Abstract

There is growing awareness of the increasing scope, scale, and threat of product counterfeiting. Awareness is also growing for the drafting of countermeasures that specifically address deceptive and non-deceptive counterfeiting. This research developed a method and tool to help review, understand, and cluster product-counterfeiting incidents. The intent is to assist brand owners and government agencies select effective countermeasures. The research builds upon earlier work that developed a typology of product counterfeiters, counterfeiting and offender groups, which is used here to create an original tool to organize and cluster the incidents. While incident data is often confidential or classified, several methods were used to access open-source information in order to apply the tool. First, a set of examples was selected from the literature to demonstrate the tool in principle. Second, in order to examine a complete data set of counterfeiting incidents, the open-source cases of the U.S. National Intellectual Property Rights Center were gathered, reviewed, coded, and analyzed to demonstrate the application of the tool. A Product-Counterfeiting Incident Cluster Tool was developed which is consistent with Routine Activity Theory and Situational Crime Prevention and is intended to identify efficient and effective countermeasures. It is important to establish the type of fraud and the fraudster when developing anti-counterfeit strategies. The insight gained from assessing the specific product-counterfeiting incidents will assist in the profiling and selection of effective industry and government countermeasures. The scientific basis for understanding product counterfeiting is broadened by applying the outlined concepts and describing incidences through the clustering tool.

Highlights

  • There is limited research on product counterfeiting though there is growing activity in the literature and through conference presentations and other events

  • Product counterfeiting is growing in scope, scale, and threat (US Food and Drug Administration [FDA] 2006, 2010, World Customs Organization [WCO] 2007, World Health Organization [WHO] 2007, Organization for Economic Co-operation and Development [OECD] 2007, INTERPOL 2007)

  • For these reasons open-source information was gathered from the research literature and from the U.S National Intellectual Property Rights Center (IPR Center)

Read more

Summary

Introduction

There is limited research on product counterfeiting though there is growing activity in the literature and through conference presentations and other events. With a productcounterfeiting typology established, this research expands on intelligence gathering of the counterfeiting incidents with the aim of developing a product-counterfeiting incident cluster tool intended to help organize product counterfeit incidents. There is growing awareness of the increasing scope, scale, and threat of product counterfeiting. This research developed a method and tool to help review, understand, and cluster product-counterfeiting incidents. Product counterfeiting is growing in scope, scale, and threat (US Food and Drug Administration [FDA] 2006, 2010, World Customs Organization [WCO] 2007, World Health Organization [WHO] 2007, Organization for Economic Co-operation and Development [OECD] 2007, INTERPOL 2007). Examples include lethal doses of melamine in milk, carcinogenic additives in sauces, medicine with no active ingredients or toxic levels of the correct ingredient, substandard counterfeit aircraft parts, and household appliances that catch fire (Hopkins et al 2003)

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.