Show Less
Buy Book in Print
Handbook of Research on Counterfeiting and Illicit Trade
Edited by Peggy E. Chaudhry
This unique Handbook provides multiple perspectives on the growth of illicit trade, primarily exploring counterfeits and internet piracy. It includes expert opinion on a wide range of topics including the evaluation of key global enforcement issues, government and private-sector agency initiatives to stifle illicit trade, and the evolution of piracy on the internet. The authors also assess the efficacy of anti-counterfeiting strategies such as targeted consumer campaigns, working with intermediaries in the supply chain, authentication technology, and online brand protection.
Handbook
- Published in print:
- 28 Jul 2017
- ISBN:
- 9781785366444
- eISBN:
- 9781785366451
- Pages:
- c 520
Show Summary Details
- Handbook of Research on Counterfeiting and Illicit Trade
- Copyright
- Contents
- Contributors
- Foreword
- Acknowledgments
- Chapter 1: Introduction: Trojan horses, pirate bays and anti-counterfeiting
- Chapter 2: Illicit trade in counterfeit products: an examination of the opportunity–risk connection
- Chapter 3: Key global enforcement issues on illicit trade in goods
- Chapter 4: Reaching beyond banks: how to target trade-based money laundering and terrorist financing outside the financial sector
- Chapter 5: Initiatives to stem illicit trade in the United States
- Chapter 6: Initiatives to stem illicit trade in Mexico
- Chapter 7: Initiatives to stem illicit trade in China’s e-commerce
- Chapter 8: The challenge of curtailing the escalation of counterfeit pharmaceuticals
- Chapter 9: Counterfeiting luxury goods
- Chapter 10: Illicit trade in the tobacco sector
- Chapter 11: Overview of the magnitude of piracy on the internet
- Chapter 12: Social media’s impact on intellectual property rights
- Chapter 13: Dynamic shifts in music piracy: a review of the music industry and underlying technology innovations
- Chapter 14: Online brand protection
- Chapter 15: The looming shadow of illicit trade on the internet: botnets, malware and malvertising
- Chapter 16: Analysis of anti-counterfeiting tactics to diffuse consumer demand
- Chapter 17: Effectiveness against counterfeiting: four decades of strategic inquiry
- Chapter 18: The critical role of intermediaries in stopping counterfeiting and piracy
- Chapter 19: Detecting counterfeits in the supply chain: how to use authentication methods
- Index
This content is available to you
Foreword
Handbook Chapter
- Published:
- 28 July 2017
- Category:
- Handbook Chapter
- Pages:
- xiii–xiv (2 total)
Collection:
Social and Political Science 2017
If the inline PDF is not rendering correctly, you can download the PDF file here.
- Handbook of Research on Counterfeiting and Illicit Trade
- Copyright
- Contents
- Contributors
- Foreword
- Acknowledgments
- Chapter 1: Introduction: Trojan horses, pirate bays and anti-counterfeiting
- Chapter 2: Illicit trade in counterfeit products: an examination of the opportunity–risk connection
- Chapter 3: Key global enforcement issues on illicit trade in goods
- Chapter 4: Reaching beyond banks: how to target trade-based money laundering and terrorist financing outside the financial sector
- Chapter 5: Initiatives to stem illicit trade in the United States
- Chapter 6: Initiatives to stem illicit trade in Mexico
- Chapter 7: Initiatives to stem illicit trade in China’s e-commerce
- Chapter 8: The challenge of curtailing the escalation of counterfeit pharmaceuticals
- Chapter 9: Counterfeiting luxury goods
- Chapter 10: Illicit trade in the tobacco sector
- Chapter 11: Overview of the magnitude of piracy on the internet
- Chapter 12: Social media’s impact on intellectual property rights
- Chapter 13: Dynamic shifts in music piracy: a review of the music industry and underlying technology innovations
- Chapter 14: Online brand protection
- Chapter 15: The looming shadow of illicit trade on the internet: botnets, malware and malvertising
- Chapter 16: Analysis of anti-counterfeiting tactics to diffuse consumer demand
- Chapter 17: Effectiveness against counterfeiting: four decades of strategic inquiry
- Chapter 18: The critical role of intermediaries in stopping counterfeiting and piracy
- Chapter 19: Detecting counterfeits in the supply chain: how to use authentication methods
- Index