Countering counterfeit trade (Record no. 34877)

MARC details
000 -LEADER
fixed length control field 08679cam a22003614a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CUTN
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20210428123949.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 080227s2008 gw a b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540769460
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 3540769463
041 ## - LANGUAGE CODE
Language English
042 ## - AUTHENTICATION CODE
Authentication code ukblcatcopy
-- lccopycat
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 364.133
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Staake, Thorsten.
245 10 - TITLE STATEMENT
Title Countering counterfeit trade
Remainder of title illicit market insights, best-practice strategies, and management toolbox
Statement of responsibility, etc Thorsten Staake, Elgar Fleisch.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Berlin :
Name of publisher, distributor, etc Springer,
Date of publication, distribution, etc c2008.
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 229 p. :
Other physical details ill. ;
Dimensions 25 cm.
505 ## - FORMATTED CONTENTS NOTE
Contents Part A <br/><br/>Knowing the Enemy – The Mechanisms of Counterfeit Trade ......... 1<br/>1 An Introduction to Counterfeit Markets ............................................................. 3<br/>1.1 The changing nature of counterfeit trade................................................... 8<br/>1.2 A global problem – Frequently discussed, little understood................... 14<br/>1.3Counterfeiting is not parallel trade is not overproduction – Why<br/>a clear problem definition is needed ....................................................... 16<br/>1.4 Academic publications on counterfeit trade............................................ 19<br/>2 Understanding Counterfeit Supply ................................................................... 23<br/>2.1 Strategies and production settings of counterfeit producers ................... 23<br/>2.2 Distribution channels and shipment strategies for illicit goods .............. 35<br/>2.3 Exploring the counterfeiters’ business case ............................................ 41<br/>2.4 Research on counterfeit supply ............................................................... 44<br/>3 Counterfeit Demand and the Role of the Consumer ........................................ 47<br/>3.1 Consumer behavior in counterfeit markets.............................................. 47<br/>3.2. Developing brand- and product-specific consumer studies .................... 56<br/>3.3 Research in counterfeit demand .............................................................. 59<br/>Part B Countermeasures – Best Practices and Strategy Development......... 67<br/>4 Established Anti-counterfeiting Approaches – Best Practices ......................... 69<br/>4.1 State-of-the-art in anti-counterfeiting...................................................... 69<br/>4.2 The characteristics of successful practices.............................................. 77<br/>4.3 Research on managerial and legal countermeasures ............................... 79<br/>5 Implementing Anti-counterfeiting Measures ................................................... 85<br/>5.1 Monitoring processes............................................................................... 85<br/>5.2 Reaction processes................................................................................... 91<br/>5.3 Preventive measures ................................................................................ 93<br/>5.4 Organizational structure of anti-counterfeiting units .............................. 97<br/>Methodology ........................................................................................................... ix<br/>Acknowledgements ................................................................................................. xi<br/>Foreword.................................................................................................................. v<br/>Counterfeiting is not parallel trade is not overproduction – Why<br/>a clear problem definition is needed ....................................................... 16<br/><br/>Organization of the Book ..................................................................................... xiii<br/>Developing brand- and product-specific consumer studies .................... 56<br/>Part C Management Tools – Towards a Fact-based Managerial<br/>6 Determining the Market Share of Counterfeit Articles.................................. 103<br/>6.1 A critique of existing statistics .............................................................. 104<br/>6.2 Macroeconomic calculations................................................................. 114<br/>6.3 Microeconomic calculations.................................................................. 121<br/>7 Implications for Affected Enterprises ............................................................ 125<br/>7.1 Quantifying the loss of revenue............................................................. 125<br/>7.2 A model to assess the impact on brand value........................................ 133<br/>7.3 Implications for quality costs, liability claims, and future competition 141<br/>7.4 Positive effects of counterfeit trade....................................................... 144<br/>7.5 Research on the impact of counterfeit trade.......................................... 146<br/>Part D Product-protection Technologies ....................................................... 149<br/>8 Principles of Product Security Features ......................................................... 151<br/>8.1 Classification of protection technologies .............................................. 151<br/>8.2 Attack scenarios and their implications................................................. 155<br/>8.3 Requirements for security features........................................................ 157<br/>9 The Potential of RFID for Brand- and Product-protection ............................ 161<br/>9.1<br/>9.2 Technical principles of RFID technology ............................................. 170<br/>9.3 Solution concepts................................................................................... 177<br/>9.4 Application scenarios ............................................................................ 187<br/>Part E Managerial Guidelines and Conclusions........................................... 197<br/>10 Guidelines....................................................................................................... 199<br/>11 Concluding Remarks ...................................................................................... 207<br/>Appendix ............................................................................................................. 209<br/>About the Authors ................................................................................................ 231<br/>Approach...............................................................................................101<br/>List of References................................................................................................. 211<br/>List of Abbreviations............................................................................................ 225<br/>Index..................................................................................................................... 227<br/><br/>An introduction to the Internet of Things..............................................162<br/>
520 ## - SUMMARY, ETC.
Summary, etc Counterfeit trade is a highly complex phenomenon. It is a ruthless crime as well as a smart knowledge-transfer strategy – and it is everything in between. Companies need a thorough understanding of the strategies of illicit actors, the role of the consumer, and the associated implications in order to develop successful brand- and product-protection measures. Providing this know-how is the key-objective of the book at hand. The authors present an unbiased, in-depth analysis of the supply- and demand-side of the illicit market, outline state-of-the-art brand- and product-protection strategies, and introduce a set of novel tools to support market monitoring, reaction, and prevention efforts. Furthermore, challenges with established product security technologies are highlighted and the benefits and hurdles when using Radio Frequency Identification (RFID) as protection technology are discussed. A major benefit of the book is the strong focus on assisting practitioners to deal with the challenges; another is the high standard of research that backs up the findings presented.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Product counterfeiting
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Product counterfeiting.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Trade regulation.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Fleisch, Elgar.
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/enhancements/fy1002/2008923855-d.html">http://www.loc.gov/catdir/enhancements/fy1002/2008923855-d.html</a>
856 41 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://www.loc.gov/catdir/enhancements/fy1402/2008923855-t.html">http://www.loc.gov/catdir/enhancements/fy1402/2008923855-t.html</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type General Books
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references (p. [211]-224) and index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
General subdivision Prevention.
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Publisher description
856 41 - ELECTRONIC LOCATION AND ACCESS
Materials specified Table of contents only
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e ncip
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Location Shelving location Date of Cataloging Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Non-fiction CUTN Central Library CUTN Central Library Social Sciences 28/04/2021   364.133 43319 28/04/2021 28/04/2021 General Books