• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 40
  • 28
  • 8
  • 6
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 102
  • 27
  • 26
  • 24
  • 23
  • 17
  • 15
  • 14
  • 13
  • 13
  • 13
  • 10
  • 10
  • 10
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

La contrefaçon de propriété intellectuelle au Maroc / Counterfeiting of intellectual property in Morocco

Chabbouba, Moulay Abdellah 12 December 2011 (has links)
La contrefaçon de la propriété intellectuelle constitue l'un des sujets d'actualité les plus marquants de nos jours. Un tel phénomène n'épargne à l'heure actuelle aucun pays et l'on se demande de quelle manière pourrait-on protéger la propriété intellectuelle, dans une ère où la contrefaçon peut atteindre tous les secteurs intellectuels. Au rebours du droit français qu'est assez avancé en ce domaine, le droit marocain y compris la jurisprudence marocaine quand bien même inspirée de la législation française ne sont qu'au stade du balbutiement. A cet égard, nous avons scindé notre thèse en deux parties, la première est consacrée aux éléments constitutifs de contrefaçon de propriété intellectuelle à savoir, les éléments constitutifs de la contrefaçon de propriété intellectuelle de la manière suivante. Après une introduction, le premier chapitre expose l'élément matériel (un comportement frauduleux) de contrefaçon en matière industrielle et en droit d'auteur et droits voisins. Le second chapitre présente un élément moral (la connaissance d'agir mal), le troisième chapitre traite l'élément légal (un texte de loi). Dans la deuxième partie, on a étudié, la procédure de lutte contre la contrefaçon de propriété intellectuelle, dans un premier temps on a traité la constatation préalable des faits de contrefaçon (Chapitre I), puis le déclenchement de la procédure de lutte contre la contrefaçon (Chapitre II) avant de nous attarder sur les mesures de lutte contre la contrefaçon de propriété intellectuelle (Chapitre III). / Our days, Counterfeiting of intellectual property is one of the most significant subject. Such a phenomenon touchs at present all countries and we wonder how can we preserve intellectual property in Morocco, in this era where counterfeiting can reach all intellectuals sectors. Contrary to French law which is quite advanced in this area, Moroccan law including Moroccan case law, inspired by French law are at the stage of babbling, in  this regard, we have split our thesis in two parts .The first part focuses on the elements of infringement of intellectual property, as follows. After an introduction, the first chapter outlines the physical element of counterfeiting industrial matters and copyright and neighboring rights. The second chapter presents a moral element , the third chapter deals with the legal element (a law). In the second part, we have studied how to fight against counterfeiting of intellectual property, initially was treated prior determination of the facts of infringement (Chapter I), then the start of the procedure against counterfeiting (Chapter II) before dealing with  measures against infringement of intellectual property rights (Chapter III).
52

Klamavé obchodní praktiky se zaměřením na porušování práv duševního vlastnictví / Misleading Commercial Practices with a Focus on Intellectual Property Rights Infringements

Málková, Lucie January 2011 (has links)
This master's thesis deals with a topical subject of intellectual property rights infringements as an example of a misleading commercial practice. The aim of the theoretical part is an analysis of the available data covering the topic. The paper also contains Czech and European statistics of goods infringing intellectual property rights. The thesis then focuses mainly on the issue of an illegal alcohol trade. The objective of the practical part is an analysis of consumer preferences and behaviour of Prague residents in the purchase and consumption of spirits. Another objective is an analysis of a change of consumer preferences and behaviour of Prague residents as an impact of recently revealed cases of a sell of harmful alcohol. The objectives are met via a quantitative questionnaire survey.
53

Contrefaçon du vin : développement de méthodes d'analyse multifactorielles rapides et non destructives pour l'authentification des bouteilles par des techniques spectrochimiques couplées à un rayonnement laser / Wine counterfeiting : development of fast, non-destructive and multifactorial laser-based spectrochemical methods for authentification of bottled wine.

Grijalba Marijuan, Nagore 08 November 2017 (has links)
La connaissance du raisin et du vin est aussi vieille que l’histoire culturelle de l’humanité. Il est bien connu depuis l'ancienne civilisation l'influence du «terroir» sur le vin, c'est-à-dire un espace géographique délimité où une communauté humaine construit au cours de l’histoire un savoir collectif de production qui confère une typicité et engendrent une réputation pour un produit originaire de cet espace géographique. Les grands vins, tout comme les vins de moindre renommée, représentent une cible privilégiée des faussaires. La contrefaçon s’intensifie et se développe en grande partie en Chine. Selon la comission du vin et spiritueux du Comité National des Conseillers du Commerce Extérieur de la France, il existe au moins une bouteille de vin forgé pour chaque bouteille de vin français original. Bien que la Chine ne soit pas le seul fournisseur de vins contrefaits, la croissance rapide du marché du vin dans ce pays et l'absence de lois protégeant la propriété intellectuelle ont déclenché le marché noir. On estime que 20% des vins consommés dans le monde sont contrefaits. Selon l’Office de l’Union Européenne pour la propriété intellectuelle, l’industrie des vins et spiritueux européenne perd environ 1,3 milliard d’euros chaque année du fait de la contrefaçon sur le marché de l’UE, ce que correspond à 3,3% de ventes de ces secteurs, ce qui se traduisent en une perte directe d’environ 4800 emplois. La contrefaçon des vins peut revêtir plusieurs formes et les mesures de lutte contre la contrefaçon en vigueur ont montré leur manque d’efficacité. Ce sont des techniques invasives qui sont utilisés lors de la vérification des vins. Elles sont basées principalement sur une analyse du contenu et nécessitent donc l’ouverture de la bouteille, ce qui est dommageable lorsqu’il s’agit de vins de grande valeur. Le travail présenté ici, présente un nouvel outil de diagnostic non ambigu basé sur l'analyse ultra-trace des matériaux constituant l’emballage (verre, papier et encres, capsule) par ablation laser femtoseconde ICPMS. Cette technique non invasive est rapide (5 minutes environ), permet de détecter des traces élémentaires inférieures au ng/g et n’a pas d’équivalent en terme de performance à ce jour. Dans une première étape, nous avons designée et développé une nouvelle cellule d’ablation qui permet de réaliser l’analyse multiélémentaire direct en n’induisant aucune dégradation visible sur la bouteille. Dans une deuxième étape, la nouvelle cellule d’ablation a été apliquée a l’analyse direct de l’emballage. Pour l’analyse du papier et des encres, en raison du manque de matériaux de référence certifiés, représente un véritable challenge analytique. Nous avons mis au point une approche quantitative en développant nos propres standards par impression jet d’encre de papier à partir de solutions dopées. Finalement, un nouvel outil de diagnostic non ambigu basé sur l’espectroscopie Raman et Infrarouge a été développée pour l’analyse moleculaire qualitatif et direct du papier et des encres afin de compléter les résultats obtenus avec le fsLA-ICPMS. L’instrumentation et ces méthodes de caractérisation des emballages ont été appliquées avec succès à l’analyse d’un grand nombre de bouteilles (n>200) d’origine contrôlée et de bouteilles originaires d’autres pays. Les traitements statistiques des données basés sur une analyse multivariée (PCA, PLS, classification hiérarchique) montrent clairement la distinction entre les bouteilles d’origines et les bouteilles contrefaites en isolant et hiérarchisant les éléments traces à l’origine de cette discrimination. Il a par ailleurs été possible de différencier la signature chimique des bouteilles selon leur origine géographique et le millésime. / The knowledge of grape and wine is as old as the cultural history of humankind. It is well known since the ancient civilizations the influence of the "terroir" on wine, which is a limited geographical space where a human community constructs a collective knowledge of production, which gives wine grapes their distinctive character and generate a reputation for a product originating from this geographical area. The great wines are a prime target for counterfeiters because of their brand value, mostly originating from the Asian market. According to the National Committee of Foreign Trade Advisers of France (Comité National des Conseillers du Commerce Extérieur de la France, CNCCEF) the wine fraud is not just a matter of a few bottles but also includes an entire clandestine industry. According to the Wine and Spirits Commission of the CNCCEF, there is at least one bottle of forged wine for each bottle of original French wine in China. Although China is not the only supplier of counterfeited wines, the rapid growth of the wine market in this country and the absence of laws protecting intellectual property have triggered the counterfeit market. It is estimated that 20% of the wines consumed in the world are counterfeit. In fact, according to the European Union Intellectual Property Office, it is estimated that the legitimate industries losses approximately €1.3 billion of revenue annually due to the presence of counterfeit spirits (€740 million) and wine (€530 million) in the EU market, 3.3% of the sector’s sales, which results in a direct loss of about 4,800 jobs. Wine fraud may be categorized in several forms and anti-counterfeiting measures have shown lack of effectiveness. Unfortunately, invasive techniques are used for wine verification purposes, which are mainly based on liquid sampling, requiring opening the bottle that can be fateful when it comes to great value wines. This work presents a new unambiguous diagnostic tool based on the ultra-trace analysis of the wine packaging (glass, paper and inks, capsule) by femtosecond laser ablation coupled to ICPMS. This is a fast (about 5 minutes) and non-invasive technique, which allows detecting trace elements below ng/g and has no equivalent in terms of performance to date. In a first step, we have designed and developed a new ablation cell that allows direct and multi-elemental analysis of the packaging without causing any visible degradation on the bottle. In a second step, the new ablation cell has been applied to the direct analysis of the packaging components. For the analysis of paper and inks, as the lack of certified reference materials represents a real analytical challenge, we have developed a quantitative approach by developing our own standards by printing spiked solution with an inkjet printer. Finally, in order to complement the results obtained with fsLA-ICPMS, a new unambiguous diagnostic tool based on Raman spectroscopy and Infrared spectroscopy has been developed for the qualitative and direct molecular analysis of paper and inks. The instrumentation and packaging characterization methods have been applied to the analysis of a large number of bottles (n> 200) of controlled origin and bottles originating from other countries. The statistical processing of data based on multivariate analysis (PCA, PLS, hierarchical classification) clearly shows the distinction between authentic and counterfeited bottles by isolating and prioritizing the trace elements responsible for this discrimination. It was also possible to distinguish the chemical signature of the bottles according to their geographical origin and the vintage.
54

O fake nas mídias: simulações irônicas

Emérito, Matheus Barbosa 22 October 2012 (has links)
Made available in DSpace on 2016-04-26T18:12:25Z (GMT). No. of bitstreams: 1 Matheus Barbosa Emerito.pdf: 6717538 bytes, checksum: f97974fd0640e1d4039cb759ef7f0266 (MD5) Previous issue date: 2012-10-22 / Conselho Nacional de Desenvolvimento Científico e Tecnológico / This research deals with a study about photographic fake that have increasingly present in the media and advertising world of the XXI century. The term fake is used both to define false objects the really try to mistake people, and others which only simulate and have no intention to deceive as a priority. In order to prove the potential of the photographic fake as a critical element of media, even being part of it, so this work made a distinction between the concepts of forgery and simulation. The fake photographs or the ones produced as simulations are considered as devices for reflection elements of the production process itself or its representation as an element of culture. Through consideration of the studies of Hans Tietze and Nelson Goodman, it was observed that faking is a cultural practice that exists since the middle age. This practice is quite common in human social behavior, is directly related to the concepts of identity, originality and authenticity, concepts treated by Umberto Eco, who guided the approach about the false in this thesis. On the other side, there is the fake as simulation that uses the parody to promote critics. Through the studies of Linda Hutcheon, who gives the parody an ironic characteristic, this work defines one side of the fake as a parodic and ironic simulation. It was considered then as a corpus, a set of parody models: Not the Financial Times, which criticizes the traditional printed The Financial Times through imitation; BC Byte Series, archaeological work that relates the fictional work of art with the artefact; Esquire magazine, which publishes fiction news, among others. By selecting a diverse group, we verified that some examples present the hints that are responsible by the construction of the parodic sense in a concealed mode. So, a parody becomes a mock and determines the parodic and radical simulation. While examining the diverse photographic material chosen, it was observed that the manipulations are applied as forgeries, ironic or radical parodic simulations. The parodic radical simulative photography is pointed out through the analysis of photographer Joan Fontcuberta s works, who designs faked photographs of animals, vegetables and even photo biographies. It is clear, therefore, the existence of a critical reflection on the creative process and the nature of truth that, traditionally, is the ethos of photography. The concepts and the classification presented, together with the analysis, seek to highlight the importance of proper fake as ironic parody of reflective media, continuing dissertation The fake documentary, previous research by this author / Esta pesquisa traz um estudo sobre fake fotográfico, cada dia mais presente na imprensa e na publicidade mundiais. O termo fake é utilizado por abranger das produções falsas até aquelas que apenas simulam, sem ter como prioridade a intenção de enganar. Com o objetivo de comprovar o potencial do fake fotográfico, como elemento de crítica ao suporte midiático em que também está inserido, este trabalho fez uma distinção entre os conceitos de falsificação e simulação. As fotografias falsificadas ou produzidas como simulações são consideradas dispositivos para reflexão, seja a respeito do processo de produção em si ou de sua representação como elemento da cultura. Por meio da consideração dos estudos de Hans Tietze e Nelson Goodman, observou-se que a falsificação é uma prática cultural que data da Idade Média. Esta prática, bastante comum no comportamento social humano, está diretamente relacionada com os conceitos de identidade, originalidade e autenticidade, conceitos estes tratados por Umberto Eco, e que guiaram a abordagem do falso nesta pesquisa. Todavia, o fake, como simulação, utiliza a paródia para promover a crítica. Por meio dos estudos de Linda Hutcheon, que conferem à paródia uma característica essencialmente irônica, este trabalho define um primeiro aspecto do fake como simulação paródica irônica. Foi examinado, então, a título de corpus, um conjunto de modelos paródicos: Not the Financial Times, impresso que critica o tradicional The Financial Times através da imitação; B.C. Byte Series, trabalho arqueológico ficcional que relaciona a obra de arte com o artefato; a revista Esquire, que divulga notícias ficcionais, entre outros. Ao selecionar um grupo tão diversificado, verificou-se que alguns exemplos apresentam, de forma velada, as pistas responsáveis pela construção do sentido paródico. Assim, uma paródia tornase trote e determina a simulação paródica radical. Ainda examinando o diverso material fotográfico escolhido, observou-se que as manipulações são recorrentes, como falsificações, simulações paródicas irônicas ou radicais. A fotografia simulativa paródica radical é destacada através da análise dos trabalhos do fotógrafo Joan Fontcuberta, que compõe fotos fictícias, como as de animais, vegetais e até fotobiografias. Percebe-se, assim, a existência de uma reflexão crítica ao processo criativo e ao caráter de verdade que, tradicionalmente, constitui o ethos fotográfico. Os conceitos e a classificação que apresentamos, juntamente com as análises, buscam evidenciar a devida relevância do fake como paródia irônica reflexiva dos meios, dando continuidade à dissertação de mestrado O falso documentário, pesquisa previamente realizada por este autor
55

La protection des marques en Algérie : propositions pour une modification du droit de marque / Trademark protection in Algeria : proposals for a modification of the trademark law

Benaired, Abdelghani 11 January 2019 (has links)
En Algérie, la protection des marques est mise à l’épreuve par différentes formes d’atteintes, favorisant ainsi, un sentiment d’insécurité juridique très profond. Ce travail de recherche a vocation à effectuer une étude du droit positif algérien afin d’évaluer les dispositions relatives à la protection de la marque et d’en cerner les dispositions lacunaires pour tenter d’apporter des solutions. Nous allons analyser l’existence juridique de la marque afin de comprendre quand le titulaire bénéficie d’une protection sur sa marque, pour ensuite, exposer les instruments prévus dans la législation pour mettre en œuvre cette protection accordée à la marque avant et après son enregistrement. Tel est l’objet de la première partie. Nous allons ensuite dans la seconde partie étudier la protection de la marque au regard du droit comparé en analysant des notions et des principes prévus dans des droits étrangers, tels que l’acquisition de la protection de la marque par l’usage, la protection des marques non visuelles et le risque d’association dans l’esprit du public des consommateurs. Nous nous sommes également intéressés à la recherche d’un système procédural plus complet que celui déjà adopté en droit algérien. Serait important un recours judiciaire contre le refus d’enregistrement et de la procédure d’opposition contre les demandes d’enregistrement de marques, deux procédures négligées en droit algérien. Pour à la fin tenter de chercher une meilleure protection de la marque notoire, afin de proposer ces notions et principes, après avoir tenté de les adapter à la situation en Algérie, comme solutions pour rendre le droit positif algérien plus efficace et complet / In Algeria, trademark protection is put to the test by various forms of infringement, thus favoring a very deep sense of legal uncertainty. This research is intended to carry out a study of Algerian positive law in order to evaluate the provisions relating to the protection of the brand and to identify the incomplete provisions to try to provide solutions. We will analyze the legal existence of the mark in order to understand when the holder benefits from a protection on his mark, then to expose the instruments envisaged in the legislation to implement the protection granted to the mark before and after its registration, which is the purpose of the first part. In the second part, we will study the protection of the brand with regard to comparative law by analyzing concepts and principles provided for in foreign rights, such as the acquisition of trademark protection by use, the protection of non-visual marks and the risk of association in the minds of the consumers. We are also interested in the search for a more complete procedural system than that already adopted in Algerian law. It would be important to have a judicial appeal against the refusal of registration and the opposition procedure against trademark applications ; two procedures neglected by the Algerian legislator. In the end, we try to seek a better protection of the well-known brand, to propose these concepts and principles, after trying to adapt them to the situation in Algeria, as solutions to make Algerian positive law more effective and complete
56

A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games

Alzahrani, Naif Saeed 16 July 2019 (has links)
Counterfeit products, especially in the pharmaceutical sector, have plagued the international community for decades. To combat this problem, many anti-counterfeiting approaches have been proposed. They use either Radio Frequency Identification (RFID) or Near Field Communication (NFC) physical tags affixed to the products. Current anti-counterfeiting approaches detect two counterfeiting attacks: (1) modifications to a product's tag details, such as changing the expiration date; and (2) cloning of a genuine product's details to reuse on counterfeit products. In addition, these anti-counterfeiting approaches track-and-trace the physical locations of products as the products flow through supply chains. Existing approaches suffer from two main drawbacks. They cannot detect tag reapplication attacks, wherein a counterfeiter removes a legitimate tag from a genuine product and reapplies it to a counterfeit or expired product. Second, most existing approaches typically rely on a central server to authenticate products. This is not scalable and creates tremendous processing burden on the server, since significant volumes of products flood through the supply chain's nodes. In addition, centralized supply chains require substantial data storage to store authentication records for all products. Moreover, as with centralized systems, traditional supply chains inherently have the problem of a single-point of failure. The thesis of this dissertation is that a robust, scalable, counterfeiting-resistant supply chain that addresses the above drawbacks and can be simultaneously achieved by (i) using a combination of NFC tags on products and a distributed ledger such as blockchain for reapplication-proof, decentralized, and transparent product authentication (ii) a novel game-theoretical consensus protocol for enforcing true decentralization, and enhancing the protocol's security and performance. In this dissertation, we first propose a new Tag Reapplication Detection (TRD) system to detect reapplication attacks using low-cost NFC tags and public key cryptography. To detect reapplication attacks, TRD tracks the number of times a tag has been read in the supply chain using a 'central' authentication server. Second, leveraging the blockchain technology, we propose the Block-Supply Chain, a transformation of TRD into a decentralized supply chain. In this chain, each node maintains a blockchain (distributed public ledger) per product. This blockchain comprises chained blocks, where each is an authentication event. The Block-Supply Chain can detect tag reapplication attacks and can replace the centralized supply chain design, thus overcoming the centralization issues. One of the fundamental characteristics of blockchain technology is the consensus protocol. Consensus protocols ensure that all nodes in the blockchain network agree on the validity of a block to be included in the public ledger. The first and most popular of the existing consensus protocols is Proof of Work (PoW). However, PoW requires massive computational effort, resulting in high energy and computing resources consumption. Alternatively, Byzantine Fault Tolerance (BFT) protocols, such as Tendermint, were adapted in blockchain technology to be efficient and easy to implement. Nevertheless, not all of BFT protocols guarantee true decentralization, and they are mostly based on fixed-validators. BFT fixed-validators protocols typically rely on fixed, static validators responsible for validating all newly proposed blocks. This opens the door for adversaries to launch several attacks on these validators, such as Distributed Denial of Service (DDoS) and Eclipse attacks. In contrast, a truly decentralized protocol ensures that variable sets of anonymous validators execute the blocks' validations. Building on this observation, we propose the TrueBFT, a truly decentralized BFT-based consensus protocol that does not require PoW and randomly employs a different set of validators on each block's proposal. TrueBFT is designed for permissioned blockchains (in such blockchains, the participants who can transact on the blockchain are limited, and each participant is required to have permission to join the system). Our simulations show that TrueBFT offers remarkable performance with a satisfactory level of security compared to the state-of-the-art protocol Tendermint. Another issue with current consensus protocols, particularly the BFT, is that the majority of them do not take the number of employed validators into consideration. The number of validators in a blockchain network influences its security and performance substantially. In response, we integrate a game theoretical model into TrueBFT that analyzes the risk likelihood of each proposer (i.e., the node that creates and proposes the new block). Consequently, each time a new block is proposed, the 'number of validators' becomes proportional to the risk likelihood block's proposer. Additionally, the game model reinforces the honest behavior of the validators by rewarding honest validators and punishing dishonest ones. Together, TRD, Block-Supply Chain, and the game-theoretical TrueBFT consensus protocol enable robust, scalable, decentralized anti-counterfeiting supply chain that is resistant to tag reapplication attacks, as well as attacks to consensus protocols such as DDoS and Eclipse attacks.
57

Plastic card frauds, a survey of current relevant card and system properties / Plastkortsystem och brottsmöjligheter, en genomgång av egenskaper hos kort och läsare

Savostyanova, Natalia, Velichko, Valeriya January 2004 (has links)
<p>Recently the society has been turning from the use of paper-based technologies to plastic cards in certain spheres of our life. With the emergence and proliferation of high technologies we cannot content with the security provided bypaper only. Therefore the society has chosen plastic to protect its information because it offers far more security based not only on human perception but also on machine-readable elements. </p><p>The number of plastic cards in circulation in different spheres of our everyday life increases constantly. They replace money, documents and allow easy and safe access to some services. In spite of its security the plastic card however is subjected to fraud. </p><p>Plastic card fraud results in significant losses for the various industries. Since the first appearance of plastic cards methods of committing fraud have changed dramatically. Now there is a wide range of high technologies at the disposal of criminals as well as card manufacturers. </p><p>Therefore we have put the great emphasize of this work on the analysis of the most common card technologies in the Plastic Card World, the magnetic stripe and the chip, existing crimes and main means of their committing. And we also have revealed the weak and strong sides of the prevention techniques, which are currently in use.</p>
58

La contraffazione degli accessori moda di lusso: dalla vulnerabilità del mercato alle opportunità criminali / The Market of Counterfeit Luxury Leather Fashion Products: from Vulnerabilities to Opportunities for Crime

CALOVI, FRANCESCA 09 March 2007 (has links)
Questa tesi esplora il problema della contraffazione degli accessori moda di lusso allo scopo di capire le opportunità criminali che derivano dalle vulnerabilità del settore. Viene fornita prima una panoramica della contraffazione nel settore moda al fine di descrivere le caratteristiche principali del mercato illegale. Allo scopo di approfondire la conoscenza del fenomeno e delle opportunità criminali create dal mercato legale, viene quindi analizzata la struttura e il funzionamento del settore applicando la metodologia sviluppata dal centro di ricerca IRCP, la Methodology for and Assessment of the Vulnerability of Markets. Le domande principali a cui questa tesi vuole rispondere sono: - Quanto è vulnerabile il mercato italiano degli accessori moda di lusso alla contraffazione? - A quali fattori è imputabile la vulnerabilità alla contraffazione delle imprese italiane del settore moda? / This thesis is concerned with the problem of counterfeiting of leather luxury fashion goods and it is aimed at understanding the opportunities to crime produced by the vulnerabilities of this sector. First, it provides an overview of fashion counterfeiting trying to describe what the main features of the illegal market are. Then, in order to acquire a deeper knowledge of the phenomenon and of the opportunities arising in the legal market for the carrying out of illegal activities it analyses the structure and functioning of the sector in order to identify its vulnerabilities to this crime by applying the methodology for licit market scanning developed by the IRCP, the Methodology for and Assessment of the Vulnerability of Markets. The main questions this thesis wants to answer are: - To what extent are Italian luxury fashion companies vulnerable to counterfeit products? - To what factors can be ascribed to the vulnerability to counterfeiting of Italian legitimate fashion companies?
59

Il Crime-Proofing della legislazione applicato alla contraffazione. Il caso del settore moda italiano / Crime-Proofing Regulation Against Counterfeiting. The Case of the Italian Fashion Sector

MARTOCCHIA, SARA 10 March 2008 (has links)
Il crime-proofing è uno strumento di prevenzione criminale promosso dalla Commissione Europea fin dal 2000. Il concetto di crime-proofing parte dall'idea che la regolamentazione dei mercati legittimi possa essere criminogenica, ossia produrre involontariamente opportunità criminali (nuove tecniche, maggiori profitti e/o minori rischi a favore dei criminali). Lo scopo è identificare queste opportunità, se presenti, ed individuare possibili strategie di contrasto. Questa tesi indaga il crime-proofing partendo da un modello di Crime Risk Assessment (CRAM) elaborato a questo scopo per la Commissione Europea. Il CRAM è stato adattato e applicato ad un fenomeno criminale di estrema attualità: la contraffazione dei marchi, con particolare riferimento al settore moda in Italia. La contraffazione è oggi una forma di economia sotterranea che ha alti impatti economici e sociali. Il settore moda è uno dei più colpiti, a causa dell'alta domanda di beni contraffatti e di basse barriere di ingresso al mercato. L'Italia è un paese leader nel mercato mondiale ed è fortemente vulnerabile alla contraffazione. Il crime risk assessment presentato in questo studio evidenzia come il quadro normativo italiano agevoli inavvertitamente l'industria della contraffazione, attraverso opportunità non previste e scappatoie nella regolazione. Obiettivo finale è quello di verificare se il crime-proofing funziona, se la metodologia attuale può essere migliorata e come questa possa essere inserita nei processi di produzione legislativa, per minimizzare il rischio di conseguenze inattese. / Crime-proofing is a crime prevention method promoted by the EU Commission since 2000. It starts from the assumption that the regulation governing legitimate sectors/markets might be criminogenic, i.e. producing unexpected opportunities for crime, in terms of new techniques, higher rewards and/or lower risk to criminals. It therefore aims at identifying such opportunities, if any, and finding out possible remedies. This thesis explores the crime-proofing approach, starting from a Crime Risk Assessment Mechanism (CRAM) that was developed to this purpose for the EU Commission. This is adapted and applied to a topical criminal phenomenon: the counterfeiting of trademarks, with special reference to the Italian fashion sector. Counterfeiting is nowadays a form of underground economy, which produces negative economic and social impacts. Fashion is one of the most affected industries, because of high consumer demand of counterfeit goods and low barriers for market entry. Italy is a leader country in the global fashion industry and is highly vulnerable to counterfeiting. The crime risk assessment undertaken in this study highlights how the Italian regulatory framework may inadvertently facilitate the counterfeiting industry, through unintended opportunities and regulatory loopholes. The ultimate goal is to check the crime-proofing functioning, whether the methodology can be improved and how it can be implemented at law-making level to minimize the risk of unexpected effects.
60

The control of pirated compact discs products in Hong Kong: does penalization of consumers work?

Wu, Wai-han, Heidi., 胡慧嫻. January 2000 (has links)
published_or_final_version / Sociology / Master / Master of Social Sciences

Page generated in 0.125 seconds