<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd" xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>00000caa a22000003i 4500</leader>
  <controlfield tag="001">UP-1685594773862408541</controlfield>
  <controlfield tag="003">Buklod</controlfield>
  <controlfield tag="005">20250805150946.0</controlfield>
  <controlfield tag="006">m     |  |        </controlfield>
  <controlfield tag="007">ta</controlfield>
  <controlfield tag="008">250805s2014    xx a    r    |||| u|eng d</controlfield>
  <datafield tag="022" ind1=" " ind2=" ">
   <subfield code="a">16551516</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(iLib)UPBAG-00039569161</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">BAG</subfield>
   <subfield code="e">rda</subfield>
  </datafield>
  <datafield tag="041" ind1="0" ind2=" ">
   <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="090" ind1=" " ind2="0">
   <subfield code="a">ARTICLE-2896</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Majuca, Ruperto P.</subfield>
   <subfield code="e">author.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Optimal solutions to cybercrimes</subfield>
   <subfield code="b">lessons from law and economics</subfield>
   <subfield code="c">Ruperto P. Majuca.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">[Quezon City]</subfield>
   <subfield code="b">School of Economics, University of the Philippines</subfield>
   <subfield code="c">2014.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">pages 84-116</subfield>
   <subfield code="b">illustrations</subfield>
   <subfield code="c">23 cm</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
   <subfield code="a">text</subfield>
   <subfield code="2">rdacontent</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
   <subfield code="a">unmediated</subfield>
   <subfield code="2">rdamedia</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
   <subfield code="a">volume</subfield>
   <subfield code="2">rdacarrier</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">Title was 'Philippine Review of Business and Economics' until 1979. Title changed to 'Philippine Review of Economics and Business' from 1980-2000, and again changed to 'Philippine Review of Economics' since 2001.</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Includes bibliographical references.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">A model is presented wherein cybercrimes are addressed through a combination of private and public measures. This captures the substitutability of private and public responses and determines the optimal combination of these approaches. The socially optimal level of security is achieved by equalizing the marginal-benefit-to-marginal-cost ratios of each of the three alternatives: private security investment, nonrivalrous security investment, and law enforcement measures. The interrelatedness of Internet risks causes individual firms to underinvest in private and public security goods. The government thus lowers the level of police enforcement expenditures to induce firms to invest more in individual precautions. In certain conditions, cooperation results in socially optimal levels of expenditures in private and public security goods. The Shapley [1953] value can be used as a criterion for allocating the costs and benefits among the members of a security cooperative.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer crimes</subfield>
   <subfield code="z">Philippines</subfield>
   <subfield code="a">Law and legislation.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer security</subfield>
   <subfield code="z">Philippines</subfield>
   <subfield code="a">Law and legislation.</subfield>
  </datafield>
  <datafield tag="773" ind1="0" ind2=" ">
   <subfield code="t">The Philippine review of economics</subfield>
   <subfield code="g">Vol. 51, no. 1 (June 2014), p. 84-116.</subfield>
  </datafield>
  <datafield tag="905" ind1=" " ind2=" ">
   <subfield code="a">UP</subfield>
  </datafield>
  <datafield tag="852" ind1="0" ind2=" ">
   <subfield code="a">UPBAG</subfield>
   <subfield code="b">UPBAG-MAIN</subfield>
   <subfield code="h">ARTICLE-2896</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
   <subfield code="a">Analytics</subfield>
  </datafield>
 </record>
</collection>
