47 research outputs found

    Combating Strategic Counterfeiters in Licit and Illicit Supply Chains

    Get PDF

    Counterfeit drugs and the online pharmaceutical trade, a threat to public safety

    Get PDF
    Counterfeit pharmaceuticals are a serious and ever-growing threat to public safety. Monitoring the trade is difficult, resulting in the precise scale of the problem being unknown, however evidence shows that it is not just lifestyle drugs that are targeted nowadays. Adverse health problems, including fatalities, have resulted from consumers self-medicating with counterfeit products. Without efforts to enhance the public's knowledge, the problem will continue to persist. The internet is facilitating the trade by providing counterfeiters with a large consumer base and limited risks. The dark net within it allows for anonymous transactions between manufacturer, distributer and consumer. While some online pharmacies are legitimate, there are a growing number of those that are unverified which sell dangerous counterfeit products. Both the packaging and medication are becoming increasingly sophisticated, making it difficult for consumers and law enforcement to identify them without chemical analysis. Counterfeit batches have also been detected in established legal trade routes whereby they are able to, if undetected, end up in high street pharmacies and hospitals. Multiple organisations have set up worldwide operations to dismantle the trade however this is a complex and evolving problem that without significant changes to legislation may never be fully

    Stability and Endogenous Formation of Inventory Transshipment Networks

    Get PDF

    ESSAYS ON DECEPTIVE COUNTERFEITS IN SUPPLY CHAINS: A BEHAVORIAL PERSPECTIVE

    Get PDF
    This dissertation is comprised of three essays intended to contribute to the operations management discipline, specifically within supply chain management. The first essay provides a research agenda for studying deceptive product counterfeits, which are products that have been manufactured and/or distributed and sold by an entity in violation of anotherñ€ℱs intellectual property rights and intentionally misrepresented by the seller as the genuine article. The proliferation of counterfeits into legitimate supply chains presents quality, health and safety and cost concerns for nearly all industries. We identify antecedents of vulnerability to deceptive counterfeits for firms and their supply chain partners using Situational Crime Prevention Theory and Normal Accident Theory. Vulnerability to counterfeiting has negative performance impacts for the firm, its customers and society. We propose using the Six Ts of Supply Chain Quality Management (Roth, Tsay, Pullman and Gray, 2008) as an approach to select effective strategies to mitigate these impacts. Essay Two serves as an initial effort to understand how counterfeits can enter supply chains. In this essay, we test whether purchasing specialists can serve as effective guardians of the supply chain using a scenario based role playing experiment. We explore if buyers can detect signals of counterfeits in proposals and successfully avoid the counterfeit supplier in the decision process. We additionally examine whether time constraints and workload pressure detracts from the ability to successfully process signals and avoid the counterfeit. We find that the buyers can successfully detect counterfeit signals and avoid the counterfeit in the selection decision, but donñ€ℱt find support for time constraints and workload pressure effects. The final contribution of this dissertation is a methodological essay that explores the effect of time pressure on decision making by using a combination of perceived time pressure and objective measures of time spent in the decision process to determine if time pressure affects the quality of the decision making in a supplier selection decision. We find that time constraints and perceived time pressure are related constructs that negatively affect decision quality in a supplier selection decision

    An Empirical Analysis to Control Product Counterfeiting in the Automotive Industry\u27s Supply Chains in Pakistan

    Get PDF
    The counterfeits pose significant health and safety threat to consumers. The quality image of firms is vulnerable to the damage caused by the expanding flow of counterfeit products in today’s global supply chains. The counterfeiting markets are swelling due to globalization and customers’ willingness to buy counterfeits, fueling illicit activities to explode further. Buyers look for the original parts are deceived by the false (deceptive) signals’ communication. The counterfeiting market has become a multi-billion industry but lacks detailed insights into the supply side of counterfeiting (deceptive side). The study aims to investigate and assess the relationship between the anti-counterfeiting strategies and improvement in the firm’s supply performance within the internal and external supply chain quality management context in the auto-parts industry’s supply chains in Pakistan

    Illicit trade in Ireland: uncovering the cost to the Irish economy.

    Get PDF
    Although frequently thought of as a victimless crime, illicit trade has a significant impact on the Irish economy. The objective of this report is to provide a detailed assessment of illicit trade in Ireland across a select number of sectors, namely fuel, tobacco, alcohol, digital media and pharmaceuticals. With regard to each of these sectors, the report seeks to understand the impacts, identify key drivers behind these illicit trades, and where possible, quantifies the losses to the economy. Ultimately this report proposes an integrated approach to tackling the problem of illicit trade in Ireland

    Money for crime and money from crime: financing crime and laundering crime proceeds

    Get PDF
    This article summarises briefly what is known internationally about how ‘organised crimes’ are financed and how this differs from the financing of licit businesses. It shows how illicit financing might and does operate, noting that a key issue is the social capital of offenders and their access to illicit finance which ironically, may be easier if controls make it harder to launder money. It then reviews international evidence on how proceeds of crime are laundered, concluding with an examination of the implications of these observations for the study of organised crime and the effects of anti-money laundering efforts. In money laundering cases internationally, the most commonly prosecuted cases are not complicated. This is not evidence that there are no complicated cases, since the proportion of crime proceeds and crime financing that have been subjected to serious investigation is modest. There is a core contradiction between general economic policy pushed hard multilaterally for liberalisation of financial flows and a crime control policy intent on hampering them. No-one could rationally think that AML controls in general or financial investigation in particular will ‘solve’ organised crime completely or eliminate high-level offending: for there even to be a chance to achieve that, there would need to be a step change in transparency and effective action against high-level corruption along all possible supply chains. However more action (not just legislation) on these could facilitate interventions against the more harmful individuals, networks and crime enablers. The less complex financial activities of local drug-dealing gangs can be intervened against, without needing international cooperation or familiarity with sophisticated money laundering typologies

    Exploring (anti-) counterfeiting management: Conceptual foundations and empirical examination

    Get PDF
    Die Forschungsfragen wurden in neun einzelnen BeitrĂ€gen untersucht. Der Forschungsfrage 1 („Marken- und Produktpiraterie“) wurde in zwei BeitrĂ€gen nachgegangen. Beitrag 1 stellt die relevanten Dimensionen der Betrachtung von FĂ€lschungen dar. In Beitrag 2 erfolgt eine umfassende Auseinandersetzung mit den definitorischen Grundlagen, den GrĂŒnden fĂŒr die Zunahme der FĂ€lschungen sowie den daraus entstehenden SchĂ€den zur Abgrenzung, Systematisierung und Bewertung der Thematik. Die Forschungsfragen 2 („Schutzmanagement“, ACM) und 3 („FĂ€lschungsmanagement“, CM) werden sowohl mit konzeptionellen als auch qualitativ und quantitativ empirischen BeitrĂ€gen bearbeitet. Zur Beantwortung der Forschungsfrage 2 enthĂ€lt die kumulative Dissertation vier BeitrĂ€ge. In Beitrag 3 werden Grundlagen und Inhalte eines unternehmerischen Schutzsystems erarbeitet. Beitrag 4 komplettiert dieses Thema durch eine umfangreiche Analyse relevanter Schutzinstrumente. Die ErklĂ€rungsinhalte des ressourcen- bzw. kompetenzbasierten Ansatzes zur Ableitung einer prozessorientierten Sichtweise auf ACM beinhaltet Beitrag 5. Mittels einer qualitativen Inhaltsanalyse wird das Wissen aus Experteninterviews analysiert und ein Konstrukt zur Ableitung der unternehmerischen Schutzkompetenz vorgestellt. In Beitrag 6 erfolgen die Verfeinerung des Modells und die finale Untersuchung von ACM auf Basis eines konfigurationsorientierten Mixed-Methods Ansatzes zur inhalts- sowie cluster- und varianzanalytischen Bestimmung von SchĂŒtzerklassen und -konfigurationen. Wichtige Elemente sind Kompetenzen, die verfolgten Strategien bzw. eingesetzten Instrumenten sowie die Evaluierung des Erfolgs auf Grundlage von Fragebogendaten. Zur Behandlung von Forschungsfrage 3 sind drei BeitrĂ€ge erÂŹstellt worden. Beitrag 7 beschĂ€ftigt sich mit dem bisher stark vernachlĂ€ssigten Bereich CM. In diesem wird zur AnnĂ€herung an die Thematik der aktuelle Stand der Forschung zu FĂ€lschertypen, relevanten Strategien sowie taktischen Maßnahmen aufgearbeitet und mit Expertenwissen angereichert. In Beitrag 8 erfolgen eine managementorientierte Aufbereitung der FĂ€lscherthematik und eine qualitative Inhaltsanalyse zur Identifikation von Strategien und Instrumenten. DarĂŒber hinaus wird eine kompetenzbasierte Methodik zur Bewertung von FĂ€lschern erarbeitet. Beitrag 9 schließt die Untersuchung der FĂ€lscherseite analog zu Beitrag 6 ab

    The theft of medicines in the EU. Key results of the MEDI-THEFT project about the current status of the theft of medicines in the EU and the most relevant and common criminals’ modi operandi.

    Get PDF
    This report is an extract from the deliverable D2.1 of the project MEDITHEFT. This report aims at providing an update on the current status of theft of medicines and medical devices in the EU including: (a) the identification and analysis of the main criminal schemes adopted by criminals to steal and re-sell pharmaceutical products (b) an analysis of the regulatory framework across EU Member State
    corecore