807
Views
16
CrossRef citations to date
0
Altmetric
Articles

Using social network analysis to combat counterfeiting

&
Pages 4456-4468 | Received 20 Oct 2012, Accepted 28 Oct 2013, Published online: 29 Nov 2013

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (1)

Jeremy M. Wilson & Clifford A. Grammich. (2021) Protecting brands from counterfeiting risks: tactics of a total business solution. Journal of Risk Research 24:9, pages 1141-1160.
Read now

Articles from other publishers (15)

Tianyu Hou, Yue Fang, Julie Juan Li, Jun Lin & Qin Su. (2024) Building Organizational Resilience: The Role of Supply Chain Board Members and in Supply Network Positions. IEEE Transactions on Engineering Management 71, pages 6929-6949.
Crossref
Samar Saleh, Rong Lei, Weihong Guo & Elsayed A. Elsayed. 2023. Proceedings of Seventh International Congress on Information and Communication Technology. Proceedings of Seventh International Congress on Information and Communication Technology 849 870 .
Faeze Rezazade, Jane Summers & Derek Ong Lai Teik. (2021) Identifying food fraud vulnerability factors in food fraud incidents – a review of global incidents 2000–2018. British Food Journal 124:11, pages 4122-4142.
Crossref
Eugene E. Mniwasa. 2022. Counterfeiting and Fraud in Supply Chains. Counterfeiting and Fraud in Supply Chains 171 204 .
Adhe Rizky Anugerah, Prafajar Suksessanno Muttaqin & Wahyu Trinarningsih. (2022) Social network analysis in business and management research: A bibliometric analysis of the research trend and performance from 2001 to 2020. Heliyon 8:4, pages e09270.
Crossref
Faeze Rezazade, Jane Summers & Derek Ong Lai Teik. (2022) A holistic approach to food fraud vulnerability assessment. Food Control 131, pages 108440.
Crossref
Di Xiao, Qianqian Yang, Qi Sun & Huimin Fang. (2021) Vertical Channel Conflict Coordination Strategy of e-Commerce Supply Chain under Platform Brand Empowerment. Mathematical Problems in Engineering 2021, pages 1-24.
Crossref
Jichao Li, Bingfeng Ge, Jiang Jiang, Kewei Yang & Yingwu Chen. (2018) High-end weapon equipment portfolio selection based on a heterogeneous network model. Journal of Global Optimization 78:4, pages 743-761.
Crossref
Yujia Han, Nigel David Caldwell & Abhijeet Ghadge. (2020) Social network analysis in operations and supply chain management: a review and revised research agenda. International Journal of Operations & Production Management 40:7/8, pages 1153-1176.
Crossref
Norizan M. Kassim, Mohamed Zain, Naima Bogari & Khurram Sharif. (2020) Why do consumers buy counterfeit luxury products? A tale of two major cities in two different countries. Asia Pacific Journal of Marketing and Logistics 33:2, pages 416-446.
Crossref
Xiong Li, Xiao-dong Zhao & Wei Pu. (2020) Knowledge-oriented modeling for influencing factors of battle damage in military industrial logistics: An integrated method. Defence Technology 16:3, pages 571-587.
Crossref
Ming Cheung, James She, Weiwei Sun & Jiantao Zhou. (2019) Detecting Online Counterfeit-goods Seller using Connection Discovery. ACM Transactions on Multimedia Computing, Communications, and Applications 15:2, pages 1-16.
Crossref
Mengxiao Li, Yu Feng, Qingyong Tian, Weijing Yao, Li Liu, Xuan Li, Huanjun Wang & Wei Wu. (2018) Tunable and ultra-stable UV light-switchable fluorescent composites for information hiding and storage. Dalton Transactions 47:32, pages 11264-11271.
Crossref
Jiaxing Wang, Ya Gao, Junji Zhang & He Tian. (2017) Invisible photochromism and optical anti-counterfeiting based on D–A type inverse diarylethene. Journal of Materials Chemistry C 5:18, pages 4571-4577.
Crossref
Diane Aparecida dos Reis Silva, Diego Honorato Clemente, José Daniel Rodrigues Terra, Karyn Martinelli Lopes, Marly Monteiro de Carvalho, André Leme Fleury, Eduardo de Senzi Zancul & Roberto Marx. (2016) Aspectos comportamentais na gestão de projetos: uma análise bibliométrica (1988-2014). Gestão & Produção 24:1, pages 178-200.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.