Index

Counterfeiting and Fraud in Supply Chains

ISBN: 978-1-80117-575-3, eISBN: 978-1-80117-574-6

Publication date: 16 September 2022

This content is currently only available as a PDF

Citation

(2022), "Index", Soucie, S. and Peštek, A. (Ed.) Counterfeiting and Fraud in Supply Chains, Emerald Publishing Limited, Leeds, pp. 261-267. https://doi.org/10.1108/978-1-80117-574-620221012

Publisher

:

Emerald Publishing Limited

Copyright © 2022 Sanda Soucie and Almir Peštek. Published under exclusive licence by Emerald Publishing Limited


INDEX

Administrative Assistance and Cooperation System–Food Fraud (AAC-FF)
, 57

Alcoholic beverages
, 26–27, 67

All-stakeholders approach
, 41

ANOVA
, 225, 227–228

Anti-counterfeiting agencies
, 190

Anti-counterfeiting criminal law in Tanzania
, 186–195

Anti-counterfeiting criminal legal regime

challenges
, 193–195

factors affecting suppliers and consumers
, 192–193

inadequacies of criminal law
, 191–192

limitations of anti-counterfeiting authorities
, 192

weaknesses of
, 191–195

Anti-counterfeiting operations
, 191

Anti-Counterfeiting Trade Agreement (ACTA)
, 157–158

Anti-retroviral drugs (ARvs. drugs)
, 180–181

AOAC International
, 55

Artificial intelligence (AI)
, 95–96

Attitude (ATT)
, 207, 209, 215

Attitudes toward counterfeiting
, 242

findings
, 247–255

sample and data collection
, 246–247

survey instrument and analysis
, 247

theoretical background
, 242–246

Author co-citation analysis (ACA)
, 14–15

Average variance (AVE)
, 214–215

Bar codes
, 36–37

Berne Convention for the Protection of Literary and Artistic Works
, 153–154

Bibliometric methods
, 4

Bibliometric review
, 4

Big data
, 95–96

Blockchain technology
, 39

Border control mechanisms
, 190

Bosnia and Herzegovina
, 242, 246, 252

Brand squatting
, 25–26

Business Horizon (BH)
, 6

Buyers
, 32–33

Challenges
, 193–195

Chi-square tests
, 225

Chinese Food Safety Authorities
, 56

Cloud computing
, 95–96

Co-citation map
, 14–15

Coarsest imitations of luxury brands
, 243

Combating measures
, 105

Comité National des Conseillers du Commerce Extérieur de la France (CNCCEF)
, 32

Commodities
, 26–27

Comparative Fit Index (CFI)
, 213

Composite reliability (CR)
, 214–215

Concealment
, 53

Confirmatory factors analysis (CFA)
, 213

Construct reliability
, 214–215

Consumers
, 50–51, 245–246

behaviour
, 245

characteristics
, 54

in Tanzania
, 206

Consumption of counterfeit products
, 205–206

counterfeit business status in Tanzania
, 207

data analysis
, 213–215

instrument for data collection
, 212–213

literature review
, 207–211

methodology
, 211–213

profile of respondents
, 211

result
, 215–216

sample size and sampling procedure
, 212

Controls
, 36

Convergent validity
, 214–215

Copyrights
, 152–153

Counterfeit fashion products (CFPs)
, 220–221

buyers profile
, 226–230

non-buyers profile
, 230–232

Counterfeit goods
, 53–54, 122, 171–172, 177

measures in fight against counterfeiting and trade in
, 139–141

trade in Tanzania
, 173, 178, 186

Counterfeiting
, 2, 23–25, 52–53, 58, 102, 122, 125, 220, 242

classifications
, 126–127

effects
, 244

as global economic problem
, 124–128

luxury consumption
, 2

procedures for dealing with counterfeiting offences and offenders
, 190

prohibition of counterfeiting offences
, 189

scholarship
, 2

types
, 127

Counterfeiting Intelligence Bureau (CIB)
, 58–59

Counterfeiting products and goods
, 2

conceptual framework
, 3–4

methodology
, 4–17

Counterfeits
, 32, 174, 220, 222–223

business status in Tanzania
, 207

products
, 122, 205–206, 242–243

COVID-19 pandemic
, 122–123, 222

counterfeiting as global economic problem
, 124–128

measures in fight against counterfeiting and trade in counterfeit goods
, 139–141

pandemic caused by COVID-19 virus and global consequences
, 128–132

spread
, 123–124

trends in trade in counterfeit products in Republic of Serbia
, 138–139

trends in trade in counterfeit products in selected countries of Europe and world
, 132–138

Crime
, 32

Criminal Code
, 158, 161

Criminal law
, 171–172, 176–177

Criminal networks
, 33–34

Criminals
, 33

Croatia
, 226

preliminary survey results among food experts in
, 65–67

Cronbach’s Alpha coefficient
, 225

Customs authorities
, 156

Data analysis
, 83

and results
, 5–15

Data extraction
, 5

Deceptive counterfeiting
, 174

Deceptive products
, 243

Decernis food fraud database
, 27

Demand-side strategies
, 37–38

Democratic Republic of Congo (DRC)
, 180

Descriptive analysis
, 5, 8, 213

Digital platforms
, 222

Digitalisation
, 95–96

Dilution
, 53

Director of Public Prosecutions (DPP)
, 189

Discriminant validity
, 214–215

Distribution pattern mining
, 36–37

East African Community region (EAC region)
, 177

Enforcement
, 40–41

Ethical risks
, 245

Ethics (ET)
, 207, 209–211, 215

EU food fraud protection system
, 57

European Food Safety Authority (EFSA)
, 57

European Union Food Fraud Network (EU-FFN)
, 57

European Union Intellectual Property Office (EUIPO)
, 55–56, 122, 132–133, 149, 221

EUROPOL
, 55–56

Exploratory factors analysis (EFA)
, 213

Export processing zones (EPZs)
, 181

Extrinsic authentication features
, 38

Fair Commission Competition (FCC)
, 207

Fashion chains
, 222

Fashion goods
, 220

Fashion industry
, 220

Fashion supply chain
, 220

findings
, 225–232

sample and data collection
, 224–225

survey instrument and analysis
, 225

theoretical background
, 221–224

5/6G networks
, 95–96

Food counterfeiting/counterfeits
, 23–26

actors
, 32–34

comprehension
, 34–36

comprehension of size and dynamics of problem
, 36–37

concerns
, 31–32

demand-side strategies
, 37–38

deterring
, 36–41

supply-side strategies
, 38–41

targets
, 26–31

Food fraud
, 50–51, 74, 76, 93, 100, 104

and challenges for organic production
, 75–77

definition and categories
, 52

economic loses
, 94

effects
, 58–59

EU food fraud protection system
, 57

institutional frame and food fraud protection systems
, 55–57

matrix
, 53

methodology
, 59–60, 80, 83

motivations and opportunities
, 54–55

preliminary survey results among food experts in Croatia
, 65–67

results of survey with consumers
, 60–65

types
, 52–54

Food Fraud Vulnerability Assessment (FFVA)
, 74

control measures
, 79–80, 86–87

motivations
, 79, 85–86

opportunities related fraud factors
, 78–79, 83, 85

results
, 83–87

theoretical and practical aspects
, 75, 77, 80

Food integrity
, 92, 103

Food safety system
, 56, 75

Food system
, 50

Food value chain
, 92

Forensic Chemistry Center (FCC)
, 139

Fraud
, 23–24, 125–126

in supply chains
, 52

Free-trade zones
, 35

General Food Law
, 57

Generation Y and Z
, 224

Geographic indications (GIs)
, 62–63

Geography
, 29–31

GHG emissions
, 106

Global Food Safety Initiative (GFSI)
, 55

Global Food Traceability Center
, 55

Grey market
, 53–54

Gross Domestic Product (GDP)
, 220

HACCP
, 56

Hague Agreement
, 152

Health risks
, 244–245

Honey
, 67

Illegal trade in counterfeit products
, 122

Imitation
, 24

products
, 243

Industry 4.0 technologies
, 92

in achieving food integrity/fraud prevention
, 104–107

benefits and main drivers
, 95

results
, 98–108

study design
, 97–98

Industry segments
, 27–29

Influential authors and documents
, 8–14

Information and communication technologies (ICTs)
, 175

Information susceptibility
, 245

Institutional environment
, 54

Integrity
, 34, 245

Intellectual Property Crime Coordinated Coalition (IPC3)
, 55–56

Intellectual property law (IP law)
, 148–149

international context of IP law concerning prevention of sale of counterfeit products
, 149–158

national context of IP law concerning prevention of sale of counterfeit products
, 158–161

REACT online enforcement programme
, 161–165

Intellectual property rights (IPRs)
, 24, 52, 54–55, 125

Intellectual structure and schools of thought in counterfeiting products and goods research
, 14–15

Interdepartmental Task Force
, 186

International Chamber of Commerce
, 58–59

International Life Sciences Institute
, 55

International Pharmaceutical Association (FIP)
, 139–140

International Police Organisation (Interpol)
, 176–177

International Standard Organization (ISO)
, 55

Internet of things (IoT)
, 95–96

Interviewed marketing channel members
, 80–81

Intrinsic authentication features
, 38–39

Joint Research Centre (JRC)
, 62–63

Journal of Business Ethics (JBE)
, 6

Journal of Business Research (JBR)
, 6

Keyword co-occurrence analysis
, 16

Knowledge production
, 2

Law on Copyright and Related Rights (LCRR)
, 158–159

Law on Customs Measures for Protection of Intellectual Property Rights (LCMPIPR)
, 158, 160

Law on Industrial Property (LIP)
, 158

Legal action
, 40–41

Legal risks
, 245

Legislation
, 40–41

Machine learning
, 95–96

Machine to machine communication (M2M communication)
, 95–96

Madrid System for International Registration of Marks
, 151

Managerial controls
, 79

Managerial measures
, 87

Materialism
, 245

Measurement model analysis examination of reliability and validity
, 213–214

Measures
, 123–124

Medical Store Department (MSD)
, 180–181

MEDICRIME Convention
, 141

Merchandise Marks Regulations 2008
, 190

Milk and dairy products
, 66–67

Mislabelling
, 53

Mobile phones
, 205–206

Morphological analytical approach
, 2

Motivational drivers
, 34

Nairobi Treaty
, 152

Nice Agreement
, 152

Non-deceptive counterfeiting
, 174

Non-deceptive products
, 243

Non-safety critical counterfeit goods
, 174

Normative susceptibility
, 245

Office of the Chief Chemist
, 190

Olive oil
, 66

Online sale of goods
, 157

Open trade
, 133–134

Operation Pangea
, 123

Opportunities
, 34–36

OPSON IX operation
, 56

OPSON operation
, 55–56

Organic agriculture
, 77

Organic food
, 74

Organic production
, 75–77

Organic products
, 74

SSAFE FFVA adaptation tool to organic products supply chain
, 81

Organic supply chain
, 74–75

Organised crime
, 33–34

Organization for Economic Co-operation and Development (OECD)
, 132–133, 149, 221

Over-run products
, 243

Packaging re-use deterrence
, 39

Paris Convention for the Protection of Industrial Property
, 151–152

Pearson correlation coefficient
, 225

Penalties
, 189

Perceived risk
, 245–246

Piracy
, 52, 58, 122

Pirated goods
, 53–54

Pirated products
, 243

Policy

intervention
, 93–95

response
, 107–108

Prevention strategy
, 93–95

Product characteristics
, 54

Product counterfeiting
, 23–24, 122, 125

Prohibition of counterfeiting offences
, 189

Protected designation of origin (PDO)
, 100–102

Protected geographical indication (PGI)
, 100–102

PSI
, 139–140

Quick response codes (QR codes)
, 36–37

Radio frequency identification tags (RFID tags)
, 36–37, 106

Rapid Alert System for Food and Feed (RASFF)
, 57, 98

REACT online enforcement programme
, 149, 161, 165

Recreational criminals
, 33

Republic of North Macedonia
, 160–161

Retailers survey results
, 67–68

Review of research
, 4

Risks
, 244–245

for environment
, 245

Root Mean Square Error of Approximation (RMSEA)
, 213

Root Mean Square Residuals (RMSR)
, 213

Safe Supply of Affordable Food Everywhere (SSAFE)
, 74, 77–78

SSAFE FFVA adaptation tool to organic products supply chain
, 81

Safety risks
, 245

Safety-critical counterfeit goods
, 174

Sanctions
, 189

Science mapping
, 3, 14–15

Scientometric methods
, 4

SCOPUS
, 4–5, 7–8, 16

Securing own and disrupting counterfeit distribution channels
, 39–40

Sensors
, 95–96

Serbia
, 74

Singapore Treaty on the Law of Trademarks
, 151–152

Small-medium enterprises (SMEs)
, 33

Social network analysis
, 4

Social Status (SS)
, 214–215

Social status consumption (SC)
, 207–209

Soft controls. See Managerial measures

Sources identification
, 4–5

Southern Africa Development Community (SADC)
, 177

Status consumption
, 209–210, 245

Sub-Saharan Africa (SSA)
, 177

Substitution
, 53

Suppliers
, 33–34

Supply chain
, 28–29, 171–172

Supply-side strategies
, 38–41

T-tests
, 225

Tanzania
, 171–172, 205–206

anti-counterfeiting criminal law in
, 186–195

counterfeit business status in
, 207

counterfeit goods trade
, 173, 178, 186

impacts
, 183–186

scale, scope and drivers and impacts
, 178–183

Tanzania Airport Authorities (TAA)
, 190

Tanzania Bureau of Standards (TBS)
, 186

Tanzania Food and Drugs Authority (TFDA)
, 180–181

Tanzania Intelligence and Security Services (TISS)
, 190

Tanzania Medicines and Medical Devices Authority (TMDA)
, 186

Tanzania Ports Authority (TPA)
, 190

Tanzania Revenue Authority (TRA)
, 180–181

Technical controls
, 79

Theory of planned behaviour
, 245

Theory of reasoned action
, 245

Threat Assessment and Critical Control Point (TACCP)
, 56

Topical foci analysis
, 15–17

Traceability technology
, 39

Trade in counterfeit products
, 123–124

Trade-Related Intellectual Property Rights Agreement (TRIPS)
, 53–54, 149, 154–155, 157, 173

Trademark Law Treaty (TLT)
, 151–152

Trademarks
, 24, 151

owners
, 177

Traditional specialties guaranteed requirement (TSG requirement)
, 100–102

Transition economies
, 74

Trends

in trade in counterfeit products in Republic of Serbia
, 138–139

in trade in counterfeit products in selected countries of Europe and world
, 132–138

Tucker–Lewis Index (TLI)
, 213

UK Food Standards Agency (FSA)
, 56

Unauthorised or inappropriate improvement
, 53

United Nations Office of Drugs and Crime (UNODC)
, 176–177

US Food and Drug Administration (FDA)
, 56, 125

Value consciousness
, 245

Vienna Agreement
, 152

Visual Capitalist, The
, 122

VOSviewer software
, 16

Vulnerability
, 74

Vulnerability Assessment and Critical Control Point (VACCP)
, 56

Wine
, 66

WIPO Copyright Treaty (WCT)
, 153–154

World Customs Organisation (WCO)
, 176–177

World Health Organization (WHO)
, 122–123, 176–177

World Intellectual Protection Organisation (WIPO)
, 149, 176–177

protection of IP rights under regime of
, 150–154

World Self Medication Industry (WSMI)
, 139–140

World Trade Organization (WTO)
, 125, 149

protection of IP rights under regime of
, 154–158