Handbook of Research on Counterfeiting and Illicit Trade
Show Less

Handbook of Research on Counterfeiting and Illicit Trade

Edited by Peggy E. Chaudhry

This unique Handbook provides multiple perspectives on the growth of illicit trade, primarily exploring counterfeits and internet piracy. It includes expert opinion on a wide range of topics including the evaluation of key global enforcement issues, government and private-sector agency initiatives to stifle illicit trade, and the evolution of piracy on the internet. The authors also assess the efficacy of anti-counterfeiting strategies such as targeted consumer campaigns, working with intermediaries in the supply chain, authentication technology, and online brand protection.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 19: Detecting counterfeits in the supply chain: how to use authentication methods

Ian Lancaster


This chapter describes the concept of product authentication as a system which comprises the authentication device, tools to examine the device and examiners who are trained and equipped to carry out the examination of the device. It shows that the purpose of authentication systems is to detect counterfeit goods in the supply chain and thus prevent them from reaching consumers, not to prevent the production of counterfeits. Overt, covert and networked authentication features are described, and a conclusion reached that the most effective features combine overt and covert elements. The function of track and trace as an anti-counterfeiting method is discussed, concluding that it offers control of supply chains but does not provide authentication, and it can only operate in the legitimate supply chain, not in the illicit supply chain, which is the route used by many counterfeiters. The function of smartphones in authentication is examined, concluding that they have a role to play in the hands of specialist examiners but are unlikely to lead to the involvement of the public in examining goods to determine whether they are genuine or fake. Finally, the chapter discusses the return on investment for authentication systems.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.