Spelling suggestions: "subject:"counterfeit anda counteracting"" "subject:"counterfeit anda counterfeit""
11 |
The effect of word-of-mouth on the purchase of genuine and counterfelt luxury brands : the roles of attitude functionsWANG, Wei 01 January 2011 (has links)
This research aims to investigate the effect of word-of-mouth (WOM) on the purchase of genuine and counterfeit luxury brands with a focus on the roles of attitude functions, product type, valence of WOM, and brand popularity. It consists of two experimental studies. Study 1 examines the effect of WOM on the purchase of luxury brands and attempts to investigate the mediating role of attitude functions in the relationship between WOM and purchase intentions for luxury brands, with regard to different product types and valence of WOM. Study 2 compares the effects of WOM communications with traditional advertising on the purchase of counterfeit and genuine luxury brands. It also examines the differences between popular and non-popular luxury brands.
Results reveal that social-adjustive and value-expressive functions fully mediate the effect of WOM on luxury brand evaluation while partially mediate the effect of product type on luxury brand evaluation. The effect of WOM on attitude functions is more pronounced for high (vs. low) susceptibility to interpersonal influence consumers. Findings of Study 2 support the moderating role of subjective norm in the self-monitoring and counterfeit luxury brand evaluation relationship, indicating that compared to advertising, WOM is a more effective way to decrease counterfeit luxury brand consumption. Managerial implications for strategic brand management and directions for future research are discussed.
|
12 |
A hardware-enabled certificate of authenticity system with intrinsically high entropyLakafosis, Vasileios 09 April 2013 (has links)
The objective of the proposed research is the design and fabrication of a novel stand-alone wireless robust system with enhanced hardware-enabled authentication and anti-counterfeiting capabilities. The system consists of two major components; the near-field certificates of authenticity (CoA), which serve as authenticity vouchers of the products they are attached to, and a microcontroller-enabled, low-power and low-cost reader. Small-sized passive physical three-dimensional structures that are composed of extremely cheap conductive and dielectric materials are shown to yield a unique and repeatable RF signature in a small portion of the frequency spectrum when brought in the reactive and radiating near-field regions of an array of miniature antennas. The multidimensional features of these CoAs, or in other words their signature or fingerprint, are cryptographically signed and digitally stored. The contactless signature validation procedure, in which an attempt to associate the near-field signature response of the physical CoA with the digitized signature, is carried out by the reader designed and fabricated. This low-cost reader operates autonomously and in an offline fashion. The feasibility and performance robustness of the system, in terms of accuracy, consistency and speed of capturing of the signatures, is rigorously assessed with a wide array of tests. Moreover, the entropy, or uncertainty, of the signatures generated by the system are empirically quantified and verified to achieve a virtually impossible false alarm. The aforementioned characteristics of the realized authentication system make it applicable to a vast array of physical objects that needs protection against counterfeiters.
|
13 |
Justifying defenses from the burglars: consumer psychology of pirated products. / Pirated productsJanuary 2000 (has links)
Yeung Hoi Calvin. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2000. / Includes bibliographical references (leaves 52-53). / Abstracts in English and Chinese, appendix in Chinese.
|
14 |
A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian GamesAlzahrani, Naif Saeed 16 July 2019 (has links)
Counterfeit products, especially in the pharmaceutical sector, have plagued the international community for decades. To combat this problem, many anti-counterfeiting approaches have been proposed. They use either Radio Frequency Identification (RFID) or Near Field Communication (NFC) physical tags affixed to the products. Current anti-counterfeiting approaches detect two counterfeiting attacks: (1) modifications to a product's tag details, such as changing the expiration date; and (2) cloning of a genuine product's details to reuse on counterfeit products. In addition, these anti-counterfeiting approaches track-and-trace the physical locations of products as the products flow through supply chains.
Existing approaches suffer from two main drawbacks. They cannot detect tag reapplication attacks, wherein a counterfeiter removes a legitimate tag from a genuine product and reapplies it to a counterfeit or expired product. Second, most existing approaches typically rely on a central server to authenticate products. This is not scalable and creates tremendous processing burden on the server, since significant volumes of products flood through the supply chain's nodes. In addition, centralized supply chains require substantial data storage to store authentication records for all products. Moreover, as with centralized systems, traditional supply chains inherently have the problem of a single-point of failure.
The thesis of this dissertation is that a robust, scalable, counterfeiting-resistant supply chain that addresses the above drawbacks and can be simultaneously achieved by (i) using a combination of NFC tags on products and a distributed ledger such as blockchain for reapplication-proof, decentralized, and transparent product authentication (ii) a novel game-theoretical consensus protocol for enforcing true decentralization, and enhancing the protocol's security and performance.
In this dissertation, we first propose a new Tag Reapplication Detection (TRD) system to detect reapplication attacks using low-cost NFC tags and public key cryptography. To detect reapplication attacks, TRD tracks the number of times a tag has been read in the supply chain using a 'central' authentication server. Second, leveraging the blockchain technology, we propose the Block-Supply Chain, a transformation of TRD into a decentralized supply chain. In this chain, each node maintains a blockchain (distributed public ledger) per product. This blockchain comprises chained blocks, where each is an authentication event. The Block-Supply Chain can detect tag reapplication attacks and can replace the centralized supply chain design, thus overcoming the centralization issues.
One of the fundamental characteristics of blockchain technology is the consensus protocol. Consensus protocols ensure that all nodes in the blockchain network agree on the validity of a block to be included in the public ledger. The first and most popular of the existing consensus protocols is Proof of Work (PoW). However, PoW requires massive computational effort, resulting in high energy and computing resources consumption. Alternatively, Byzantine Fault Tolerance (BFT) protocols, such as Tendermint, were adapted in blockchain technology to be efficient and easy to implement. Nevertheless, not all of BFT protocols guarantee true decentralization, and they are mostly based on fixed-validators. BFT fixed-validators protocols typically rely on fixed, static validators responsible for validating all newly proposed blocks. This opens the door for adversaries to launch several attacks on these validators, such as Distributed Denial of Service (DDoS) and Eclipse attacks. In contrast, a truly decentralized protocol ensures that variable sets of anonymous validators execute the blocks' validations. Building on this observation, we propose the TrueBFT, a truly decentralized BFT-based consensus protocol that does not require PoW and randomly employs a different set of validators on each block's proposal. TrueBFT is designed for permissioned blockchains (in such blockchains, the participants who can transact on the blockchain are limited, and each participant is required to have permission to join the system). Our simulations show that TrueBFT offers remarkable performance with a satisfactory level of security compared to the state-of-the-art protocol Tendermint.
Another issue with current consensus protocols, particularly the BFT, is that the majority of them do not take the number of employed validators into consideration. The number of validators in a blockchain network influences its security and performance substantially. In response, we integrate a game theoretical model into TrueBFT that analyzes the risk likelihood of each proposer (i.e., the node that creates and proposes the new block). Consequently, each time a new block is proposed, the 'number of validators' becomes proportional to the risk likelihood block's proposer. Additionally, the game model reinforces the honest behavior of the validators by rewarding honest validators and punishing dishonest ones.
Together, TRD, Block-Supply Chain, and the game-theoretical TrueBFT consensus protocol enable robust, scalable, decentralized anti-counterfeiting supply chain that is resistant to tag reapplication attacks, as well as attacks to consensus protocols such as DDoS and Eclipse attacks.
|
15 |
An evaluation of identification methods used in the investigation of counterfeit card fraudGeldenhuys, Nicolaas D. C. 02 1900 (has links)
Today, the use of one's bank card to pay or withdraw money is common. Modern technology provides us with the convenience of instant transactions at the automated teller machine or point of sale but unfortunately, it has also brought the reality and risk of card skimming and counterfeit card fraud. Criminals have become very efficient and technologically advanced in skimming and counterfeiting cards, to such an extent that counterfeit card fraud has become a significant threat to the public, banking, retail and business in South Africa.
Counterfeit card fraud is a complex, multi-faceted crime, requiring specific skills and knowledge of card counterfeiting methods from police and bank investigators. The scope of its investigation is wide. It includes different crime scenes and offenders, sophisticated equipment and various aspects that need to be identified positively. Investigators find it difficult to identify perpetrators and certain aspects unique to this crime and, as a result, many investigations are unsuccessful. This research endeavours to establish what identification methods are available to investigators and which are effective. / Police Practice / M. Tech. (Forensic Investigation)
|
16 |
A critical analysis of the policing of counterfeit goods in South AfricaThenga, Godfrey 10 1900 (has links)
The researcher conducted a critical analysis of the policing of counterfeit crime in South Africa. A pure qualitative research design and approach was adopted. A literature review, interviews and observations were conducted to provide an overview of this problem nationally and internationally.
Interview schedules were designed with pre-determined open-ended questions, which allowed participants to explain their perceptions, opinions and viewpoints on the policing of counterfeit in South Africa. Some of the designed questions were mailed to respondents.
Questions were posed to members of the Specialised Commercial Crime Unit, members of the South African Police Service’s Crime Prevention Unit, members of the Department of Trade and Industry who deal with counterfeit, prosecutors who normally prosecute counterfeit cases, brand owners/holders/representatives, and attorneys who assist in the policing of counterfeit crime.
The findings of this study informed the proposed recommendations for preventative and reactive response mechanisms. These proposed recommendations suggest ways of improving efficiency and effectiveness in policing counterfeit in South Africa. / Criminology and Security Science / Ph. D. (Criminal Justice)
|
Page generated in 0.143 seconds