Home > Research > Publications & Outputs > An exploratory analysis of counterfeiting strat...

Electronic data

Links

Text available via DOI:

View graph of relations

An exploratory analysis of counterfeiting strategies: towards counterfeit-resilient supply chains

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

An exploratory analysis of counterfeiting strategies: towards counterfeit-resilient supply chains. / Stevenson, Mark; Busby, Jeremy.
In: International Journal of Operations and Production Management, Vol. 35, No. 1, 2015, p. 110-144.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

APA

Vancouver

Stevenson M, Busby J. An exploratory analysis of counterfeiting strategies: towards counterfeit-resilient supply chains. International Journal of Operations and Production Management. 2015;35(1):110-144. doi: 10.1108/IJOPM-04-2012-0174

Author

Stevenson, Mark ; Busby, Jeremy. / An exploratory analysis of counterfeiting strategies : towards counterfeit-resilient supply chains. In: International Journal of Operations and Production Management. 2015 ; Vol. 35, No. 1. pp. 110-144.

Bibtex

@article{b08252c73dca4e48885388fafec9d7e4,
title = "An exploratory analysis of counterfeiting strategies: towards counterfeit-resilient supply chains",
abstract = "Purpose– The purpose of this paper is to identify strategies employed by product counterfeiters in their exploitation of legitimate supply chains; to develop a theoretical understanding of counterfeiting and its impact on competitive resources; and, to propose counter-measures for increasing the resilience of supply chains to the counterfeiting threat.Design/methodology/approach– An inductive, qualitative analysis of secondary case data obtained from three sources.Findings– Initial searching and coding identified four sets of strategies: extraction strategies, for obtaining products or materials from the legitimate economy; production strategies, for manufacturing counterfeit goods; distribution strategies; and, infiltration strategies, for introducing counterfeits into the legitimate economy. Secondary, focused coding revealed that much of what the counterfeiting strategies set out to achieve involves the generation, suppression or exploitation of signals. A theoretical account of counterfeiting and its impact on competitive resources (quality, reputation and trademark) is then developed based on signalling theory and the resource-based view.Research limitations/implications– A set of counter-measures for dealing with the counterfeiting threat are proposed. There is scope for much further work on counterfeit resilience, including on establishing the effectiveness of these counter-measures.Practical implications– Counterfeiting is an increasingly significant supply chain problem. It provides a direct economic challenge to legitimate producers, undermines the value of trademarks and threatens consumer welfare. It affects many industries, including automotives, aerospace and pharmaceuticals, where counterfeits have sometimes proven fatal. The paper adds to the understanding of how this phenomenon takes place and how it might be tackled.Originality/value– Although many OM studies refer to the risks of patent and copyright infringements that arise in supply chains, the problem of product counterfeiting has received only limited attention, leaving a clear gap in the understanding.",
keywords = "Resilience, Counterfeiting, Supply chain management, Secondary data, Signalling theory",
author = "Mark Stevenson and Jeremy Busby",
year = "2015",
doi = "10.1108/IJOPM-04-2012-0174",
language = "English",
volume = "35",
pages = "110--144",
journal = "International Journal of Operations and Production Management",
issn = "0144-3577",
publisher = "Emerald Group Publishing Ltd.",
number = "1",

}

RIS

TY - JOUR

T1 - An exploratory analysis of counterfeiting strategies

T2 - towards counterfeit-resilient supply chains

AU - Stevenson, Mark

AU - Busby, Jeremy

PY - 2015

Y1 - 2015

N2 - Purpose– The purpose of this paper is to identify strategies employed by product counterfeiters in their exploitation of legitimate supply chains; to develop a theoretical understanding of counterfeiting and its impact on competitive resources; and, to propose counter-measures for increasing the resilience of supply chains to the counterfeiting threat.Design/methodology/approach– An inductive, qualitative analysis of secondary case data obtained from three sources.Findings– Initial searching and coding identified four sets of strategies: extraction strategies, for obtaining products or materials from the legitimate economy; production strategies, for manufacturing counterfeit goods; distribution strategies; and, infiltration strategies, for introducing counterfeits into the legitimate economy. Secondary, focused coding revealed that much of what the counterfeiting strategies set out to achieve involves the generation, suppression or exploitation of signals. A theoretical account of counterfeiting and its impact on competitive resources (quality, reputation and trademark) is then developed based on signalling theory and the resource-based view.Research limitations/implications– A set of counter-measures for dealing with the counterfeiting threat are proposed. There is scope for much further work on counterfeit resilience, including on establishing the effectiveness of these counter-measures.Practical implications– Counterfeiting is an increasingly significant supply chain problem. It provides a direct economic challenge to legitimate producers, undermines the value of trademarks and threatens consumer welfare. It affects many industries, including automotives, aerospace and pharmaceuticals, where counterfeits have sometimes proven fatal. The paper adds to the understanding of how this phenomenon takes place and how it might be tackled.Originality/value– Although many OM studies refer to the risks of patent and copyright infringements that arise in supply chains, the problem of product counterfeiting has received only limited attention, leaving a clear gap in the understanding.

AB - Purpose– The purpose of this paper is to identify strategies employed by product counterfeiters in their exploitation of legitimate supply chains; to develop a theoretical understanding of counterfeiting and its impact on competitive resources; and, to propose counter-measures for increasing the resilience of supply chains to the counterfeiting threat.Design/methodology/approach– An inductive, qualitative analysis of secondary case data obtained from three sources.Findings– Initial searching and coding identified four sets of strategies: extraction strategies, for obtaining products or materials from the legitimate economy; production strategies, for manufacturing counterfeit goods; distribution strategies; and, infiltration strategies, for introducing counterfeits into the legitimate economy. Secondary, focused coding revealed that much of what the counterfeiting strategies set out to achieve involves the generation, suppression or exploitation of signals. A theoretical account of counterfeiting and its impact on competitive resources (quality, reputation and trademark) is then developed based on signalling theory and the resource-based view.Research limitations/implications– A set of counter-measures for dealing with the counterfeiting threat are proposed. There is scope for much further work on counterfeit resilience, including on establishing the effectiveness of these counter-measures.Practical implications– Counterfeiting is an increasingly significant supply chain problem. It provides a direct economic challenge to legitimate producers, undermines the value of trademarks and threatens consumer welfare. It affects many industries, including automotives, aerospace and pharmaceuticals, where counterfeits have sometimes proven fatal. The paper adds to the understanding of how this phenomenon takes place and how it might be tackled.Originality/value– Although many OM studies refer to the risks of patent and copyright infringements that arise in supply chains, the problem of product counterfeiting has received only limited attention, leaving a clear gap in the understanding.

KW - Resilience

KW - Counterfeiting

KW - Supply chain management

KW - Secondary data

KW - Signalling theory

U2 - 10.1108/IJOPM-04-2012-0174

DO - 10.1108/IJOPM-04-2012-0174

M3 - Journal article

VL - 35

SP - 110

EP - 144

JO - International Journal of Operations and Production Management

JF - International Journal of Operations and Production Management

SN - 0144-3577

IS - 1

ER -