Jump to Content
Jump to Main Navigation
Get Access or Sign In
Register
Browse
Librarian Services
Contact our Sales Department
Customer Service
Benefits
Authentication and Remote Access
Licensing Terms & Conditions
MARC Records
KBART Lists
Indexing & Discoverability
Free Trial
Customer Resource
Help
Academic Libraries
Non-Academic Libraries
Researchers & Students
Products
Major Annual Subject Collections
Essentials Collections
Handbook Collections
Encyclopedia
Subject Specific Collections
Tailored/Pick & Choose Collections
Elgar Advanced Introductions: Law
Practitioner Law Collections
Open Access
Subjects
Business & Management
Economics & Finance
Environment
Geography, Planning & Tourism
Law
Political Science & Public Policy
Sociology, Social Policy & Education
Journals
Journals
Pricing & Subscriptions
Journal Policies
Open Access Journals
Search
Advanced Search
Help
Advanced Search
Help
Get Access or Sign In
Register
Browse
Librarian Services
Contact our Sales Department
Customer Service
Benefits
Authentication and Remote Access
Licensing Terms & Conditions
MARC Records
KBART Lists
Indexing & Discoverability
Free Trial
Customer Resource
Help
Academic Libraries
Non-Academic Libraries
Researchers & Students
Products
Major Annual Subject Collections
Essentials Collections
Handbook Collections
Encyclopedia
Subject Specific Collections
Tailored/Pick & Choose Collections
Elgar Advanced Introductions: Law
Practitioner Law Collections
Open Access
Subjects
Business & Management
Economics & Finance
Environment
Geography, Planning & Tourism
Law
Political Science & Public Policy
Sociology, Social Policy & Education
Journals
Journals
Pricing & Subscriptions
Journal Policies
Open Access Journals
Previous Chapter
Next Chapter
Chapter 1: Introduction: Trojan horses, pirate bays and anti-counterfeiting
Peggy E. Chaudhry
Full access
Download PDF
Category:
Handbook Chapter
Published:
28 Jul 2017
Page Range:
1–10
Collection:
Social and Political Science 2017
DOI:
https://doi.org/10.4337/9781785366451.00007
Full access
Download PDF
PDF
Handbook of Research on Counterfeiting and Illicit Trade
Edited by
Peggy E. Chaudhry
Handbook
Published:
28 Jul 2017
Print ISBN:
9781785366444
eISBN:
9781785366451
DOI:
https://doi.org/10.4337/9781785366451
Pages:
c 520
Collection:
Social and Political Science 2017
Buy Print
Table of Contents
Front Matter
Copyright
Contents
Contributors
Foreword
Acknowledgments
Chapter 1: Introduction: Trojan horses, pirate bays and anti-counterfeiting
PART I: ALARMING TRENDS IN ILLICIT TRADE AND KEY GLOBAL ENFORCEMENT ISSUES
Chapter 2: Illicit trade in counterfeit products: an examination of the opportunity–risk connection
Chapter 3: Key global enforcement issues on illicit trade in goods
Chapter 4: Reaching beyond banks: how to target trade-based money laundering and terrorist financing outside the financial sector
PART II: COUNTRY INITIATIVES DESIGNED TO STEM ILLICIT TRADE
Chapter 5: Initiatives to stem illicit trade in the United States
Chapter 6: Initiatives to stem illicit trade in Mexico
Chapter 7: Initiatives to stem illicit trade in China’s e-commerce
PART III: IMPACT OF ILLICIT TRADE ON SELECT INDUSTRY SECTORS
Chapter 8: The challenge of curtailing the escalation of counterfeit pharmaceuticals
Chapter 9: Counterfeiting luxury goods
Chapter 10: Illicit trade in the tobacco sector
PART IV: THE GROWING PROBLEM ON THE INTERNET
Chapter 11: Overview of the magnitude of piracy on the internet
Chapter 12: Social media’s impact on intellectual property rights
Chapter 13: Dynamic shifts in music piracy: a review of the music industry and underlying technology innovations
Chapter 14: Online brand protection
Chapter 15: The looming shadow of illicit trade on the internet: botnets, malware and malvertising
PART V: MANAGERIAL AND CONSUMER PERCEPTIONS OF THE EFFECTIVENESS OF ANTI-COUNTERFEITING TACTICS
Chapter 16: Analysis of anti-counterfeiting tactics to diffuse consumer demand
Chapter 17: Effectiveness against counterfeiting: four decades of strategic inquiry
Chapter 18: The critical role of intermediaries in stopping counterfeiting and piracy
Chapter 19: Detecting counterfeits in the supply chain: how to use authentication methods
Index
Subjects
Business and Management
International Business
Economics and Finance
Economic Crime and Corruption
International Business
International Economics
Law - Academic
Corruption and Economic Crime
Intellectual Property Law
International Economic Law, Trade Law
Email this content
Share Link
Copy this link, or click below to email it to a friend
Email this content
or copy the link directly:
https://www.elgaronline.com/display/edcoll/9781785366444/9781785366444.00007.xml
The link was not copied. Your current browser may not support copying via this button.
Link copied successfully
Copy link
[18.232.31.206]
18.232.31.206
Sign in to annotate
Close
Edit
Character limit
500
/500
Delete
Cancel
Save
@!
Character limit
500
/500
Cancel
Save
View Expanded
View Table
View Full Size