References
- Allesina, S., A. Azzi, D. Battini, and A. Regattieri. 2010. “Performance Measurement in Supply Chains: New Network Analysis and Entropic Indexes.” International Journal of Production Research 48 (8): 2297–2321.
- Bastia, S. 2002. “Next Generation Technologies to Combat Counterfeiting of Electronic Components.” IEEE Transactions on Components and Packaging Technologies 25 (1): 175–176.
- Benta, M. I. 2005. “Studying Communication Networks with Agna 2.1.” Cognition Brain Behavior 9 (3): 567–574.
- Bezuidenhout, C. S., S. Bodhanya, T. Sanjika, M. Sibomana, and G. L. N. Boote. 2012. “Network-analysis Approaches to Deal with Causal Complexity in a Supply Network.” International Journal of Production Research 50 (7): 1840–1849.
- Borgatti, S. P., and X. Li. 2009. “On Social Network Analysis in a Supply Chain Context.” Journal of Supply Chain Management 45 (2): 5–22.
- Brinkerhoff, D. 2004. “Accountability and Health Systems: Toward Conceptual Clarity and Policy Relevance.” Health Policy and Planning 19 (6): 371–379.
- Burton, W. C. 2007. Counterfeiting Legal Definition of Counterfeiting. Accessed July 25, 2011. http://legal-dictionary.thefreedictionary.com/counterfeiting.
- Chen, I. J., and A. Paulraj. 2004. “Understanding Supply Chain Management: Critical Research and a Theoretical Framework.” International Journal of Production Research 42 (1): 131–163.
- Christopher, M. 1992. Logistic and Supply Chain Management. London: Pitman.
- Cockcroft, S. (2010). “The Use of Social Network Analysis to Explore relationships Between the Medical Informatics and Information Systems Literature.” In AMCIS 2010 Proceedings, 551, Pittsburgh, PA.
- DuPont. 2010. Counterfeiting and Fraud Threaten Consumers and Businesses. Accessed July 25, 2012. http://www2.dupont.com/Authentication/en_US/assets/downloads/Counterfeit_Facts.pdf.
- Elif, A. E. 2010. “The Rise in the Sales of Counterfeit Brands: The Case of Turkish Consumers.” African Journal of Business Management 4 (10): 2181–2186.
- Freeman, L. C. 1977. “A Set of Measures of Centrality Based on Betweenness.” Sociometry 40: 35–41.
- Freeman, L. C. 1979. “Centrality in Social Networks: Conceptual Clarification.” Social Networks 1 (3): 215–239.
- Gabara, I. I., and C. Krause. 2003. Global Counterfeiting: Background Document. Accessed July 25, 2012. http://counterfeiting.unicri.it/docs/Global%20counterfeiting%20background.pdf.
- Havocscope. 2010. Havocscope Global Counterfeit Goods Value. Accessed 4 March, 2012. http://www.havocscope.com/counterfeit-goods-ranking.
- Henderson, L. 2001. Factors Which Allow the White Collar Crime Problem to Continue Unabated. Accessed November 13. http://www.crimes-of-persuasion.com/laws/problems.htm.
- Hopkins, D. M., L. T. Kontnik, and M. T. Turnage. 2003. Counterfeiting Exposed: Protecting Your Brand and Customers. Hoboken: John Wiley.
- Hung, C. L. 2003. “The Business of Product Counterfeiting in China and the Post-WTO Membership Environment.” Asia Pacific Business Review 10 (1): 58–77.
- Ilie-Zudor, E., Z. Kemény, F. van Blommestein, L. Monostori, and A. van der Meulen. 2010. “A Survey of Applications and Requirements of Unique Identification Systems and RFID Techniques.” Computers in Industry 62 (3): 227–252.
- Kerbache, L., and J. M. Smith. 2004. “Queuing Networks and the Topological Logistics of Supply with Systems.” International Journal of Production Economics 91 (3): 251–272.
- Kilduff, M., and W. Tsai. 2003. Social Networks and Organizations. Thousand Oaks, CA: Sage.
- Knoke, D., and S. Yang. 2008. Social Network Analysis. Newberry Park, CA: Sage.
- Kuglin, F. A., and B. A. Rosenbaum. 2000. The Supply Chain Network @ Internet Speed: Preparing Your Company for the E-commerce Revolution. New York: American Management Association.
- Kwok, S. K., A. H. C. Tsang, J. S. L. Ting, W. B. Lee, and B. C. F. Cheung. 2008. “An Intelligent RFID-based Electronic Anti-counterfeit System (InRECS) for the Manufacturing Industry.” In Proceedings of the 17th World Congress, The International Federation of Automatic Control, July 6–11, 548–548. Seoul, Korea.
- Kwok, S. K., S. L. Ting, A. H. C. Tsang, and C. F. Cheung. 2010. “A Counterfeit Network Analyzer Based on RFID and EPC.” Industrial Management & Data Systems 110 (7): 1018–1037.
- Lazzarini, S. G., F. R. Chaddad, and M. L. Cook. 2001. “Integrating Supply Chain and Network Analyses: The Study of Netchains.” Journal of Chain and Network Science 1 (1): 7–22.
- Lehtonen, M., T. Staake, and F. Michahelles. 2008. “From Identification to Authentication – A Review of RFID Product Authentication Techniques.” In Networked RFID Systems and Lightweight Cryptography (Book Chapter), edited by Peter H. Cole and Damith C. Ranasinghe, 169–187. Berlin: Springer.
- Liu, B. 2011. Web Data Mining. Berlin: Springer.
- Marsden, P. V. 1990. “Network Data and Measurement.” Annual Review of Sociology 16: 435–463.
- Matos, C. A., C. T. Ituassu, and C. A. Rossi. 2007. “Consumer Attitudes toward Counterfeits: A Review and Extension.” Journal of Consumer Marketing 24 (1): 36–47.
- Morrison, W. M. 2012. China-U.S. Trade Issues. Washington, DC: Congressional Research Service.
- NetMiner. 2006. Netminer Overview. Accessed May 17, 2012. http://www.netminer.com/NetMiner/overview_01.jsp.
- Pike, J. 2000. International Crime Threat Assessment. US Government Interagency Working Group. Accessed May 7, 2012. http://www.fas.org/irp/threat/pub45270chap2.html.
- Power, G. 2009. Anti-counterfeit Technologies for the Protection of Medicines. Geneva: World Health Organization.
- Raghavan, N. R. S., and N. Viswanadham. 2010. “Generalized Queueing Network Analysis of Integrated Supply Chains.” International Journal of Production Research 39 (2): 205–224.
- Spink, J. 2011. “Overview of the selection of strategic authentication and tracing programmes.” In Counterfeit Medicines Volume I: Policy, Economics and Countermeasures (Book Chapter), edited by Albert I. Wertheimer and Perry G. Wang, 111–128. Hertfordshire: ILM.
- Swaminathan, A., G. Hoetker, and W. Mitchell. 2002. Network Structure and Business Survival: The Case of U.S. Automobile Component Suppliers. Working Paper.
- The Canadian Chamber of Commerce and the Retail Council of Canada. 2007. The Problems Underlying Canada’s Failed IP Enforcement System, 25–41. Report on Counterfeiting and Piracy in Canada: A Road Map for Change.
- Ting, S. L., S. K. Kwok, A. H. C. Tsang, and W. B. Lee. 2011. “Critical Elements and Lessons Learnt from the Implementation of an RFID-enabled Healthcare Management System in a Medical Organization.” Journal of Medical Systems 35 (4): 657–669.
- Wong, K. H. M., P. C. L. Hui, and A. C. K. Chan. 2006. “Cryptography and Authentication on RFID Passive Tags for Apparel Products.” Computers in Industry 57 (4): 342–349.