Abstract
For the past 10 years, Thailand has been one of the top 10 countries targeted by cyber criminals. In order to address this pressing issue of computer and cybercrime, Thailand enacted the Computer Crime Act (Version 2) of 2017 to better reflect the changing nature and types of computer crime and created the CyberCrime Investigation Bureau to be directly responsible for such crime. Very little empirical research has been conducted in Thailand on this topic. The data in this study are from in-depth interviews of 20 experts and two focus groups of 20 experts each. The data from the interviews and the first focus group focused on the obstacles facing computer crime officials in dealing with computer crime. The second focus group discussed and analyzed the findings and then offered recommendations for future police policies and practices. The recommendations address not only the main obstacles found in the five main areas of police policies (international cooperation, law enforcement officials, victims, technology, and legal aspects), but also offer proactive police practices to be considered, such as human rights violation precautions and police recruitment and career paths for computer crime personnel.
Similar content being viewed by others
Notes
The focus group was part of the Royal Thai Police’s annual seminar held on October 5–7, 2020 where Commissioner General met with 111 new appointed police major generals so that the commissioner general would lay out his police policies to these new police major generals to follow. The focus group was one of the activities to collect information about the problems facing each of the police responsibilities. The second author served as the moderator of the focus group on cybercrime.
References
Adal L (2018) Organised crime in Africa: Weak laws make tackling organised crime harder. Retrieved July 18, 2022, from https://enactafrica.org/enact-observer/weak-laws-make-tackling-organised-crime-harder
Bangkok Post (2020) New agency to tackler cybercrimes. Retrieved August 9, 2021. Available at https://www.bangkokpost.com/thailand/general/2001111/new-agency-to-tackle-cybercrimes
Boister NB (2016) The cooperation provisions of the UN convention against transnational organised crime: A ‘toolbox’ rarely used? Int Crim Law Rev 16(1):39–70. https://doi.org/10.1163/15718123-01601008
Burruss G, Howell CJ, Bossler A et al (2019) Self-perceptions of English and Welsh constables and sergeants’ preparedness for online crime: A latent class analysis. Polic Int J 43(1):105–119. https://doi.org/10.1108/PIJPSM-08-2019-0142
Button M, Shepherd D, Blackbourn D, Sugiura L, Kapend R, Wang V (2022) Assessing the seriousness of cybercrime: The case of computer misuse crime in the United Kingdom and the victims’ perspective. Criminol Crimin Justice, 0(0). https://doi.org/10.1177/17488958221128128
Cai T, Du Li, Xin Y, Chang LYC (2018) Characteristics of cybercrimes: Evidence from Chinese judgment documents. Police Pract Res 19(6):582–595. https://doi.org/10.1080/15614263.2018.1507895
Chang YC (2012) Combating cybercrime across the Taiwan Strait: Investigation and prosecution issues. Aust J Forensic Sci 44(1):5–14
Christou G (2018) The challenges of cybercrime governance in the European Union. Europ Polit Soc 19(3):355–375. https://doi.org/10.1080/23745118.2018.1430722
Cockcroft T, Shan-A-Khuda M, Schreuders ZC, Trevorrow P (2018) Police cybercrime training: Perceptions, pedagogy, and policy. Policing 15(1):15–33. https://doi.org/10.1093/police/pay078
Commission of the European Communities (2007) Towards a general policy on the fight against cyber crime. COM(2007) 267 final. Commission of the European Communities, Brussels. Retrieved September 1, 2021, from http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2007:0267:FIN:EN:PDF.
Computer-Related Crime Act (Version 2) (2017) Articles 5–16
Curtis J, Oxburgh G (2022) Understanding cybercrime in ‘real world’ policing and law Enforcement. Police J: Theory, Pract Princ 0(0) 1–20. https://doi.org/10.1177/0032258X221107584
Dandurand Y, Jahn J (2021) The future of international cooperation against transnational organized crime: The undoing of UNTOC? Global Initiative Against Transnational Organized Crime, Geneva
De Paoli S, Johnstone J, Coull N, Ferguson I, Sinclair G, Tomkins P, Brown M, Martin R (2020) A qualitative exploratory study of the knowledge, forensic, and legal challenges from the perspective of police cybercrime specialists. Policing 15(2):1429–1445. https://doi.org/10.1093/police/paaa027
Dearden TE, Parti K, Hawdon J (2021) Institutional anomie theory and cybercrime—cybercrime and the American dream, now available online. J Contemp Crim Justice 37(3):311–332
Distapraneet U, Lamaiwong C, Pokkasut A, Pramarn S (2021) (In Thai). Legal problems of cyberbullying in university students. Interdisc Soc Sci Commun J 4(2):115–127
Drew JM, Farrell L (2018) Online victimization risk and self-protective strategies: Developing police-led cyber fraud prevention programs. Police Pract Res 19(6):537–549
Electronic Transactions Development Agency (In Thai) (2021) Summary of the computer crime bill. Retrieved August 10, 2021, from https://ictlawcenter.etda.or.th/files/files/main-point.pdf
Gyeltshen K, Kamnuansilpa P, Crumpton CD, Wongthanavasu S (2021) Training needs assessment of the Royal Bhutan Police. Police Pract Res 22(1):409–425. https://doi.org/10.1080/15614263.2020.1716355
Hadlington L, Lumsden K, Black A, Ferra F (2018) A qualitative exploration of police officers’ experiences, challenges, and perceptions of cybercrime. Policing 15(1):34–43. https://doi.org/10.1093/police/pay090
Harkin D, Whelan C (2022) Perceptions of police training needs in cyber-crime. Int J Police Sci Manag 24(1):66–76. https://doi.org/10.1177/14613557211036565
Harkin D, Whelan C, Chang L (2018) The challenges facing specialist police cyber-crime units: An empirical analysis. Police Pract Res Int J 19(6):519–536. https://doi.org/10.1080/15614263.2018.1507889
Johnson D, Faulkner E, Meredith G, Wilson TJ (2020) Police functional adaptation to the digital or post digital age: Discussions with cybercrime experts. J Crim Law 84(5):427–450. https://doi.org/10.1177/0022018320952559
Kemp S, Buil-Gil D, Miró-Llinares F, Lord N (2021) When do businesses report cybercrime? Findings from a UK study. Criminol Crim Justice 1–22. https://doi.org/10.1177/17488958211062359
La Chiangkong K (2015) (In Thai). Prevention and suppression measures for telephone fraud (Call center gang). Thesis. Rangsit University, Mueang Pathum Thani District, Pathum Thani
Lee JR, Holt TJ, Burruss GW, Bossler AM (2021) Examining English and Welsh detectives’ views of online crime. Int Crim Justice Rev 31(1):20–39. https://doi.org/10.1177/1057567719846224
Leukfeldt ER, Roks RA (2021) Cybercrimes on the streets of the Netherlands? An exploration of the intersection of cybercrimes and street crimes. Deviant Behav 42(11):1458–1469. https://doi.org/10.1080/01639625.2020.1755587
Li X (2018) Crucial Elements in law enforcement against cybercrime. Int J Inf Secur Sci 7(3):140–158
Nakseeharach D (2019) (In Thai). The attitude and legal problem on the prevention and control of cyberbullying in Thailand: Study of ctudents in Mahasarakham University. CMU J Law Soc Sci 12(1):135–171
Ngo FT, Piquero AR, LaPrade J, Duong B (2020) Victimization in cyberspace: Is it how long we spend online, what we do online, or what we post online? Crim Justice Rev 45(4):430–451. https://doi.org/10.1177/0734016820934175
Nguyen T, Luong HT (2021) The structure of cybercrime networks: transnational computer fraud in Vietnam. Journal of Crime and Justice 44(4):419–440. https://doi.org/10.1080/0735648X.2020.1818605
Notté R, Leukfeldt ER, Malsch M (2021) Double, triple or quadruple hits? Exploring the impact of cybercrime on victims in the Netherlands. Int Rev Victimol 27(3):272–294. https://doi.org/10.1177/02697580211010692
Phromchom S (2017) (In Thai). The essence of the computer crime act of 2017 (Version 2). Retrieved May 20, 2022, from https://www.senate.go.th/assets/portals/93/fileups/272/files/S%E0%B9%88ub_Jun/12know/k136.pdf
Preedakorn S (2016) (In Thai). The impact of the cyber crime: A case study of online football betting. Soc Sci J 6(1):96–110. Retrieved May 22, 2022, from https://so05.tci-thaijo.org/index.php/phdssj/article/view/67031
Saenta Y (2015) (In Thai). The application of new public management by police personnel in the Technology Crime Suppression Division. Thesis. Rangsit University, Mueang Pathum Thani District, Pathum Thani
Samart P, Thongraweewong K (2021) (In Thai). Principle of Thai law for protecting the rights of children from cyber bullying. Gov J 10(1):78–100
Shaw M, Stanyard J (2018) Convention facing political cul-de-sac. Retrieved July 18, 2022, from https://globalinitiative.net/analysis/convention-facing-political-cul-de-sac/
Suksri S, Kusonsinwut S, Yingyongpathana O (2012) (In Thai). Impact of the Computer-related Crime Act 2007 and state policies on the right to freedom of expression. iLaw project for Thai volunteer service. Parbpim Ltd., Bangkok
Tangon R, Jungthawan S (2020) (In Thai). Legal problems concerning the criminalization of revenge porn in Thailand. J Thai Justice Syst 13(3):77–100
Tennant I (2021) Fulfilling the promise of Palermo? A political history of the UN convention against transnational organized crime. J Illicit Econ Dev 2(1):53–71. https://doi.org/10.31389/jied.90
ThaiCERT (2021) The top ten countries that received the report of cyber threat. Retrieved May 27, 2022, from https://www.thaicert.or.th/statistics/statistics2019.html
The Royal Thai Police (2020) How to deal with crime from police commanders’ perspectives. Annual Conference of the New Police Commanders, Rama Garden Hotel, Bangkok
Thograweewong K (2018) (In Thai). Legal limitations relating to the application of Thai Computer–related Crime Act of B.E. 2560 to the case of “phishing.” Kasem Bundit J 19:100–111
Thograweewong, K., & Somsaard, C. (2021). (In Thai). The application of Computer-Related Crime Act (No.2) B.E. 2560 (2017) to the online romance scam. Rajapark J 15(39):230–239
United Nations General Assembly (2019) Countering the use of information and communications technologies for criminal purposes. Report of the Third Committee. Retrieved May 18, 2022, from:///D:/Users/UserSH/Downloads/A_74_401-EN.pdf
van de Weijer SGA, Leukfeldt R, Bernasco W (2019) Determinants of reporting cybercrime: A comparison between identity theft, consumer fraud, and hacking. Eur J Criminol 16(4):486–508. https://doi.org/10.1177/1477370818773610
Vuletić I (2018) Data-driven healthcare and cybercrime: A threat we are not aware of? Asia Pac J Health Law Ethics 11(2):16–32
Wilson M, Cross C, Holt T, Powell A (2022) Police preparedness to respond to cybercrime in Australia: An analysis of individual and organizational capabilities. J Criminol 55(4):468–494. https://doi.org/10.1177/26338076221123080
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
We confirm that there are no known conflicts of interest associated with the manuscript.
Ethical approval
We confirm that any aspect of the work covered in this manuscript that has involved human subjects has been conducted with the ethical approval of all relevant bodies and that such approvals are acknowledged within the manuscript.
Consent
We confirm that the participants gave consent for the interview and allowed the conversations to be recorded for reference.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Cheurprakobkit, S., Lerwongrat, K. Criminal justice officials’ attitudes towards addressing computer crimes in Thailand: Difficulties and recommendations. Trends Organ Crim (2023). https://doi.org/10.1007/s12117-023-09493-2
Accepted:
Published:
DOI: https://doi.org/10.1007/s12117-023-09493-2