Counterfeit trade - economics and countermeasures:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Abschlussarbeit Buch |
Sprache: | English |
Veröffentlicht: |
2007
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | V, 254 S. graph. Darst. |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV022890644 | ||
003 | DE-604 | ||
005 | 20080310 | ||
007 | t | ||
008 | 071018s2007 d||| m||| 00||| eng d | ||
035 | |a (OCoLC)181103173 | ||
035 | |a (DE-599)BVBBV022890644 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-19 |a DE-384 |a DE-355 |a DE-188 | ||
084 | |a QM 230 |0 (DE-625)141771: |2 rvk | ||
100 | 1 | |a Staake, Thorsten |d 1978- |e Verfasser |0 (DE-588)133613119 |4 aut | |
245 | 1 | 0 | |a Counterfeit trade - economics and countermeasures |c Thorsten Robert Staake |
264 | 1 | |c 2007 | |
300 | |a V, 254 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
502 | |a St. Gallen, Univ., Diss., 2007 | ||
650 | 0 | 7 | |a Handel |0 (DE-588)4023222-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Imitationsprodukt |0 (DE-588)4232796-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Produktpiraterie |0 (DE-588)4246534-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Außenhandel |0 (DE-588)4003832-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Abwehr |0 (DE-588)4141194-8 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4113937-9 |a Hochschulschrift |2 gnd-content | |
689 | 0 | 0 | |a Produktpiraterie |0 (DE-588)4246534-5 |D s |
689 | 0 | 1 | |a Außenhandel |0 (DE-588)4003832-4 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Imitationsprodukt |0 (DE-588)4232796-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Produktpiraterie |0 (DE-588)4246534-5 |D s |
689 | 2 | 1 | |a Abwehr |0 (DE-588)4141194-8 |D s |
689 | 2 | |5 DE-188 | |
689 | 3 | 0 | |a Imitationsprodukt |0 (DE-588)4232796-9 |D s |
689 | 3 | 1 | |a Handel |0 (DE-588)4023222-0 |D s |
689 | 3 | 2 | |a Abwehr |0 (DE-588)4141194-8 |D s |
689 | 3 | |5 DE-188 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016095492&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016095492 |
Datensatz im Suchindex
_version_ | 1804137158832816128 |
---|---|
adam_text | Table of contents
I Introduction...................................................................................................1
1.1 Problem statement......................................................................................1
1.2 Research gaps and object of research........................................................5
1.3 Research methodology.............................................................................!4
1.4 Target group and structure of the thesis...................................................17
1.5 Terms and definitions...............................................................................19
II Related work................................................................................................23
11.1 General descriptions of the counterfeit phenomenon..............................23
11.2 Supply and demand side investigations.................................................25
11.3 Impact analyses and managerial countermeasures...................................27
11.4 An overview of scholarly contributions...................................................30
11.5 RFID and its application as an anti counterfeiting measure....................36
III A model to estimate the market share of counterfeit articles.................43
III. 1 A critique of existing approaches.............................................................44
111.2 A framework to estimate the extent of counterfeit trade.........................48
111.3 Exemplary macroeconomic calculations.................................................56
111.4 Exemplary microeconomic calculations..................................................65
111.5 Summary..................................................................................................68
IV An analysis of the mechanisms of counterfeit trade................................71
IV.1 Producers of counterfeit goods................................................................71
IV.2 The flow of counterfeit goods..................................................................87
IV.3 Sales of counterfeit goods and the role of the consumer.........................91
1V.4 Summary..................................................................................................99
V An approach to estimate the impact of product counterfeiting............101
V.I Quantification of the loss of revenue.....................................................101
V.2 Impact on reputation and brand value....................................................109
V.3 Impact on quality costs and liability claims...........................................117
V.4 Impact on future competition and positive side effects.........................120
V.5 Summary................................................................................................123
Table of contents
VI Organizational anti counterfeiting measures.........................................125
VI.1 The status quo of anti counterfeiting measures.....................................125
VI.2 Monitoring.............................................................................................134
VI.3 Prevention..............................................................................................138
VI.4 Reaction.................................................................................................142
VI.5 Summary................................................................................................143
VII A Radio Frequency Identification based approach towards supply
chain security.............................................................................................145
VII. 1 RFID technology and the EPC Network................................................146
VII.2 Requirement analysis.............................................................................150
VII.3 Solution concept.....................................................................................157
V1I.4 Summary................................................................................................172
VIII The impact of RFID technology on counterfeit trade............................173
VIII. 1 Application scenarios.............................................................................173
VIII.2 The potential of RFID to avert counterfeit trade...................................178
VIII.3 Cost benefit consideration for anti counterfeiting measures.................184
VIII.4 Summary................................................................................................195
IX Implications and perspectives..................................................................199
IX.l Key findings of the thesis......................................................................199
IX.2 Theoretical and practical implications...................................................203
IX.3 Future research.......................................................................................207
IX.4 Concluding remarks...............................................................................208
X Appendix....................................................................................................211
X.I Questionnaire of the benchmarking study.............................................211
X.2 Questionnaire of the consumer survey...................................................219
XI Index...........................................................................................................227
|
adam_txt |
Table of contents
I Introduction.1
1.1 Problem statement.1
1.2 Research gaps and object of research.5
1.3 Research methodology.!4
1.4 Target group and structure of the thesis.17
1.5 Terms and definitions.19
II Related work.23
11.1 General descriptions of the counterfeit phenomenon.23
11.2 Supply and demand side investigations.25
11.3 Impact analyses and managerial countermeasures.27
11.4 An overview of scholarly contributions.30
11.5 RFID and its application as an anti counterfeiting measure.36
III A model to estimate the market share of counterfeit articles.43
III. 1 A critique of existing approaches.44
111.2 A framework to estimate the extent of counterfeit trade.48
111.3 Exemplary macroeconomic calculations.56
111.4 Exemplary microeconomic calculations.65
111.5 Summary.68
IV An analysis of the mechanisms of counterfeit trade.71
IV.1 Producers of counterfeit goods.71
IV.2 The flow of counterfeit goods.87
IV.3 Sales of counterfeit goods and the role of the consumer.91
1V.4 Summary.99
V An approach to estimate the impact of product counterfeiting.101
V.I Quantification of the loss of revenue.101
V.2 Impact on reputation and brand value.109
V.3 Impact on quality costs and liability claims.117
V.4 Impact on future competition and positive side effects.120
V.5 Summary.123
Table of contents
VI Organizational anti counterfeiting measures.125
VI.1 The status quo of anti counterfeiting measures.125
VI.2 Monitoring.134
VI.3 Prevention.138
VI.4 Reaction.142
VI.5 Summary.143
VII A Radio Frequency Identification based approach towards supply
chain security.145
VII. 1 RFID technology and the EPC Network.146
VII.2 Requirement analysis.150
VII.3 Solution concept.157
V1I.4 Summary.172
VIII The impact of RFID technology on counterfeit trade.173
VIII. 1 Application scenarios.173
VIII.2 The potential of RFID to avert counterfeit trade.178
VIII.3 Cost benefit consideration for anti counterfeiting measures.184
VIII.4 Summary.195
IX Implications and perspectives.199
IX.l Key findings of the thesis.199
IX.2 Theoretical and practical implications.203
IX.3 Future research.207
IX.4 Concluding remarks.208
X Appendix.211
X.I Questionnaire of the benchmarking study.211
X.2 Questionnaire of the consumer survey.219
XI Index.227 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Staake, Thorsten 1978- |
author_GND | (DE-588)133613119 |
author_facet | Staake, Thorsten 1978- |
author_role | aut |
author_sort | Staake, Thorsten 1978- |
author_variant | t s ts |
building | Verbundindex |
bvnumber | BV022890644 |
classification_rvk | QM 230 |
ctrlnum | (OCoLC)181103173 (DE-599)BVBBV022890644 |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
format | Thesis Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01923nam a2200493 c 4500</leader><controlfield tag="001">BV022890644</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080310 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">071018s2007 d||| m||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)181103173</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022890644</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QM 230</subfield><subfield code="0">(DE-625)141771:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Staake, Thorsten</subfield><subfield code="d">1978-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)133613119</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Counterfeit trade - economics and countermeasures</subfield><subfield code="c">Thorsten Robert Staake</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">V, 254 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="502" ind1=" " ind2=" "><subfield code="a">St. Gallen, Univ., Diss., 2007</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Handel</subfield><subfield code="0">(DE-588)4023222-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Imitationsprodukt</subfield><subfield code="0">(DE-588)4232796-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Produktpiraterie</subfield><subfield code="0">(DE-588)4246534-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Außenhandel</subfield><subfield code="0">(DE-588)4003832-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Abwehr</subfield><subfield code="0">(DE-588)4141194-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4113937-9</subfield><subfield code="a">Hochschulschrift</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Produktpiraterie</subfield><subfield code="0">(DE-588)4246534-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Außenhandel</subfield><subfield code="0">(DE-588)4003832-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Imitationsprodukt</subfield><subfield code="0">(DE-588)4232796-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Produktpiraterie</subfield><subfield code="0">(DE-588)4246534-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Abwehr</subfield><subfield code="0">(DE-588)4141194-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-188</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Imitationsprodukt</subfield><subfield code="0">(DE-588)4232796-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Handel</subfield><subfield code="0">(DE-588)4023222-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="2"><subfield code="a">Abwehr</subfield><subfield code="0">(DE-588)4141194-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-188</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016095492&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016095492</subfield></datafield></record></collection> |
genre | (DE-588)4113937-9 Hochschulschrift gnd-content |
genre_facet | Hochschulschrift |
id | DE-604.BV022890644 |
illustrated | Illustrated |
index_date | 2024-07-02T18:53:33Z |
indexdate | 2024-07-09T21:07:51Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016095492 |
oclc_num | 181103173 |
open_access_boolean | |
owner | DE-19 DE-BY-UBM DE-384 DE-355 DE-BY-UBR DE-188 |
owner_facet | DE-19 DE-BY-UBM DE-384 DE-355 DE-BY-UBR DE-188 |
physical | V, 254 S. graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
record_format | marc |
spelling | Staake, Thorsten 1978- Verfasser (DE-588)133613119 aut Counterfeit trade - economics and countermeasures Thorsten Robert Staake 2007 V, 254 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier St. Gallen, Univ., Diss., 2007 Handel (DE-588)4023222-0 gnd rswk-swf Imitationsprodukt (DE-588)4232796-9 gnd rswk-swf Produktpiraterie (DE-588)4246534-5 gnd rswk-swf Außenhandel (DE-588)4003832-4 gnd rswk-swf Abwehr (DE-588)4141194-8 gnd rswk-swf (DE-588)4113937-9 Hochschulschrift gnd-content Produktpiraterie (DE-588)4246534-5 s Außenhandel (DE-588)4003832-4 s DE-604 Imitationsprodukt (DE-588)4232796-9 s Abwehr (DE-588)4141194-8 s DE-188 Handel (DE-588)4023222-0 s HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016095492&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Staake, Thorsten 1978- Counterfeit trade - economics and countermeasures Handel (DE-588)4023222-0 gnd Imitationsprodukt (DE-588)4232796-9 gnd Produktpiraterie (DE-588)4246534-5 gnd Außenhandel (DE-588)4003832-4 gnd Abwehr (DE-588)4141194-8 gnd |
subject_GND | (DE-588)4023222-0 (DE-588)4232796-9 (DE-588)4246534-5 (DE-588)4003832-4 (DE-588)4141194-8 (DE-588)4113937-9 |
title | Counterfeit trade - economics and countermeasures |
title_auth | Counterfeit trade - economics and countermeasures |
title_exact_search | Counterfeit trade - economics and countermeasures |
title_exact_search_txtP | Counterfeit trade - economics and countermeasures |
title_full | Counterfeit trade - economics and countermeasures Thorsten Robert Staake |
title_fullStr | Counterfeit trade - economics and countermeasures Thorsten Robert Staake |
title_full_unstemmed | Counterfeit trade - economics and countermeasures Thorsten Robert Staake |
title_short | Counterfeit trade - economics and countermeasures |
title_sort | counterfeit trade economics and countermeasures |
topic | Handel (DE-588)4023222-0 gnd Imitationsprodukt (DE-588)4232796-9 gnd Produktpiraterie (DE-588)4246534-5 gnd Außenhandel (DE-588)4003832-4 gnd Abwehr (DE-588)4141194-8 gnd |
topic_facet | Handel Imitationsprodukt Produktpiraterie Außenhandel Abwehr Hochschulschrift |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016095492&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT staakethorsten counterfeittradeeconomicsandcountermeasures |