The Role of the Thai Government in Regulating Cybercrime: A Mixed-Methods Study on Economic and Social Impacts in Bangkok
Main Article Content
Abstract
The researcher examined the effectiveness of Thailand’s governmental regulatory framework in addressing cybercrime and its subsequent socioeconomic impacts within the Bangkok Metropolitan Area. Through a comprehensive analysis of quantitative survey data from 1,142 Bangkok residents (response rate 95.2%) and qualitative insights from 20 cybersecurity experts and policymakers, the researcher investigated the relationship between regulatory implementation and cybercrime prevention outcomes. The findings revealed a statistically significant correlation between regulatory awareness and reduced cybercrime victimization (r = -.683, p < .001), with high digital engagement respondents experiencing substantially lower annual losses (THB 15,426) compared to low engagement users (THB 31,542). The sectoral analysis demonstrated varying effectiveness across different economic sectors, with financial services showing the highest compliance rate (89.4%) and corresponding risk reduction (72.4%). Qualitative data highlighted implementation challenges, particularly resource constraints and the need for specialized expertise. The researcher identified a strong relationship between regulatory effectiveness and digital trust, with data protection awareness strongly correlating with overall trust levels (r = .812, p < .001). These findings contribute significant empirical evidence to the cybersecurity governance literature by establishing quantifiable links between regulatory implementation and cybercrime reduction in rapidly digitalizing urban economies, addressing a critical gap in empirical research on regulatory effectiveness in Southeast Asian contexts. The research provided evidence-based recommendations for enhancing regulatory frameworks, emphasizing the importance of sector-specific approaches and public awareness initiatives in strengthening cybersecurity governance.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
- เนื้อหาและข้อมูลที่ลงตีพิมพ์ในวารสารรัฐศาสตร์และรัฐประศาสนศาสตร์ถือเป็นข้อคิดเห็นและความรับผิดชอบของผู้เขียนบทความโดยตรง ซึ่งกองบรรณาธิการวารสารรัฐศาสตร์และรัฐประศาสนศาสตร์ ไม่จำเป็นต้องเห็นด้วย หรือร่วมรับผิดชอบใดๆ
- บทความและข้อมูล ที่ได้รับการตีพิมพ์ในวารสารรัฐศาสตร์และรัฐประศาสนศาสตร์ ถือเป็นลิขสิทธิ์ของวารสาร หากบุคคลหรือหน่วยงานใดต้องการนำข้อมูลไปใช้ประโยชน์ในทางวิชาการ ขอให้อ้างอิงแหล่งที่มาด้วย
References
Adegbite, A. (2023). Review of Cybersecurity Strategies in Protecting National Infrastructure: Perspectives from the USA. Computer Science & It Research Journal, 4(3), 200-219. https://doi.org/10.51594/csitrj.v4i3.658
Akinbowale, O., Klingelhöfer, H., & Zerihun, M. (2021). Analytical Hierarchy Processes and Pareto Analysis for Mitigating Cybercrime in the Financial Sector. Journal of Financial Crime, 29(3), 984-1008. https://doi.org/10.1108/jfc-04-2021-0086
AL-Hawamleh, A. (2024). Cyber Resilience Framework: Strengthening Defenses and Enhancing Continuity in Business Security. International Journal of Computing and Digital Systems, 15(1), 1315-1331. https://doi.org/10.12785/ijcds/150193
AllahRakha, N. (2024). Cybercrime and the Legal and Ethical Challenges of Emerging Technologies. Irshad Journal of Law and Policy, 2(5), 28-36. https://doi.org/10.59022/ijlp.191
Anderson, R., Thompson, J., & Williams, S. (2022). Digital Security Regulation in Developing Economies: A Comparative Analysis. Journal of Cybersecurity Economics, 14(3), 156-172.
Barletta, V. S., Caivano, D., Calvano, M., Curci, A., & Piccinno, A. (2024). Cyber Social Security Education. In De Paolis, L. T., Arpaia, P., Sacco, M. (Eds.). Lecture Notes in Computer Science (pp. 240-248). Springer. https://doi.org/10.1007/978-3-031-71713-0_16
Baror, S., Venter, H., & Adeyemi, R. (2020). A Natural Human Language Framework for Digital Forensic Readiness in the Public Cloud. Australian Journal of Forensic Sciences, 53(5), 566-591. https://doi.org/10.1080/00450618.2020.1789742
Calice, G. (2024). The Effects of Stress Testing on Us Banks’ Off-Balance Sheet Activities. Financial Markets Institutions and Instruments, 33(4), 447-475. https://doi.org/10.1111/fmii.12196
Chen, S., Ding, F., Jiang, D., Dong, J., Zhang, S., Guo, Q., & Chundong, G. (2023). Exploring the Global Geography of Cybercrime and Its Driving Forces. Humanities and Social Sciences Communications, 10(1). https://doi.org/10.1057/s41599-023-01560-x
Cybersecurity Ventures. (2024). Global Cybercrime Damages Predicted to Reach $10.5 Trillion Annually by 2025. Retrieved June 28, 2025, from https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/
Dawodu, S. (2023). Cybersecurity Risk Assessment in Banking: Methodologies and Best Practices. Computer Science & It Research Journal, 4(3), 220-243. https://doi.org/10.51594/csitrj.v4i3.659
Guan, H., Líu, H., & Saadé, R. (2022). Analysis of Carbon Emission Reduction in International Civil Aviation Through the Lens of Shared Triple Bottom Line Value Creation. Sustainability, 14(14), 8513. https://doi.org/10.3390/su14148513
ISACA. (2023). State of Digital Trust 2023. Retrieved June 28, 2025, from https://www.isaca.org/resources/reports/state-of-digital-trust-2023
Kamiya, S., Kang, J.-K., Kim, J., Milidonis, A., & Stulz, R. M. (2021). Risk Management, Firm Reputation, and the Impact of Successful Cyberattacks on Target Firms. Journal of Financial Economics, 139(3), 719-749. https://doi.org/10.1016/j.jfineco.2019.05.019
Khan, N., Ikram, N., & Saleem, S. (2023). Effects of Socioeconomic and Digital Inequalities on Cybersecurity in a Developing Country. Security Journal, 37(2), 214-244. https://doi.org/10.1057/s41284-023-00375-4
Kumar, V., & Lee, A. (2023). Adaptive Regulatory Frameworks for Emerging Cyber Threats. Digital Policy Quarterly, 31(1), 78-95.
Lesmana, D. (2023). Challenges and Cybersecurity Threats in Digital Economic Transformation. International Journal of Humanities Education and Social Sciences (Ijhess), 2(6). https://doi.org/10.55227/ijhess.v2i6.515
Liu, J., Liu, S., Xu, X., & Zou, Q. (2022). Can Digital Transformation Promote the Rapid Recovery of Cities from the Covid-19 Epidemic an Empirical Analysis from Chinese Cities. International Journal of Environmental Research and Public Health, 19(6), 3567. https://doi.org/10.3390/ijerph19063567
Martins-Okonkwo, M. (2025). Cybersecurity Governance in Digital Transformation. ISACA Resources. Retrieved June 28, 2025, from https://www.isaca.org/resources/news-and-trends/industry-news/2025/cybersecurity-governance-in-digital-transformation
Melaku, H. M. (2023). A Dynamic and Adaptive Cybersecurity Governance Framework. Journal of Cybersecurity and Privacy, 3(3), 327-350. https://doi.org/10.3390/jcp3030017
Mishra, B., & Kumar, A. (2022). Exploring Connectedness Between Regulatory Identity and Strategic Outcomes. Public Administration Issues, (6), 96-121. https://doi.org/10.17323/1999-5431-2022-0-6-96-121
Muyunda, L. (2024). Mapping the Regulatory Framework for Telemedicine in Zambia: A Content Analysis. International Journal of Membrane Science and Technology, 10(3), 3445-3461. https://doi.org/10.15379/ijmst.v10i3.3382
National Science Foundation. (2023). Security, Privacy, and Trust in Cyberspace (SaTC 2.0) [Program Solicitation]. Retrieved June 28, 2025, from https://www.nsf.gov/funding/opportunities/satc-20-security-privacy-trust-cyberspace
Nguyen, M. T., & Tran, M. Q. (2023). Balancing Security and Privacy in the Digital Age: An In-Depth Analysis of Legal and Regulatory Frameworks Impacting Cybersecurity Practices. International Journal of Intelligent Automation and Computing, 6(5), 1-12. https://research.tensorgate.org/index.php/IJIAC/article/view/61
Nugroho, A., & Chandrawulan, A. (2022). Research Synthesis of Cybercrime Laws and Covid-19 in Indonesia: Lessons for Developed and Developing Countries. Security Journal, 36(4), 651-670. https://doi.org/10.1057/s41284-022-00357-y
PwC. (2025). 2026 Global Digital Trust Insights Survey. Retrieved June 28, 2025, from https://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/library/global-digital-trust-insights.html
Siampondo, G. (2023). A Study on the Existing Cybersecurity Policies and Strategies in Combating Increased Cybercrime in Zambia. Journal of Information Security, 14(4), 294-303. https://doi.org/10.4236/jis.2023.144017
Silva, E., & Silva, M. (2022). Research Contributions and Challenges in Dlt-Based Cryptocurrency Regulation: A Systematic Mapping Study. Journal of Banking and Financial Technology, 6(1), 63-82. https://doi.org/10.1007/s42786-021-00037-2
Sunna, R. (2023). Achieving Digital Trust Through IT Governance and Cybersecurity. Retrieved June 28, 2025, from https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2023/achieving-digital-trust-through-it-governance-and-cybersecurity
Thompson, K., Williams, J., & Johnson, M. (2023). Evaluating Digital Policy Effectiveness: Methodological Approaches and Challenges. International Journal of Policy Studies, 15(2), 245-267.
World Bank. (2024). A Review of the Economic Costs of Cyber Incidents (Working Paper). World Bank Group. Retrieved June 28, 2025, from https://documents1.worldbank.org/curated/en/099092324164536687/pdf/P17876919ffee4079180e81701969ad0a18.pdf
World Economic Forum. (2023). Global Cybersecurity Outlook 2023. Retrieved June 28, 2025, from https://www.weforum.org/reports/global-cybersecurity-outlook-2023/