Countering Counterfeit Trade: Illicit Market Insights, by Thorsten Staake

By Thorsten Staake

Counterfeit exchange is a hugely complicated phenomenon. it's a ruthless crime in addition to a wise knowledge-transfer technique – and it's every little thing in among. businesses desire a thorough figuring out of the ideas of illicit actors, the function of the shopper, and the linked implications with the intention to increase winning model- and product-protection measures. delivering this knowledge is the key-objective of the booklet to hand. The authors current an impartial, in-depth research of the provision- and demand-side of the illicit marketplace, define state of the art model- and product-protection options, and introduce a collection of novel instruments to aid industry tracking, response, and prevention efforts. moreover, demanding situations with demonstrated product safety applied sciences are highlighted and the advantages and hurdles whilst utilizing Radio Frequency identity (RFID) as safeguard know-how are mentioned. a huge good thing about the booklet is the robust specialize in helping practitioners to house the demanding situations; one other is the excessive normal of analysis that backs up the findings provided.

Show description

Read or Download Countering Counterfeit Trade: Illicit Market Insights, Best-Practice Strategies, and Management Toolbox PDF

Similar intellectual property books

Democracy Online: The Prospects for Political Renewal Through the Internet

Taking a multidisciplinary method that they establish as a "cyber-realist learn agenda," the members to this quantity research the customers for digital democracy when it comes to its shape and practice--while keeping off the pitfall of treating some great benefits of digital democracy as being self-evident.

The Writer's Legal Guide: An Authors Guild Desk Reference

Created by means of execs with huge adventure in either legislation and publishing, this useful machine consultant solutions almost any query writers tend to face pertaining to their rights and the legislation. totally up to date with the newest info on digital rights and extended assurance of reasonable use and permissions, this new 3rd version positive aspects the most recent alterations in copyright legislations, publication contracts, employer contracts, collaboration agreements, limits of expression, the liberty of knowledge Act, and tax legislation.

Shamans, Software and Spleens : Law and the Construction of the Information Society

Who owns your genetic info? could it's the medical professionals who, during removal your spleen, decode a number of cells and switch them right into a patented product? In 1990 the ideal court docket of California acknowledged definite, marking one other milestone at the cyber web. This impressive case is without doubt one of the many who James Boyle takes up in Shamans, software program, and Spleens, a well timed examine the infinitely tough difficulties posed by means of the knowledge society.

The arbitrary Indian: the Indian Arts and Crafts Act of 1990

No put on or markings - seems to be new even with its age.

Extra info for Countering Counterfeit Trade: Illicit Market Insights, Best-Practice Strategies, and Management Toolbox

Sample text

Counterfeiting research has not yet established itself as an autonomous research stream. Instead, it is distributed across different strands of management research, for example strategic management, marketing, logistics, and others. Against this background we have reviewed the existing body of academic literature so as to provide an integrated portrayal of the current level of knowledge in this field. We explicitly focused our analysis on journals in the area of management and economics. Accordingly, works in other disciplines such as law (for example contributions on the development of intellectual property rights in China) or engineering (for example contributions on the development of anti-counterfeiting technologies) are only mentioned if their individual contributions were of particular importance.

Customs is a major stakeholder in the battle against counterfeiting, but often relies on information from licit manufacturers or brand owners in order to recognize intellectual property rights infringements. Relevant customs checkpoints can be included in the model. If a company is threatened by counterfeit products of different categories, several instances of the model may have to be defined. The same may be necessary for different geographic markets, especially with respect to non-deceptive counterfeit consumer articles, as the importance of various sales channels may vary.

Again most industry experts were able to provide a consistent analytical interpretation of the results without any prior explanation from the research team. In fact, the small number of variables led to the confined clusters and the clusters’ members show common characteristics beyond those that result directly from the clustering variables. 4 (b) summarizes the characteristics of the nongroup-defining variables for each cluster and provides the corresponding results of the Tukey Test and t-Test.

Download PDF sample

Rated 4.33 of 5 – based on 45 votes