HomeInternational Journal of Multidisciplinary: Applied Business and Education Researchvol. 6 no. 9 (2025)

Securing Public Trust Through Blockchain Integration: The Case of the National Police Clearance System in the Philippines

Jhoanna Gracia Manlapaz Fabro | Solitaire M. Reyes | Arvin B. Fabro | Roque Q. Gelacio | Gary A. Reyes | Cedric G. Train | Yolanda Tanigue | Alrien F. Dausan

Discipline: combined, general or negotiated studies

 

Abstract:

This study examined the use of blockchain technology in the PNP Na-tional Police Clearance System (NPCS) to improve public trust. It first assessed trust in the current Relational Database Management System (RDBMS) based on availability, security, immutability, and transpar-ency. Using an explanatory sequential method, the research surveyed 950 applicants and 175 end-users, and conducted 20 key informant in-terviews. Findings showed that while the public generally trusts the RDBMS (Availability M=3.25; Security M=3.32; Immutability M=3.29; Transparency M=3.22), they also viewed challenges as serious (Availa-bility M=2.95; Security M=2.83; Immutability M=2.79; Transparency M=2.84). Issues included limited access, weak security, data integrity problems, lack of history logs, and poor control mechanisms. Block-chain technology was recommended as an alternative (Availability M=3.18; Security M=3.23; Immutability M=3.27; Transparency M=3.21). Statistical tests revealed significant differences based on awareness, gender, occupation, application purpose, and location. Re-gression showed a low dependency of blockchain on RDBMS (r²=0.27), but a moderate correlation between the two (0.52, t=16.75). Overall, the study recommends adopting blockchain in the NPCS to strengthen pub-lic trust.



References:

  1. Abrogar, S. (April 19, 2023). Over 1M records from NBI, PNP, other agencies leaked in massive data breach. Retrieved from https://newsinfo.inquirer.net/1758456/over-1-million-records-from-nbi-pnp-other-agencies-leaked-in-huge-data-breach
  2. AWS. (n.d.). UnionBank & Consensys – Using blockchain to boost financial inclusivity across the Philippines. AWS Partner Net-work Blog. Retrieved September 3, 2023 from https://aws.amazon.com/partners/success/uniobank/#:~:text=The%20Intersection%20of%20Blockchain%20%26%20Banking,and%20inclusivity%20in%20the%20Philippines
  3. ACG Report, (2023). Conference Meeting on January 25, 2023, Comments on the Rec-ommendation of Re-Opening of CRMIS
  4. APNIC (2021). Asia-Pacific internet registry APNIC says WHOIS admin passwords were mistakenly exposed for three months. Retrieved from https://portswigger.net/daily-swig/asia-pacific-internet-registry-apnic-says-whois-admin-passwords-were-mistakenly-exposed-for-three-months
  5. Bannister, A. (2022, January 21). Was COME-LEC hacked? Philippines Commission on Elections casts doubt on data breach claims. The Daily Swig. Retrieved from https://portswigger.net/daily-swig/was-comelec-hacked-philippines-commission-on-elections-casts-doubt-on-data-breach-claims
  6. Batubara, F. R., Ubacht, J., & Janssen, M. (2019, June). Unraveling transparency and ac-countability in blockchain. In Y.-C. Chen, F. Salem, & A. Zuiderwjik (Eds.), Proceed-ings of the 20th Annual International Conference on Digital Government Re-search (pp. 204-213). ACM. https://doi.org/10.1145/3325112.3325262
  7. Bhawana, Kumar, S., Rathore, R. S., Mahmud, M., Kaiwartya, O., & Lloret, J. (2022). BEST—Blockchain-Enabled Secure and Trusted Public Emergency Services for Smart
  8. Cities Environment. Sensors, 22(15), 5733. https://doi.org/10.3390/s155733
  9. Bhoyar, N. G. (2022). A Case Study of RDBMS and OODBMS: Importance in Business. In-ternational Journal of Research in Engi-neering, Science and Management, 5(11), 1-6
  10. Bluepoint Foundation (2023). Bluepoint Foun-dation, Retrieved August 15, 2023, from https://bluepoint.foundation/
  11. Bongo, M. F., & Culaba, A. B. (2019, Novem-ber). Blockchain technology in the Phil-ippines: Status, trends, and ways forward. In 2019 IEEE 11th International Confer-ence on Humanoid, Nanotechnology, In-formation Technology, Communication and Control, Environment, and Manage-ment (HNICEM) (pp. 1-8). IEEE. https://doi.org/10.1109/HNICEM48295.2019.90703349
  12. Brusca, I., Manes Rossi, F., & Aversano, N. (2018). Accountability and transparency to fight against corruption: An interna-tional comparative analysis. Journal of Comparative Policy Analysis: Research and Practice, 20(5), 486-504. https://doi.org/10.10.1080/13876988.2017.1393951
  13. Cabugwang, K. A. F., Enriquez, R.C.K., Villabro-za, E.E., & Pulmano, C.E. (2023). Towards the development of a blockchain system for Philippine government processes for enhanced transparency and verifiability. Procedia Computer Science (Vol. 219, pp 107-114). https://doi.org/10.1016/j.procs.2023.01.270
  14. Dafoe, A. (2015). On technological determin-ism: A typology, scope conditions, and a mechanism. Science, Technology, & Hu-man Values, 40(6), 1047-1076. https://doi.org/10.1177/0162243915579283
  15. De Dios, E. S., & Ferrer, R. D. (2001). Corrup-tion in the Philippines: Framework and context. Public Policy, 5(1), 1-42. Univer-sity of the Philippines Center for Integra-tive and Development Studies. Retrieved from https:/cids.up.edu.ph/download/corruption-philippines-framework-context/July 23,2023
  16. Dhande, M., Mehta, B., Panchal, M., & Trivedi, S. (2020). E-Crime Management for Trust Building. International Research Journal of Engineering and Technology (IRJET), 7(5)
  17. El Khatib, M., Al Mulla, A., & Al Ketbi, W. (2022). The Role of Blockchain in E- Gov-ernance and Decision-Making in Project and Program Management. Advances in Internet of Things, 12(3), 88-109. https://doi.org/10.4236/ait.2022.123006
  18. Gillis, A. S. & Brush, K. (2024). What is an RDBMS (Relational Database Manage-ment System)? Tech Target. Retrieved Ju-ly 28, 2023 from https://www.techtarget.com/searchdatamangement/definition/rdbms-relational-database-management-system
  19. Golosova, J., & Romanovs, A. (2018, Novem-ber). The advantages and disadvantages of the blockchain technology. In 2018 IEEE 6th Workshop on Advances in In-formation, Electronic and Electrical En-gineering (AIEEE) (pp. 1-6). IEEE. https://doi.org/10.1109/AIEEE.2018.8592253
  20. Haworth-Elsayed, J. (2019, January 21). Filipi-no pawn shop breach leaks 900k clients’ data. The Daily Swig (PortSwigger). Re-trieved from https://portswigger.net/daily-swig/filipino-pawn-shop-breach-leaks-900k-clients-data
  21. Heimdall (2023). Sobre a Heimdall. Retrieved September 5, 2023, from https://ph.linkedin.com/company/heimdall-digital?trk=public_profile_topcard-current-company
  22. Hellani, H., Sliman, L., Samhat, A. E., & Exposi-to, E. (2021). On blockchain integration with supply chain: Overview on data transparency. Logistics, 5(3), 46. https://doi.org/10.3390/logistics5030046
  23. Hingorani, I; Khara, R.; Pomendkar, D.; Raul, N. (2020). Police Complaint Management System using Blockchain Technology. In 2020 3rd International Conference on In-telligent Sustainable Systems (ICISS) (pp. 1214-1219). IEEE. https://doi.org/ 10.1109/ICISS49785.2020.9315884
  24. Howcroft, D. & Taylor, P. (2022). Automation and the future of work: A social shaping of technology approach. New Technolo-gy, Work and Employment, 38(2), 351-370. https://doi.org/10.1111/ntwe.12240
  25. Huang, H., Shen, B., Zhong, L., & Zhou, Y. (2023, January). Protecting data integrity of web applications with database con-straints inferred from application code. In Proceedings of the 28th ACM Interna-tional Conference on Architectural Sup-port for Programming Languages and Operating Systems (ASPLOS ’23) (Vol. 2, pp. 632-645. Association for Computing Machinery. https://doi.org/10.1145/3575693.3575699
  26. IBM (n.d.). What is blockchain technology? How blockchain works. IBM. Retrieved September 10, 2023 from https://ibm.com/topics/blockchain
  27. Kaspersky (n.d.). What is smishing and how to defend it. Kaspersky Resource Center. Retrieved August 26, 2024 from https://www.kaspersky.com/resource-center/threats/what-is-smishing-and-how- to-defend-against-it/
  28. Kushwaha, S. S., Joshi, S., Singh, D., Kaur, M., & Lee, H. N. (2022). Ethereum smart con-tract analysis tools: A systematic review. IEEE Access, 10, 57037-57062. https://doi.org/10.1109/ACCESS.2022.3169902
  29. Landerreche, E., & Stevens, M. (2018, May). On immutability of blockchains. In W. Prinx & P. Hoschka (Eds.), Proceedings of the 1st ERCIM Blockchain Workshop. Euro-pean Society for Socially Embedded Technologies. https://doi.org/10.18420/blockchain2018_04
  30. Liu, D., Zhang, Y., Jia, D., Zhang, Q., Zhao, X., & Rong, H. (2022). Toward secure distrib-uted data storage with error locating in blockchain enabled edge computing. Computer Standards & Interfaces, 79, 103560. https://doi.org/10.1016/j.csi.2021.103560
  31. Martin, L. (2023). Blockchain vs. relational da-tabase: Which is right for your applica-tion? TechBeacon. Retrieved August 18, 2023 from https://techbeacon.com/security/blockchain-vs-relational-database-which-right-your-application
  32. McBee, M. P., & Wilcox, C. (2020). Blockchain technology: Principles and applications in medical imaging. Journal of Digital Imag-ing, 33(3), 726-734. https://doi.org/10.1007/s10278-019-00310-3
  33. McGregor, A., (2021, March 1). A journey through the ages. Retrieved from https://www.capita.com/our-thinking/evolution-of-data-policing
  34. Mislos, M. (2023, September 21). Department of Budget and Management launches blockchain project with Bayanichain. Bit-Pinas. Retrieved September 1, 2023 from https://bitpinas.com/business/budget-department-bayanichain-blockchain-project/
  35. Momani, A. M. (2020). The unified theory of acceptance and use of technology: A new approach in technology acceptance. In-ternational Journal of Sociotechnology and Knowledge Development (IJSKD), 12(3), 79-98. https://doi.org/10.4018/IJSKD.2020070105
  36. Nakamoto, S. (2008, October 31). Bitcoin: A Peer-to-Peer Electronic Cash System. Re-trieved August 16, 2023, from https://bitcoin.org/bitcoin.pdf
  37. Oesch, S., & Ruoti, S. (2020, August). That was then, this is now: A security evaluation of password generation, storage, and au-tofill in browser-based password manag-ers. In Proceedings of the 29th USENIX Conference on Security Symposium (pp. 2165-2182). USENIX Association. Re-trieved July 20, 2023, from https://www.usenix.org/conference/usenixsecurity20/presentation/oesch
  38. Philippine National Police (2019). PNP PA-TROL Plan 2030. Retrieved September 5, 2023, from https://www.pnp.gov.ph/images/Announcement/2019/PATROL_PLAN_2030.pdf
  39. Philippine National Police. Directorate for In-formation and Communications Technol-ogy Management. (2018, November 5). Approved PNP ICT Master Plan (SMART Policing) for the period CY 2020 to CY 2025 [Memorandum]. Philippine Nation-al Police. Retrieved August 9, 2023, from https://www.scribd.com/document/837652755/Approved-PNP-ICT-Master-Plan-SMART-Policing-1
  40. Philippine Statistics Authority (2022). Crime statistics. Retrieved from https://psa.gov.ph/content/crime-statistics-O
  41. Pink, S., Lanzeni, D., Horst, H. 2018. Data anxi-eties: finding trust in everyday digital mess. Big Data Soc. 5 (1), 1–10. https://doi.org/10.1177/2053951718756685
  42. Philippine National Police. (2018, November 16). PNP ICT Master Plan (SMART Polic-ing) [Memorandum]. Referenced in PNP Memorandum Circular No. 2022 – 135
  43. Philippine National Police. (2022, April 18) Revised Guidelines and Procedures in the Implementation of the National Police Clearance System
  44. Philippine National Police. (2021). Privacy Management Program, Guidelines and Procedures in Compliance with Data Pri-vacy Act of 2012. (Memorandum Circular No. 2021-179). Retrieved from https://www.scribd.com/document/770719788/MC-2021-179-Privacy-Management-Program-Guidelines-and-Procedures-in-Compliance-with-Data-Privacy-Act-of-2012
  45. Purdue Global (2018, April 9). Criminal Justice: The Growing Role of Technology in the Criminal Justice Field. Purdue Global. https://www.purdueglobal.edu/blog/criminal-justice/growing-role-technology- criminal-justice/
  46. Qiu, J., Tian, Z., Du, C., Zuo, Q., Su, S., & Fang, B. (2020). A survey on access control in the age of internet of things. IEEE Internet of Things Journal, 7(6), 4682-4696. https://doi.org/10.1109/JIOT.2020.2978707
  47. Ronda, R. A. (2023, October 12). After Phil-Health, PSA suffers data breach. The Phil-ippine Star. https://www.philstar.com/headlines/2023/10/12/2303082/after-philhealth-psa-suffers-data-breach
  48. Rovnyagin, M. M., Dmitriev, S. O., Hrapov, A. S., Maksutov, A. A., & Turovskiy, I. A. (2021). Database Storage Format for High Per-formance Analytics of Immutable Data. In 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus) (pp. 618-622). IEEE. https://doi.org/10.1109/EIConRus51938.2021.9396453
  49. Sadiku, M. N. O.; Alam, S. & Musa, S. M. (2017). Information assurance benefits and chal-lenges: An Introduction. Information and Security: An International Journal, (36). https://doi: 10.11610/isij.3604
  50. Schuhknecht, F., & Jörz, S. (2022). The Easiest Way of Turning your Relational Database into a Blockchain — and the Cost of Do-ing So. Journal of Blockchain Technology. https://doi.org/10.48550/arXiv.2210.04484
  51. Shang, Q. & Price, A. (2019). A blockchain-based land titling project in the Republic of Georgia: rebuilding public trust and lessons for future pilot projects. Innova-tions: Technology, Governance, Globali-zation, 12(3-4): 72–78. https://doi.org/10.1162/inov_a_00276
  52. Sharma, Y., & Sharma, Y. (2019). Case study of traditional RDBMS and NoSQL database system. International Journal of Research Granthaalayah, 7, 351- 359. https://doi.org/10.29121/granthaalayah.v7.i7.2019.777
  53. Shay, R., Blumenthal, U., Gadepally, V., Hamlin, A., Mitchell, J. D., & Cunningham, R. K. (2019). Don't even ask: Database access control through query control. ACM SIG-MOD Record, 47(3), 17-22. https://doi.org/10.1145/3316416.3316420
  54. Shin. D. D. H. (2019). Blockchain: The emerg-ing technology of digital trust. Telematics and Informatics, 45, 101278. https://doi.org/10.1016/j.tele.2019.101278
  55. Stephen, R., & Alex, A. (2018, August). A re-view on blockchain security. In IOP con-ference series: materials science and en-gineering (Vol. 396, No. 1, p. 012030). IOP Publishing. https://doi.org/10.1088/1757-899X/396/1/012030
  56. Stonebraker, M., Madden, S., Abadi, D. J., Hari-zopoulos, S., Hachem, N., & Helland, P. (2018). The end of an architectural era: It's time for a complete rewrite. In M. Stonebraker & U. Cetintenel (Eds.), Mak-ing Databases Work: The Pragmatic Wis-dom of Michael Stonebraker (pp. 463-489). ACM Books. https://doi.org/10.1145/3226595.3226637
  57. The Asia Foundation (2022, March). Cyberse-curity in the Philippines: Global Context and Local Challenges. https://asiafoundation.org/wp-con-tent/uploads/2022/03/Cybersecurity-in-the-Philippines-Global-Context-and-Local-Challenges-.pdf
  58. White, S. K. (2021). What is CMMI? A model for optimizing development processes. CIO. Retrieved from https://www.cio.com/article/274530/process-improvement-capability-maturity-model-integration-cmmi-definition-and-solutions.html
  59. Yavaprabhas, K., Pournader, M., & Seuring, S. (2023). Blockchain as the “trust-building machine” for supply chain management. Annals of operations research, 327(1), 49-88. https://doi.org/10.1007/s10479-022-04868-0
  60. Zaeid, H. F. (2016). Technological determin-ism: A critique. Global Journal of Human-Social Science: G Linguistics & Education, 16(3), 7-13
  61. Zeb, A. (2018). Security of Relational Database Management System: Threats and Securi-ty Techniques. Scribd. https://www.scribd.com/document/725019356/Security-of-Relational-Database-Management-System
  62. Zhang, Y., Li, B., Wu, J., Liu, B., Chen, R., & Chang, J. (2022). Efficient and privacy-preserving blockchain-based multifactor device authentication protocol for cross-domain IIoT. IEEE Internet of Things Journal, 9(22), 22501-22515. https://doi.org/10.1109/JIOT.2022.3192488.