807
Views
16
CrossRef citations to date
0
Altmetric
Articles

Using social network analysis to combat counterfeiting

&
Pages 4456-4468 | Received 20 Oct 2012, Accepted 28 Oct 2013, Published online: 29 Nov 2013

References

  • Allesina, S., A. Azzi, D. Battini, and A. Regattieri. 2010. “Performance Measurement in Supply Chains: New Network Analysis and Entropic Indexes.” International Journal of Production Research 48 (8): 2297–2321.
  • Bastia, S. 2002. “Next Generation Technologies to Combat Counterfeiting of Electronic Components.” IEEE Transactions on Components and Packaging Technologies 25 (1): 175–176.
  • Benta, M. I. 2005. “Studying Communication Networks with Agna 2.1.” Cognition Brain Behavior 9 (3): 567–574.
  • Bezuidenhout, C. S., S. Bodhanya, T. Sanjika, M. Sibomana, and G. L. N. Boote. 2012. “Network-analysis Approaches to Deal with Causal Complexity in a Supply Network.” International Journal of Production Research 50 (7): 1840–1849.
  • Borgatti, S. P., and X. Li. 2009. “On Social Network Analysis in a Supply Chain Context.” Journal of Supply Chain Management 45 (2): 5–22.
  • Brinkerhoff, D. 2004. “Accountability and Health Systems: Toward Conceptual Clarity and Policy Relevance.” Health Policy and Planning 19 (6): 371–379.
  • Burton, W. C. 2007. Counterfeiting Legal Definition of Counterfeiting. Accessed July 25, 2011. http://legal-dictionary.thefreedictionary.com/counterfeiting.
  • Chen, I. J., and A. Paulraj. 2004. “Understanding Supply Chain Management: Critical Research and a Theoretical Framework.” International Journal of Production Research 42 (1): 131–163.
  • Christopher, M. 1992. Logistic and Supply Chain Management. London: Pitman.
  • Cockcroft, S. (2010). “The Use of Social Network Analysis to Explore relationships Between the Medical Informatics and Information Systems Literature.” In AMCIS 2010 Proceedings, 551, Pittsburgh, PA.
  • DuPont. 2010. Counterfeiting and Fraud Threaten Consumers and Businesses. Accessed July 25, 2012. http://www2.dupont.com/Authentication/en_US/assets/downloads/Counterfeit_Facts.pdf.
  • Elif, A. E. 2010. “The Rise in the Sales of Counterfeit Brands: The Case of Turkish Consumers.” African Journal of Business Management 4 (10): 2181–2186.
  • Freeman, L. C. 1977. “A Set of Measures of Centrality Based on Betweenness.” Sociometry 40: 35–41.
  • Freeman, L. C. 1979. “Centrality in Social Networks: Conceptual Clarification.” Social Networks 1 (3): 215–239.
  • Gabara, I. I., and C. Krause. 2003. Global Counterfeiting: Background Document. Accessed July 25, 2012. http://counterfeiting.unicri.it/docs/Global%20counterfeiting%20background.pdf.
  • Havocscope. 2010. Havocscope Global Counterfeit Goods Value. Accessed 4 March, 2012. http://www.havocscope.com/counterfeit-goods-ranking.
  • Henderson, L. 2001. Factors Which Allow the White Collar Crime Problem to Continue Unabated. Accessed November 13. http://www.crimes-of-persuasion.com/laws/problems.htm.
  • Hopkins, D. M., L. T. Kontnik, and M. T. Turnage. 2003. Counterfeiting Exposed: Protecting Your Brand and Customers. Hoboken: John Wiley.
  • Hung, C. L. 2003. “The Business of Product Counterfeiting in China and the Post-WTO Membership Environment.” Asia Pacific Business Review 10 (1): 58–77.
  • Ilie-Zudor, E., Z. Kemény, F. van Blommestein, L. Monostori, and A. van der Meulen. 2010. “A Survey of Applications and Requirements of Unique Identification Systems and RFID Techniques.” Computers in Industry 62 (3): 227–252.
  • Kerbache, L., and J. M. Smith. 2004. “Queuing Networks and the Topological Logistics of Supply with Systems.” International Journal of Production Economics 91 (3): 251–272.
  • Kilduff, M., and W. Tsai. 2003. Social Networks and Organizations. Thousand Oaks, CA: Sage.
  • Knoke, D., and S. Yang. 2008. Social Network Analysis. Newberry Park, CA: Sage.
  • Kuglin, F. A., and B. A. Rosenbaum. 2000. The Supply Chain Network @ Internet Speed: Preparing Your Company for the E-commerce Revolution. New York: American Management Association.
  • Kwok, S. K., A. H. C. Tsang, J. S. L. Ting, W. B. Lee, and B. C. F. Cheung. 2008. “An Intelligent RFID-based Electronic Anti-counterfeit System (InRECS) for the Manufacturing Industry.” In Proceedings of the 17th World Congress, The International Federation of Automatic Control, July 6–11, 548–548. Seoul, Korea.
  • Kwok, S. K., S. L. Ting, A. H. C. Tsang, and C. F. Cheung. 2010. “A Counterfeit Network Analyzer Based on RFID and EPC.” Industrial Management & Data Systems 110 (7): 1018–1037.
  • Lazzarini, S. G., F. R. Chaddad, and M. L. Cook. 2001. “Integrating Supply Chain and Network Analyses: The Study of Netchains.” Journal of Chain and Network Science 1 (1): 7–22.
  • Lehtonen, M., T. Staake, and F. Michahelles. 2008. “From Identification to Authentication – A Review of RFID Product Authentication Techniques.” In Networked RFID Systems and Lightweight Cryptography (Book Chapter), edited by Peter H. Cole and Damith C. Ranasinghe, 169–187. Berlin: Springer.
  • Liu, B. 2011. Web Data Mining. Berlin: Springer.
  • Marsden, P. V. 1990. “Network Data and Measurement.” Annual Review of Sociology 16: 435–463.
  • Matos, C. A., C. T. Ituassu, and C. A. Rossi. 2007. “Consumer Attitudes toward Counterfeits: A Review and Extension.” Journal of Consumer Marketing 24 (1): 36–47.
  • Morrison, W. M. 2012. China-U.S. Trade Issues. Washington, DC: Congressional Research Service.
  • NetMiner. 2006. Netminer Overview. Accessed May 17, 2012. http://www.netminer.com/NetMiner/overview_01.jsp.
  • Pike, J. 2000. International Crime Threat Assessment. US Government Interagency Working Group. Accessed May 7, 2012. http://www.fas.org/irp/threat/pub45270chap2.html.
  • Power, G. 2009. Anti-counterfeit Technologies for the Protection of Medicines. Geneva: World Health Organization.
  • Raghavan, N. R. S., and N. Viswanadham. 2010. “Generalized Queueing Network Analysis of Integrated Supply Chains.” International Journal of Production Research 39 (2): 205–224.
  • Spink, J. 2011. “Overview of the selection of strategic authentication and tracing programmes.” In Counterfeit Medicines Volume I: Policy, Economics and Countermeasures (Book Chapter), edited by Albert I. Wertheimer and Perry G. Wang, 111–128. Hertfordshire: ILM.
  • Swaminathan, A., G. Hoetker, and W. Mitchell. 2002. Network Structure and Business Survival: The Case of U.S. Automobile Component Suppliers. Working Paper.
  • The Canadian Chamber of Commerce and the Retail Council of Canada. 2007. The Problems Underlying Canada’s Failed IP Enforcement System, 25–41. Report on Counterfeiting and Piracy in Canada: A Road Map for Change.
  • Ting, S. L., S. K. Kwok, A. H. C. Tsang, and W. B. Lee. 2011. “Critical Elements and Lessons Learnt from the Implementation of an RFID-enabled Healthcare Management System in a Medical Organization.” Journal of Medical Systems 35 (4): 657–669.
  • Wong, K. H. M., P. C. L. Hui, and A. C. K. Chan. 2006. “Cryptography and Authentication on RFID Passive Tags for Apparel Products.” Computers in Industry 57 (4): 342–349.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.