DEVELOPING EFFICIENCY USE OF DATA INTERCEPTION THE PREVENTION AND SUPPRESSION OF SPECIAL CRIME

Main Article Content

Surin Chaosritong
Suramon Chanchareun
Phiphat Nonthnathorn

Abstract

This research aimed to 1) study the level of policy deployment, the organization culture, the cooperation with alliances between organizations, the performance development, and the efficiency in the use of special crime prevention and suppression of information interception, 2) study influencing factors to efficiency in the use of special crime prevention and suppression of information interception and 3) develop the efficiency in the use of special crime prevention and suppression information interception. The research is a mixed-method: the qualitative study used 5 point Likert Rating Scale questionnaires to collect data from the sample group of 482 people involved in the use of special crime prevention and suppression information interception, data was analyzed by finding mean, standard deviation and Structural Equation Modelling (SEM) analysis technique; while the quantitative study used in-depth interview with 16 experts, and analyzed by content analysis.
The study finding founds that: 1) the policy deployment, the organization culture, the cooperation with alliances between organizations, the performance development, and the efficiency in the use of special crime prevention and suppression of information interception were at the high level; 2) factors that directly and indirectly affected the efficiency in the use of special crime prevention and suppression of information interception were as follows: the policy deployment, the organization culture, the cooperation with alliances between organizations, and the performance development; 3) developing the efficiency in the use of special crime prevention and suppression of information interception should emphasize the importance of operations on (1) establishing a model of creating alliances between relevant organizations was a strategic plan defined for co-working with highly flexible organizations involved, (2) formulating of information-sharing work culture was to create a co-working culture of the relevant information sharing at high speed of operation, (3) establishing a proactive collaboration model aimed to key efficiency within the legal framework.

Article Details

Section
Research Article

References

Aida, Y. H, Chris, M. & William, J. C. (2016). Criminology: Connecting theory, Research and practice. Second Edition. USA: Routledge.

Alisdair, A. G. (2016). Cybercrime: Key issues and debates. London and New York: Routledge.

Boonpiam, C. (2013). Kār kảh̄nd h̄ı̂ cêāh̄n̂āthī̀ k̄hxng rạṭ̄h mī xảnāc doy chxb d̂wy kḍh̄māy nı kār dạk rạb k̄ĥxmūl [Giving government officials the legitimate power to intercept information]. Bangkok: Faculty of Law Chulalongkorn University

Boonyopas, W. (2009). Xāchỵākrrm thāng ṣ̄ers̄ʹṭ̄hkic [Economic crime]. Edition 6. Bangkok: Nititham.

Bunklieng, C. (2017). Kār dạkfạng thāng thorṣ̄ạphth̒ nı khdī prābprām yā s̄eph tid [Wiretapping over the phone in a drug control case]. Nonthaburi: Sukhothai Thammathirat Open University.

Chanyang, R. (2013). Pạccạy thī̀ s̄̀ng p̄hl t̀x pras̄ithṭhip̣hāph kār thảngān k̄hxng phnạkngān nı xngkh̒kr mị̀ s̄æwngh̄ā p̄hl kảrị [Factors affecting employee performance in nonprofit organizations]. Pathum thani: Rajamangala University of Technology Thanyaburi.

Damanpour, F. (1991). Organizational innovation: A meta-analysis of effects of determinants and moderators. Academy of Management Journal. 34(3), 555-590.

David, D., Dubois, D. & William, J. R. (2004). Competency-based human resource management. California: Davies-Black Publishing.

Everett, M. R. (1995). Diffusion of innovations. 4 th ed. New York: Free Press.

Feldman, D. C. & Arnold, H. J. (1983). Management individual and group behavior in organizations. Tokyo: McGraw-Hill international Book.

Gordon, J. R. (1990). Management and organizational behavior. Needham Heights MA: Allyn and Bacon.

Greenberg, J. & Baron, R. A. (1997). Behavior in organizations. 6th ed. Boston: Allyn Bacon.

Heath, J., Johanson, W. & Blake, N. (2004). Healthy work environments. Washington DC: Reservior Rd N W.

Hill, J. B., & Marion, N. E. (2016). Introduction to cybercrime: Computer crimes, laws, and policing in the 21st century. Santa Barbara, CA: Praeger.

Jones, R. A. P. (1994). Nurse-physician collaboration: A descriptive study. Holistic Nursing Practice. 8(1), 38-53.

Laudon, K. C. & Laudon, J. P. (2002). Management information system: Organization and technology. (3rd ed.). New York: Macmillan.

Mugarura, N. (2016). Uncoupling the relationship between corruption and money laundering crimes. Journal of Financial Regulation and Compliance. 24(1), 74-89.

Noppakhun, S. (1998). Wạtʹhnṭhrrm xngkh̒kr s̄ảkhạỵ xỳāngrị [How important is corporate culture] Civil servant journal. 43(3), 47.

Plachta, M. (2016). European commission releases its study on migrant smuggling. International Enforcement Law Reporter. 32(9), 362-364.

Pongpiriyakarn, J. (2012). Rūp bæb k̄hxng phạnṭhmitr thāng ṭhurkic thī̀ mī p̄hl t̀x khuṇkh̀ā k̄hxng trās̄in kĥā krṇī ṣ̄ụks̄ʹā kār cạd phạnṭhmitr thāng ṭhurkic k̄hxng bạtr kherdit r̀wm kạb r̂ān xāh̄ār nı k̄het krungthephmh̄ānkhr læa primṇṯhl [Business alliance model affecting brand value case study of credit card partnership with restaurants in the district Bangkok and surrounding areas]. Bangkok: Bangkok University.

Rattanamanee, N., Kittisaknawin, C. & Desawat, N. (2018). Kār phạtʹhnā xngkh̒kār doy chı̂ phạnṭhmitr cheingkl yuthṭh [Organization development using strategic alliances]. Nakhon Pathom: Silpakorn University.

Robert, W. T. (2018). Cybercrime and cyber terrorism. New York: Pearson.

Sallis, E. & Sallis, K. (1990). People in organization. London: Macmillan Education.

Sawangwan, S. (2003). Rabb s̄ārs̄ntheṣ̄ pheụ̄̀x kār cạdkār [Management information system]. Bangkok: Pearson Education Indochina.

Sawatburi, C. (2016). Kār dạkfạng kār s̄ụ̄̀xs̄ār thāng thorṣ̄ạphth̒: Ṣ̄ụks̄ʹā kār trwc s̄xb kār chı̂ xảnāc tām phrarāchbạỵỵạti kæ̂k̄hị pheìmteim pramwlkḍh̄māy wiṭhī phicārṇā khwām xāỵā [Wiretapping of telephone communications: study examining the exercise of authority according to Criminal Procedure Code Amendment Act]. Bangkok: Thammasat University.

Suksrawong, S. (2008). Kār cạdkār: Cāk mum mxng nạk brih̄ār [Management: from a management perspective]. 4th edition. Bangkok: GP Cyber Print.

Termsrisuk, N. (2006). Mātrā 25 h̄æ̀ng phrarāchbạỵỵạti krm s̄xbs̄wn khdī phiṣ̄es̄ʹ ph.Ṣ̄.2547 Mātrkār k̄hêāt̄hụng k̄ĥxmūl k̄h̀āws̄ār khwām pĕn mā kār bạngkhạb chı̂ læa k̄ĥx s̄enx nı kār phạtʹhnā kḍh̄māy [Section 25 of the Act Department of Special Investigation 2004. Measures to access information, background, enforcement and proposals for law development]. Bangkok: Department of Special Investigation, Ministry of Justice.

The American Association of Critical Care Nurses. (2005). AACN Standards for establishing and sustaining healthy work environment: A journey to excellence. American Journal of Critical Care. 14(1), 187-197.

Thomson, A. M., & Perry, J. L. (2006). Collaboration processes: Inside the black box. Public Administration Review. 66, 20-32.

Tournier, M. (2015). Countering illegal wildlife trade in Southeast Asia: A critical comparison of the leading strategies and their corresponding initiatives. Master Thesis in Sustainable Development. Uppsala University.

Turban, L., Mcean, L. & Wetherbe, K. (2001). Information technology for management making connections for strategic advantage. (2nd ed.). New York: John Wikley & son, Inc.

United Nations Interregional Crime and Justice Research Institute (UNICR). (2016). Environmental crimes. Retrieved from http://www.unicri.it/topics/environmental/.