Accepted author manuscript, 331 KB, PDF document
Final published version
Research output: Contribution to Journal/Magazine › Journal article › peer-review
Research output: Contribution to Journal/Magazine › Journal article › peer-review
}
TY - JOUR
T1 - An exploratory analysis of counterfeiting strategies
T2 - towards counterfeit-resilient supply chains
AU - Stevenson, Mark
AU - Busby, Jeremy
PY - 2015
Y1 - 2015
N2 - Purpose– The purpose of this paper is to identify strategies employed by product counterfeiters in their exploitation of legitimate supply chains; to develop a theoretical understanding of counterfeiting and its impact on competitive resources; and, to propose counter-measures for increasing the resilience of supply chains to the counterfeiting threat.Design/methodology/approach– An inductive, qualitative analysis of secondary case data obtained from three sources.Findings– Initial searching and coding identified four sets of strategies: extraction strategies, for obtaining products or materials from the legitimate economy; production strategies, for manufacturing counterfeit goods; distribution strategies; and, infiltration strategies, for introducing counterfeits into the legitimate economy. Secondary, focused coding revealed that much of what the counterfeiting strategies set out to achieve involves the generation, suppression or exploitation of signals. A theoretical account of counterfeiting and its impact on competitive resources (quality, reputation and trademark) is then developed based on signalling theory and the resource-based view.Research limitations/implications– A set of counter-measures for dealing with the counterfeiting threat are proposed. There is scope for much further work on counterfeit resilience, including on establishing the effectiveness of these counter-measures.Practical implications– Counterfeiting is an increasingly significant supply chain problem. It provides a direct economic challenge to legitimate producers, undermines the value of trademarks and threatens consumer welfare. It affects many industries, including automotives, aerospace and pharmaceuticals, where counterfeits have sometimes proven fatal. The paper adds to the understanding of how this phenomenon takes place and how it might be tackled.Originality/value– Although many OM studies refer to the risks of patent and copyright infringements that arise in supply chains, the problem of product counterfeiting has received only limited attention, leaving a clear gap in the understanding.
AB - Purpose– The purpose of this paper is to identify strategies employed by product counterfeiters in their exploitation of legitimate supply chains; to develop a theoretical understanding of counterfeiting and its impact on competitive resources; and, to propose counter-measures for increasing the resilience of supply chains to the counterfeiting threat.Design/methodology/approach– An inductive, qualitative analysis of secondary case data obtained from three sources.Findings– Initial searching and coding identified four sets of strategies: extraction strategies, for obtaining products or materials from the legitimate economy; production strategies, for manufacturing counterfeit goods; distribution strategies; and, infiltration strategies, for introducing counterfeits into the legitimate economy. Secondary, focused coding revealed that much of what the counterfeiting strategies set out to achieve involves the generation, suppression or exploitation of signals. A theoretical account of counterfeiting and its impact on competitive resources (quality, reputation and trademark) is then developed based on signalling theory and the resource-based view.Research limitations/implications– A set of counter-measures for dealing with the counterfeiting threat are proposed. There is scope for much further work on counterfeit resilience, including on establishing the effectiveness of these counter-measures.Practical implications– Counterfeiting is an increasingly significant supply chain problem. It provides a direct economic challenge to legitimate producers, undermines the value of trademarks and threatens consumer welfare. It affects many industries, including automotives, aerospace and pharmaceuticals, where counterfeits have sometimes proven fatal. The paper adds to the understanding of how this phenomenon takes place and how it might be tackled.Originality/value– Although many OM studies refer to the risks of patent and copyright infringements that arise in supply chains, the problem of product counterfeiting has received only limited attention, leaving a clear gap in the understanding.
KW - Resilience
KW - Counterfeiting
KW - Supply chain management
KW - Secondary data
KW - Signalling theory
U2 - 10.1108/IJOPM-04-2012-0174
DO - 10.1108/IJOPM-04-2012-0174
M3 - Journal article
VL - 35
SP - 110
EP - 144
JO - International Journal of Operations and Production Management
JF - International Journal of Operations and Production Management
SN - 0144-3577
IS - 1
ER -