Counterfeiting and Fraud in Supply Chains


Book Description

Counterfeiting and Fraud in Supply Chains explains the reasons behind the popularity of counterfeiting and fraud among both consumers and companies, a systematic and holistic overview and critical examination of the situations that have caused an increasing trend of those criminal activities.




Food Fraud Prevention


Book Description

This textbook provides both the theoretical and concrete foundations needed to fully develop, implement, and manage a Food Fraud Prevention Strategy. The scope of focus includes all types of fraud (from adulterant-substances to stolen goods to counterfeits) and all types of products (from ingredients through to finished goods at retail). There are now broad, harmonized, and thorough regulatory and standard certification requirements for the food manufacturers, suppliers, and retailers. These requirements create a need for a more focused and systematic approach to understanding the root cause, conducting vulnerability assessments, and organizing and implementing a Food Fraud Prevention Strategy. A major step in the harmonizing and sharing of best practices was the 2018 industry-wide standards and certification requirements in the Global Food Safety Initiative (GFSI) endorsed Food Safety Management Systems (e.g., BRC, FSSC, IFS, & SQF). Addressing food fraud is now NOT optional – requirements include implementing a Food Fraud Vulnerability Assessment and a Food Fraud Prevention Strategy for all types of fraud and for all products. The overall prevention strategy presented in this book begins with the basic requirements and expands through the criminology root cause analysis to the final resource-allocation decision-making based on the COSO principle of Enterprise Risk Management/ ERM. The focus on the root cause expands from detection and catching bad guys to the application of foundational criminology concepts that reduce the overall vulnerability. The concepts are integrated into a fully integrated and inter-connected management system that utilizes the Food Fraud Prevention Cycle (FFPC) that starts with a pre-filter or Food Fraud Initial Screening (FFIS). This is a comprehensive and all-encompassing textbook that takes an interdisciplinary approach to the most basic and most challenging questions of how to start, what to do, how much is enough, and how to measure success.




The Economic Impact of Counterfeiting and Piracy


Book Description

This study develops and applies a rigorous methodology to estimate the incidence of counterfeit and pirated items in world trade.




Trade in Counterfeit and Pirated Goods


Book Description

This study offers unique up-to-date analysis of the impact on global trade of counterfeit and pirated products, known as "fakes" by the general public. Using statistical analysis and drawing on a global dataset covering almost half million customs data on seizures, the study estimates the huge share of international trade commandeered by counterfeit and pirated goods. In 2013, international trade in such products represented up to 2.5% of world trade, or as much as USD 461 billion. This is the equivalent of the GDP of Austria, or the combined GDP of Ireland and the Czech Republic. Above all, it highlights that right holders, governments and the formal economy as a whole suffer from significant economic and social losses. It also gives an idea about the potential financial revenues collected by criminal networks that are behind such trade.^More specifically, counterfeit and pirated products amounted to up to 5 % of imports in 2013 in the European Union, or as much as EUR 85 billion (USD 116 billion). This suggests that the relative impact of counterfeiting is twice as high for a group of developed countries, such as the EU, than it is for the world as a whole. The scope of the phenomenon appears to be greater than a decade ago. Back in 2008, a previous OECD study estimated that counterfeit and pirated goods accounted for up to 1.9 % of world imports, or up to USD 200 billion, relying on the best data and more limited methods available at that time. In the context of today's revival of international trade in the global economy, there is no shortage of opportunities for counterfeiters and criminals. Counterfeit and pirated trade is a major threat to any modern, knowledge-based economy. Counterfeiting and piracy matter in an innovation driven global economy.^Intellectual property (IP) is a key value generator for firms, helping them succeed in competitive markets. At the macroeconomic level, IP protection and enforcement is one of the main drivers of innovation, which contributes to long term economic growth. Given the fundamental economic importance of IP, counterfeiting and piracy must be directly targeted as a threat to sustainable IP-based business models.




Managing Counterfeit and Fraudulent Items in the Nuclear Industry


Book Description

Counterfeit and fraudulent items (CFls) are of increasing concern in the nuclear industry and generally throughout the industrial and commercial supply chains. Experience has shown that a lack of control of the processes involved in the sourcing, receipt, use and/or disposal of items can lead to the introduction of counterfeit or fraudulent items into a nuclear facility. This publication is designed to assist Member State organizations to prevent, detect and address CFIs on an ongoing basis. It provides users with recognized good practices for the introduction of a programme to effectively manage CFIs in the nuclear industry.




Strategic Procurement


Book Description

Most organizations, regardless of industry, spend more money on suppliers than they do on employing their staff. Written for the non-procurement expert, Strategic Procurement explores the 'why' and 'what' of good procurement rather than the 'how.' It explains why you should focus your efforts on this previously neglected area of business and rich rewards, where P&L impact is relatively painless and immediate, where benefit to cost ratios of 10 to 1 are realistic ambitions and in-year payback is possible. It covers all the aspects of strategic procurement, including The role of the executive and the organization in procurement; Primary and secondary supply chains; Cost reduction techniques Making yourself important to suppliers; Sustaining procurement improvement; Keeping procurement on the business agenda Showing you how to cut costs without harming your business and the importance of recognizing supplier relationship management, Strategic Procurement offers real understanding of the true worth of procurement in the boardroom.




Countering the Problem of Falsified and Substandard Drugs


Book Description

The adulteration and fraudulent manufacture of medicines is an old problem, vastly aggravated by modern manufacturing and trade. In the last decade, impotent antimicrobial drugs have compromised the treatment of many deadly diseases in poor countries. More recently, negligent production at a Massachusetts compounding pharmacy sickened hundreds of Americans. While the national drugs regulatory authority (hereafter, the regulatory authority) is responsible for the safety of a country's drug supply, no single country can entirely guarantee this today. The once common use of the term counterfeit to describe any drug that is not what it claims to be is at the heart of the argument. In a narrow, legal sense a counterfeit drug is one that infringes on a registered trademark. The lay meaning is much broader, including any drug made with intentional deceit. Some generic drug companies and civil society groups object to calling bad medicines counterfeit, seeing it as the deliberate conflation of public health and intellectual property concerns. Countering the Problem of Falsified and Substandard Drugs accepts the narrow meaning of counterfeit, and, because the nuances of trademark infringement must be dealt with by courts, case by case, the report does not discuss the problem of counterfeit medicines.




Pharmaceutical Anti-Counterfeiting


Book Description

This book overviews and integrates the business and technical issues that pharmaceutical companies need to know in order to combat the major global problem of counterfeit medicines. In addition to discussion of the problems, the author Davison addresses analytical techniques scientists use to detect counterfeits and presents some possible solutions to the threat of counterfeit medical products. Coverage moves from basic overview of the problem, costs / risks to consumers (toxic products, mistrust of drug companies) and business (revenue loss, public trust), government oversight and regulation, authentication strategies (packaging, analytical techniques), product tracking and supply chain, and case studies from around the globe.




Sustainable and Energy Efficient Computing Paradigms for Society


Book Description

This book provides insights into recent trends and innovation of technologies aiming to provide sustainable and energy efficient computing. The authors discuss approaches to provide solutions to real life societal issues and problems using sustainable and energy efficient computing approaches. The book gathers research and state of the art reviews on solutions for societal benefits by using sustainable approaches of computing. The book also intends to provide use-cases for certain real life societal problems. The book can be used by researchers of similar areas, technologists, environmentalists, educationists, research scholars and UG/PG Students as well.




Beginning Blockchain


Book Description

Understand the nuts and bolts of Blockchain, its different flavors with simple use cases, and cryptographic fundamentals. You will also learn some design considerations that can help you build custom solutions. Beginning Blockchain is a beginner’s guide to understanding the core concepts of Blockchain from a technical perspective. By learning the design constructs of different types of Blockchain, you will get a better understanding of building the best solution for specific use cases. The book covers the technical aspects of Blockchain technologies, cryptography, cryptocurrencies, and distributed consensus mechanisms. You will learn how these systems work and how to engineer them to design next-gen business solutions. What You'll Learn Get a detailed look at how cryptocurrencies work Understand the core technical components of Blockchain Build a secured Blockchain solution from cryptographic primitives Discover how to use different Blockchain platforms and their suitable use cases Know the current development status, scope, limitations, and future of Blockchain Who This Book Is For Software developers and architects, computer science graduates, entrepreneurs, and anyone wishing to dive deeper into blockchain fundamentals. A basic understanding of computer science, data structure, and algorithms is helpful.