an architectural era: It's time for a complete rewrite. In M. Stonebraker & U. Cetintenel (Eds.), Mak-ing Databases Work: The Pragmatic Wis-dom of Michael Stonebraker (pp. 463-489). ACM Books. https://doi.org/10.1145/3226595.3226637
The Asia Foundation (2022, March). Cyberse-curity in the Philippines: Global Context and Local Challenges. https://asiafoundation.org/wp-con-tent/uploads/2022/03/Cybersecurity-in-the-Philippines-Global-Context-and-Local-Challenges-.pdf
White, S. K. (2021). What is CMMI? A model for optimizing development processes. CIO. Retrieved from https://www.cio.com/article/274530/process-improvement-capability-maturity-model-integration-cmmi-definition-and-solutions.html
Yavaprabhas, K., Pournader, M., & Seuring, S. (2023). Blockchain as the “trust-building machine” for supply chain management. Annals of operations research, 327(1), 49-88. https://doi.org/10.1007/s10479-022-04868-0
Zaeid, H. F. (2016). Technological determin-ism: A critique. Global Journal of Human-Social Science: G Linguistics & Education, 16(3), 7-13
Zeb, A. (2018). Security of Relational Database Management System: Threats and Securi-ty Techniques. Scribd. https://www.scribd.com/document/725019356/Security-of-Relational-Database-Management-System
Zhang, Y., Li, B., Wu, J., Liu, B., Chen, R., & Chang, J. (2022). Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT. IEEE Internet of Things Journal, 9(22), 22501-22515. https://doi.org/10.1109/JIOT.2022.3192488.
Downloads
Published
Issue
Section
Categories
License
Copyright (c) 2025 Jhoanna Gracia M Fabro, Solitaire M Reyes, Arvin B Fabro, Roque Q Gelacio, Gary A Reyes, Cedric G Train, Yolanda G Tanigue, Alrien F Dausan

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See the Effect of Open Access).














