Countering counterfeit trade (Record no. 34877)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 08679cam a22003614a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | CUTN |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20210428123949.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 080227s2008 gw a b 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9783540769460 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 3540769463 |
| 041 ## - LANGUAGE CODE | |
| Language | English |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ukblcatcopy |
| -- | lccopycat |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 364.133 |
| Edition number | 22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Staake, Thorsten. |
| 245 10 - TITLE STATEMENT | |
| Title | Countering counterfeit trade |
| Remainder of title | illicit market insights, best-practice strategies, and management toolbox |
| Statement of responsibility, etc | Thorsten Staake, Elgar Fleisch. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
| Place of publication, distribution, etc | Berlin : |
| Name of publisher, distributor, etc | Springer, |
| Date of publication, distribution, etc | c2008. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xvii, 229 p. : |
| Other physical details | ill. ; |
| Dimensions | 25 cm. |
| 505 ## - FORMATTED CONTENTS NOTE | |
| Contents | Part A <br/><br/>Knowing the Enemy – The Mechanisms of Counterfeit Trade ......... 1<br/>1 An Introduction to Counterfeit Markets ............................................................. 3<br/>1.1 The changing nature of counterfeit trade................................................... 8<br/>1.2 A global problem – Frequently discussed, little understood................... 14<br/>1.3Counterfeiting is not parallel trade is not overproduction – Why<br/>a clear problem definition is needed ....................................................... 16<br/>1.4 Academic publications on counterfeit trade............................................ 19<br/>2 Understanding Counterfeit Supply ................................................................... 23<br/>2.1 Strategies and production settings of counterfeit producers ................... 23<br/>2.2 Distribution channels and shipment strategies for illicit goods .............. 35<br/>2.3 Exploring the counterfeiters’ business case ............................................ 41<br/>2.4 Research on counterfeit supply ............................................................... 44<br/>3 Counterfeit Demand and the Role of the Consumer ........................................ 47<br/>3.1 Consumer behavior in counterfeit markets.............................................. 47<br/>3.2. Developing brand- and product-specific consumer studies .................... 56<br/>3.3 Research in counterfeit demand .............................................................. 59<br/>Part B Countermeasures – Best Practices and Strategy Development......... 67<br/>4 Established Anti-counterfeiting Approaches – Best Practices ......................... 69<br/>4.1 State-of-the-art in anti-counterfeiting...................................................... 69<br/>4.2 The characteristics of successful practices.............................................. 77<br/>4.3 Research on managerial and legal countermeasures ............................... 79<br/>5 Implementing Anti-counterfeiting Measures ................................................... 85<br/>5.1 Monitoring processes............................................................................... 85<br/>5.2 Reaction processes................................................................................... 91<br/>5.3 Preventive measures ................................................................................ 93<br/>5.4 Organizational structure of anti-counterfeiting units .............................. 97<br/>Methodology ........................................................................................................... ix<br/>Acknowledgements ................................................................................................. xi<br/>Foreword.................................................................................................................. v<br/>Counterfeiting is not parallel trade is not overproduction – Why<br/>a clear problem definition is needed ....................................................... 16<br/><br/>Organization of the Book ..................................................................................... xiii<br/>Developing brand- and product-specific consumer studies .................... 56<br/>Part C Management Tools – Towards a Fact-based Managerial<br/>6 Determining the Market Share of Counterfeit Articles.................................. 103<br/>6.1 A critique of existing statistics .............................................................. 104<br/>6.2 Macroeconomic calculations................................................................. 114<br/>6.3 Microeconomic calculations.................................................................. 121<br/>7 Implications for Affected Enterprises ............................................................ 125<br/>7.1 Quantifying the loss of revenue............................................................. 125<br/>7.2 A model to assess the impact on brand value........................................ 133<br/>7.3 Implications for quality costs, liability claims, and future competition 141<br/>7.4 Positive effects of counterfeit trade....................................................... 144<br/>7.5 Research on the impact of counterfeit trade.......................................... 146<br/>Part D Product-protection Technologies ....................................................... 149<br/>8 Principles of Product Security Features ......................................................... 151<br/>8.1 Classification of protection technologies .............................................. 151<br/>8.2 Attack scenarios and their implications................................................. 155<br/>8.3 Requirements for security features........................................................ 157<br/>9 The Potential of RFID for Brand- and Product-protection ............................ 161<br/>9.1<br/>9.2 Technical principles of RFID technology ............................................. 170<br/>9.3 Solution concepts................................................................................... 177<br/>9.4 Application scenarios ............................................................................ 187<br/>Part E Managerial Guidelines and Conclusions........................................... 197<br/>10 Guidelines....................................................................................................... 199<br/>11 Concluding Remarks ...................................................................................... 207<br/>Appendix ............................................................................................................. 209<br/>About the Authors ................................................................................................ 231<br/>Approach...............................................................................................101<br/>List of References................................................................................................. 211<br/>List of Abbreviations............................................................................................ 225<br/>Index..................................................................................................................... 227<br/><br/>An introduction to the Internet of Things..............................................162<br/> |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc | Counterfeit trade is a highly complex phenomenon. It is a ruthless crime as well as a smart knowledge-transfer strategy – and it is everything in between. Companies need a thorough understanding of the strategies of illicit actors, the role of the consumer, and the associated implications in order to develop successful brand- and product-protection measures. Providing this know-how is the key-objective of the book at hand. The authors present an unbiased, in-depth analysis of the supply- and demand-side of the illicit market, outline state-of-the-art brand- and product-protection strategies, and introduce a set of novel tools to support market monitoring, reaction, and prevention efforts. Furthermore, challenges with established product security technologies are highlighted and the benefits and hurdles when using Radio Frequency Identification (RFID) as protection technology are discussed. A major benefit of the book is the strong focus on assisting practitioners to deal with the challenges; another is the high standard of research that backs up the findings presented. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Product counterfeiting |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Product counterfeiting. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name as entry element | Trade regulation. |
| 700 1# - ADDED ENTRY--PERSONAL NAME | |
| Personal name | Fleisch, Elgar. |
| 856 42 - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="http://www.loc.gov/catdir/enhancements/fy1002/2008923855-d.html">http://www.loc.gov/catdir/enhancements/fy1002/2008923855-d.html</a> |
| 856 41 - ELECTRONIC LOCATION AND ACCESS | |
| Uniform Resource Identifier | <a href="http://www.loc.gov/catdir/enhancements/fy1402/2008923855-t.html">http://www.loc.gov/catdir/enhancements/fy1402/2008923855-t.html</a> |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | General Books |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc | Includes bibliographical references (p. [211]-224) and index. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| General subdivision | Prevention. |
| 856 42 - ELECTRONIC LOCATION AND ACCESS | |
| Materials specified | Publisher description |
| 856 41 - ELECTRONIC LOCATION AND ACCESS | |
| Materials specified | Table of contents only |
| 906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) | |
| a | 7 |
| b | cbc |
| c | copycat |
| d | 2 |
| e | ncip |
| f | 20 |
| g | y-gencatlg |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Location | Shelving location | Date of Cataloging | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Non-fiction | CUTN Central Library | CUTN Central Library | Social Sciences | 28/04/2021 | 364.133 | 43319 | 28/04/2021 | 28/04/2021 | General Books |
