You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The book constitutes a unique combination of in-depth insights into the counterfeit market, best-practice strategies, novel management tools, and product protection technologies. It provides both the insights required to develop effective brand and product protection strategies, and the insights that are required to effectively respond to counterfeit trade. Key benefits are the unbiased analysis of the counterfeit market, the strong focus on assisting practitioners to deal with the challenge, and the high standard of research that supports the presented findings.
This book explores the consumption of counterfeit fashion goods. Despite the importance of the consumer in counterfeiting policy, there has been a lack of attention within criminology about the demand for counterfeit goods. A tendency to explain counterfeit consumption through deviance or ‘othering’ reinforces stereotypical assumptions about consumers and overplays the importance of superficial factors in consumption. This book develops an understanding of why counterfeit markets exist through exploring consumer behavior in consuming counterfeit fashion, and examining this in relation to attitudes on fashion, crime, harm and victimization. The book argues that there is a need to consider demand for illicit goods within a broader understanding of the nature of fashion and the fashion industry. This book will appeal to those with an interest in illicit markets, consumer behavior, fashion, criminology, and the harms associated with fashion and consumer industries more generally.
The expansion of world trade has brought with it an explosive growth in counterfeit merchandise. Estimates put the world total for counterfeit products at about one half trillion dollars annually, although it is impossible to accurately determine the true size of the counterfeit market. What is known is that this illicit trade has infected nearly every industry from pharmaceuticals to aircraft parts. Software and music piracy are easy targets widely reported in the media. In 2007, the Business Software Alliance (BSA) estimated that 38% of personal computer software installed worldwide was illegal and the losses to the software industry were $48 billion worldwide. The Recording Industry Assoc...
This unique Handbook provides multiple perspectives on the growth of illicit trade, primarily exploring counterfeits and internet piracy. It includes expert opinion on a wide range of topics including the evaluation of key global enforcement issues, government and private-sector agency initiatives to stifle illicit trade, and the evolution of piracy on the internet. The authors also assess the efficacy of anti-counterfeiting strategies such as targeted consumer campaigns, working with intermediaries in the supply chain, authentication technology, and online brand protection.
This book overviews and integrates the business and technical issues that pharmaceutical companies need to know in order to combat the major global problem of counterfeit medicines. In addition to discussion of the problems, the author Davison addresses analytical techniques scientists use to detect counterfeits and presents some possible solutions to the threat of counterfeit medical products. Coverage moves from basic overview of the problem, costs / risks to consumers (toxic products, mistrust of drug companies) and business (revenue loss, public trust), government oversight and regulation, authentication strategies (packaging, analytical techniques), product tracking and supply chain, and case studies from around the globe.
Prior to the Civil War, the United States did not have a single, national currency. Counterfeiters flourished amid this anarchy, putting vast quantities of bogus bills into circulation. Their success, Mihm reveals, is more than an entertaining tale of criminal enterprise: it is the story of the rise of a country defined by freewheeling capitalism and little government control. Mihm shows how eventually the older monetary system was dismantled, along with the counterfeit economy it sustained.
HUSTLERS meets BIG LITTLE LIES in the heist of the summer... A NEW YORK TIMES BESTSELLER ‘Propulsive and captivating’ Vogue ‘Darkly comedic’ Daily Mail
This study examines the value, scope and trends of trade in counterfeit and pirated goods. First, it presents the overall scale of this trade and discusses which parts of the economy are particularly at risk. Next, it looks at the main economies of origin of fakes in global trade. Finally, it ...
Why should the supply chain be concerned if their buyers or subcontractors are purchasing counterfeit electronic parts or if their products contain counterfeit electronic parts? If these parts end up in items that are safety critical and security-risk sensitive such as aviation, space, and defense products, whole secure systems can be comprised. As organizations have become aware of counterfeit parts, one of their responses may be to test upon acceptance or prior to receipt. But testing alone may not detect all counterfeits. Possible sources of counterfeits include products that did not meet quality control requirements and were not destroyed, overruns sold into the market place, unauthorize...
"Discusses the economic and financial consequences of pharmaceutical product counterfeiting and describes some of the measures that can be taken to counteract their impact"--Provided by publisher.