It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 03760cam 2200445 a 4500
001 9920574510001661
005 20150423130645.0
008 080121s2008 gw a b 001 0 eng
010 $a 2008923855
015 $aGBA887410$2bnb
016 7 $a014515226$2Uk
019 $a191760019
020 $a9783540769460 (hbk.)
020 $a3540769463 (hbk.)
029 1 $aNZ1$b12507653
035 $a(CSdNU)u336002-01national_inst
035 $a(OCoLC)234294078
035 $a(OCoLC)234294078
035 $a(OCoLC)234294078$z(OCoLC)191760019
040 $aUKM$cUKM$dBWX$dYDXCP$dBAKER$dOCLCQ$dIXA$dOrLoB-B
042 $aukblcatcopy
049 $aCNUM
050 4 $aHF1040.7$b.S73 2008
082 04 $a364.133$222
100 1 $aStaake, Thorsten.
245 10 $aCountering counterfeit trade :$billicit market insights, best-practice strategies, and management toolbox /$cThorsten Staake, Elgar Fleisch.
260 $aBerlin :$bSpringer,$cc2008.
300 $axvii, 229 p. :$bill. ;$c25 cm.
504 $aIncludes bibliographical references (p. [211]-224) and index.
505 0 $a1. An Introduction to Counterfeit Markets -- 1.1. The changing nature of counterfeittrade -- 1.2. A global problem - Frequently discussed, little understood -- 1.3. Counterfeiting is not parallel trade is not overproduction - Why a clear problem definition is needed -- 1.4. Academic publications on counterfeit trade -- 2. Understanding Counterfeit Supply -- 2.1. Strategies and production settings of counterfeit producers -- 2.2. Distribution channels and shipment strategies for illicit goods -- 2.3. Exploring the counterfeiters' business case -- 2.4. Research on counterfeit supply -- 3. Counterfeit Demandand the Role of the Consumer -- 3.1. Consumer behavior in counterfeitmarkets -- 3.2. Developing brand-and product-specific consumer studies -- 3.3. Research in counterfeit demand -- 4. Established Anti-counterfeiting Approaches - Best Practices -- 4.1. State-of-the-art in anti-counterfeiting -- 4.2. The characteristics of successful practices -- 4.3. Research on managerial and legal countermeasures -- 5. Implementing Anti-counterfeiting Measures -- 5.1. Monitoring processes -- 5.2. Reaction processes -- 5.3. Preventive measures -- 5.4. Organizational structure of anti-counterfeiting units -- 6. Determiningthe Market Share of Counterfeit Articles -- 6.1. A critique of existing statistics -- 6.2. Macroeconomic calculations -- 6.3. Microeconomic calculations -- 7. Implications for Affected Enterprises -- 7.1. Quantifying the loss of revenue -- 7.2. A model to assess the impact on brand value -- 7.3. Implications for quality costs, liability claims, and future competition -- 7.4. Positive effects of counterfeit trade -- 7.5. Research on the impact of counterfeit trade -- 8. Principles of Product Security Features -- 8.1. Classification of protection technologies -- 8.2. Attack scenarios and their implications -- 8.3. Requirements for security features -- 9. The Potential of RFlD for Brand- and Product-protection -- 9.1. An introduction to the Internet of Things -- 9.2. Technical principles of RFlD technology -- 9.3. Solution concepts -- 9.4. Application scenarios -- 10. Guidelines -- 11. Concluding Remarks.
650 0 $aProduct counterfeiting$xPrevention.
650 0 $aProduct counterfeiting.
700 1 $aFleisch, Elgar.
938 $aBlackwell Book Service$bBBUS$nR3736716$c$79.95
938 $aYBP Library Services$bYANK$n2764543
938 $aBaker & Taylor$bBKTY$c89.95$d89.95$i3540769463$n0007600300$sactive
947 $fCOLS-CJ$hCIRCSTACKS$p$77.36$q1
949 $aHF 1040.7 .S73 2008$i31786102448849
994 $a92$bCNU
999 $aHF 1040.7 .S73 2008$wLC$c1$i31786102448849$lCIRCSTACKS$mNULS$rY$sY $tBOOK$u11/11/2008