IDEAS home Printed from https://ideas.repec.org/a/eee/bushor/v51y2008i3p191-199.html
   My bibliography  Save this article

Strategies to detect and reduce counterfeiting activity

Author

Listed:
  • Berman, Barry

Abstract

While at one time counterfeit products were largely restricted to watches, designer apparel, and movies, today counterfeiting is a major problem in such diverse product categories as pharmaceuticals, automotive parts, and computer software. There are four distinct types of counterfeits: knockoffs, counterfeits that are reverse engineered from genuine goods, goods produced by outsourced suppliers on "third shifts," and goods that do not meet a manufacturer's standards but are not properly labeled as seconds or destroyed. The quality of some counterfeits is so good that some major retailers have unknowingly purchased counterfeits. But while there are new forms of counterfeit goods, there are also new strategies for combating counterfeiting. This article describes how to detect and reduce counterfeiting activity, via a plan which consists of four steps: (1) developing early warning signals of counterfeiting; (2) budgeting to monitor, deter, and remove counterfeits; (3) using demand-side strategies to deter counterfeiting; and (4) using supply-side strategies to deter counterfeiting.

Suggested Citation

  • Berman, Barry, 2008. "Strategies to detect and reduce counterfeiting activity," Business Horizons, Elsevier, vol. 51(3), pages 191-199.
  • Handle: RePEc:eee:bushor:v:51:y:2008:i:3:p:191-199
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0007-6813(08)00003-7
    Download Restriction: Full text for ScienceDirect subscribers only
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Chaudhry, Peggy E., 2006. "Changing levels of intellectual property rights protection for global firms: A synopsis of recent U.S. and EU trade enforcement strategies," Business Horizons, Elsevier, vol. 49(6), pages 463-472.
    2. Norman, Patricia M., 2001. "Are your secrets safe? Knowledge protection in strategic alliances," Business Horizons, Elsevier, vol. 44(6), pages 51-60.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Wilson, Jeremy M. & Grammich, Clifford A., 2020. "Brand protection across the enterprise: Toward a total-business solution," Business Horizons, Elsevier, vol. 63(3), pages 363-376.
    2. Priporas, Constantinos-Vasilios & Chen, Yan & Zhao, Shasha & Tan, Hui, 2020. "An exploratory study of the upper middle-class consumer attitudes towards counterfeiting in China," Journal of Retailing and Consumer Services, Elsevier, vol. 53(C).
    3. Nill, Alexander & Shultz II, Clifford J., 2009. "Global software piracy: Trends and strategic considerations," Business Horizons, Elsevier, vol. 52(3), pages 289-298, May.
    4. Qin, Yao & Shi, Linda Hui & Song, Lei & Stöttinger, Barbara & Tan, Kang (Frank), 2018. "Integrating consumers’ motives with suppliers’ solutions to combat Shanzhai: A phenomenon beyond counterfeit," Business Horizons, Elsevier, vol. 61(2), pages 229-237.
    5. Li, Ling, 2013. "Technology designed to combat fakes in the global supply chain," Business Horizons, Elsevier, vol. 56(2), pages 167-177.
    6. Michele POSTIGLIOLA, 2016. "Donatella Strangio & Giuseppe Sancetta (Eds.), Italy in a European Context: Research in Business, Economics, and the Environment," Turkish Economic Review, KSP Journals, vol. 3(1), pages 201-204, March.
    7. Abraham Yeboah & Vida Owusu-Prempeh & Samuel Adjei, 2017. "The Influence of Offline, Online Media and Counterfeit Awareness among Non-Perishable and Non-Food Products in Ghana," International Journal of Marketing Studies, Canadian Center of Science and Education, vol. 9(6), pages 31-42, December.
    8. John A. Narcum & Joshua T. Coleman, 2015. "You can`t fool me! Or can you? Assimilation and contrast effects on consumers` evaluations of product authenticity in the online environment," Journal of Asian Business Strategy, Asian Economic and Social Society, vol. 5(9), pages 200-207, September.
    9. Cesareo, Ludovica & Stöttinger, Barbara, 2015. "United we stand, divided we fall: How firms can engage consumers in their fight against counterfeits," Business Horizons, Elsevier, vol. 58(5), pages 527-537.
    10. Saleem Alhabash & Yao Dong & Charlotte Moureaud & Iago S. Muraro & John B. Hertig, 2022. "Effects of Fear and Humor Appeals in Public Service Announcements (PSAs) on Intentions to Purchase Medications via Social Media," IJERPH, MDPI, vol. 19(19), pages 1-24, September.
    11. Meraviglia, Laura, 2018. "Technology and counterfeiting in the fashion industry: Friends or foes?," Business Horizons, Elsevier, vol. 61(3), pages 467-475.
    12. Amankwah-Amoah, Joseph, 2023. "Burning issues: Unraveling the nexus between dysfunctional institutions and counterfeiting in developing countries," Social Science & Medicine, Elsevier, vol. 337(C).
    13. Nelson Borges Amaral, 2020. "What can be done to address luxury counterfeiting? An integrative review of tactics and strategies," Journal of Brand Management, Palgrave Macmillan, vol. 27(6), pages 691-709, November.
    14. Simona Romani & Giacomo Gistri & Stefano Pace, 2012. "When counterfeits raise the appeal of luxury brands," Marketing Letters, Springer, vol. 23(3), pages 807-824, September.
    15. Elton Beqiraj & Silvia Fedeli & Luisa Giuriato, 2019. "How do organized crime and counterfeit interact in Italian trading firms? An empirical analysis of their effects on trade," Working Papers in Public Economics 187, Department of Economics and Law, Sapienza University of Roma.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Bonte, Werner & Keilbach, Max, 2005. "Concubinage or marriage? Informal and formal cooperations for innovation," International Journal of Industrial Organization, Elsevier, vol. 23(3-4), pages 279-302, April.
    2. Chengli Shu & Cuijuan Liu & Shanxing Gao & Mark Shanley, 2014. "The Knowledge Spillover Theory of Entrepreneurship in Alliances," Entrepreneurship Theory and Practice, , vol. 38(4), pages 913-940, July.
    3. Bo Shen & Youwei Ke, 2017. "Causes analysis and risk control of firm knowledge loss," International Journal of System Assurance Engineering and Management, Springer;The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden, vol. 8(3), pages 2001-2008, November.
    4. Heidi Olander & Pia Hurmelinna-Laukkanen, 2015. "Proactive Hrm For Reducing Knowledge Risks — Evaluating Commitment And Trustworthiness," International Journal of Innovation Management (ijim), World Scientific Publishing Co. Pte. Ltd., vol. 19(06), pages 1-20, December.
    5. Ding, Xiu-Hao & Huang, Rui-Hua, 2010. "Effects of knowledge spillover on inter-organizational resource sharing decision in collaborative knowledge creation," European Journal of Operational Research, Elsevier, vol. 201(3), pages 949-959, March.
    6. Fav Lai & Shun-Chiao Chang, 2012. "Consumers’ choices, infringements and market competition," European Journal of Law and Economics, Springer, vol. 34(1), pages 77-103, August.
    7. Li, Ling, 2013. "Technology designed to combat fakes in the global supply chain," Business Horizons, Elsevier, vol. 56(2), pages 167-177.
    8. Stumpf, Stephen A. & Chaudhry, Peggy, 2010. "Country matters: Executives weigh in on the causes and counter measures of counterfeit trade," Business Horizons, Elsevier, vol. 53(3), pages 305-314, May.
    9. Xiu-Hao Ding & Rui-Hua Huang & Dong-Lin Liu, 2012. "Resource allocation for open and hidden learning in learning alliances," Asia Pacific Journal of Management, Springer, vol. 29(1), pages 103-127, March.
    10. Nasr, Eman S. & Kilgour, Marc D. & Noori, Hamid, 2015. "Strategizing niceness in co-opetition: The case of knowledge exchange in supply chain innovation projects," European Journal of Operational Research, Elsevier, vol. 244(3), pages 845-854.
    11. Müller, Dirk, 2010. "Alliance Coordination, Dysfunctions, and the Protection of Idiosyncratic Knowledge in Strategic Learning Alliances," EconStor Preprints 41039, ZBW - Leibniz Information Centre for Economics.
    12. Aschmoneit, Hauke & Schneider, Martin, 2011. "Kundenverhalten im Kontext der Produkt- und Markenpiraterie: Eine empirische Analyse bei hessischen Studierenden zur Abgrenzung von Verhaltensdeterminanten," Discussion Papers on Strategy and Innovation 11-03, Philipps-University Marburg, Department of Technology and Innovation Management (TIM).
    13. Nill, Alexander & Shultz II, Clifford J., 2009. "Global software piracy: Trends and strategic considerations," Business Horizons, Elsevier, vol. 52(3), pages 289-298, May.
    14. Chaudhry, Peggy E. & Zimmerman, Alan & Peters, Jonathan R. & Cordell, Victor V., 2009. "Preserving intellectual property rights: Managerial insight into the escalating counterfeit market quandary," Business Horizons, Elsevier, vol. 52(1), pages 57-66.
    15. Chris Huxham & Paul Hibbert, 2008. "Manifested Attitudes: Intricacies of Inter‐Partner Learning in Collaboration," Journal of Management Studies, Wiley Blackwell, vol. 45(3), pages 502-529, May.
    16. Gull, Isabel, 2013. "Das Management von Innovationsclustern: Die operative Clusterführung," Arbeitspapiere 137, University of Münster, Institute for Cooperatives.

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:bushor:v:51:y:2008:i:3:p:191-199. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/bushor .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.