Managing knowledge distribution to prevent product imitation and counterfeiting

نویسندگان

  • Julian Bahrs
  • Norbert Gronau
  • Gergana Vladova
چکیده

Product piracy poses an existential threat to many companies. Juristic property rights, which are currently dominantly put to practice, do not suffice to combat this threat. The rise in cases of piracy and the increasing professionalism of the counterfeiter, give grounds for effective methods of prevention. Based on the gap of existing approaches identified we evaluate how knowledge modeling could help to design preventive measures. We develop a novel approach which makes information and knowledge leaks transparent, analyzable and controllable. The approach is based on modeling the interactions and transfers of information and knowledge between departments of a company with internal and external business partners. For this purpose, a modeling process for knowledge-rich business interactions is used and modified for the specific purpose. Choosing dynamic assessment questions allows to on the one hand establish the level of risk of information and knowledge on piracy and on the other hand to prioritize measures specific to a company. In addition, the procedure reappraises companies’ existing modes of prevention. Based on this analysis, the method helps to develop and rank measures to hinder the theft of information by pirates. The introduced approach fills the gap in known concepts of protection, which are used only after a case of piracy has taken place. The approach also adds a new perspective in knowledge management.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Managing Virtual Product Development team: A Review

Although there are many potential benefits associated with the use of virtual product development teams, exploiting these benefits requires an appropriate management. Managing virtual product development team is a critical issue as many of these teams fail to accomplish their goals. Review of previous literature shows that body of knowledge in managing virtual product development teams is fragm...

متن کامل

RFID Anti-Counterfeiting for Retailing Systems

Counterfeiting is one of the most serious problems in the consumer market. One promising approach for anti-counterfeiting is to attach a low-cost Radio-frequency Identification (RFID) tag to the product authentication. In this paper, we propose an RFID system for detecting counterfeiting products. This RFID system consists of the tag authentication protocol and the database correction protocol....

متن کامل

Managing Automotive Product Development

The new product development (NPD) is the process by which a new product idea is conceived, investigated, taken through the design process, manufactured, marketed and serviced. In Automotive Engineering these related to the product realization process (PRP) which consists of five phases: "Plan and Define Program", "Product Design and Development", "Process Design and...

متن کامل

An Exploratory Analysis of Counterfeiting Strategies: Towards Counterfeit-Resilient Supply Chains

Purpose: To identify strategies employed by product counterfeiters in their exploitation of legitimate supply chains; to develop a theoretical understanding of counterfeiting and its impact on competitive resources; and, to propose counter-measures for increasing the resilience of supply chains to the counterfeiting threat. Design/methodology/approach: An inductive, qualitative analysis of seco...

متن کامل

Anti-Counterfeiting Solution Employing Mobile RFID Environment

EPC Class-1 Generation-2 UHF tags, one of Radio frequency identification or RFID tag types, is expected that most companies are planning to use it in the supply chain in the short term and in consumer packaging in the long term due to its inexpensive cost. Because of the very cost, however, its resources are extremely scarce and it is hard to have any valuable security algorithms in it. It caus...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJIIT

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2011