Using social network analysis to combat counterfeiting

Counterfeiting undoubtedly produces great harm to companies and the society. This article presents a study on the application of social network analysis (SNA) to combating this problem. The supply chain can be viewed as a network of parties involved in delivering value to consumers. Normally, SNA is used to analyse relationships between people. In this study, it is utilised to analyse supply chains for the identification of parties that are likely to be involved in counterfeiting activities. After identifying the suspects in a supply chain, the company can deter and detect counterfeiting by tightening surveillance on these parties. The feasibility of using SNA as an anti-counterfeiting tool is investigated in a case study, the findings of which indicate that SNA can effectively help companies to prevent sources of counterfeit products from infiltrating into the supply chain. Problematic parties can be identified by characterising the following features: high degree of centrality, high closeness of centrality and high betweenness of centrality.

[1]  C. L. Hung The business of product counterfeiting in China and the post-WTO membership environment , 2003 .

[2]  Pasi Fränti,et al.  Web Data Mining , 2009, Encyclopedia of Database Systems.

[3]  Celso Augusto de Matos,et al.  Consumer attitudes toward counterfeits: a review and extension , 2007 .

[4]  László Monostori,et al.  A survey of applications and requirements of unique identification systems and RFID techniques , 2011, Comput. Ind..

[5]  John Scott What is social network analysis , 2010 .

[6]  M. Christopher Logistics and supply chain management , 2011 .

[7]  Patrick Chi-leung Hui,et al.  Cryptography and authentication on RFID passive tags for apparel products , 2006, Comput. Ind..

[8]  Anand Swaminathan,et al.  NETWORK STRUCTURE AND BUSINESS SURVIVAL: THE CASE OF U.S. AUTOMOBILE COMPONENT SUPPLIERS , 2002 .

[9]  John Spink,et al.  Overview of the Selection of Strategic Authentication and Tracing Programmes 9 , 2012 .

[10]  Tom A. B. Snijders,et al.  Social Network Analysis , 2011, International Encyclopedia of Statistical Science.

[11]  P. V. Marsden,et al.  NETWORK DATA AND MEASUREMENT , 1990 .

[12]  Elif Akagun Ergin The rise in the sales of counterfeit brands: The case of Turkish consumers , 2010 .

[13]  Daria Battini,et al.  Performance measurement in supply chains: new network analysis and entropic indexes , 2010 .

[14]  Vladimir Batagelj,et al.  Centrality in Social Networks , 1993 .

[15]  Sophie Cockcroft The use of Social Network Analysis to explore relationships between the Medical Informatics and Information Systems literature , 2010, AMCIS.

[16]  S. Borgatti,et al.  On Social Network Analysis in a Supply Chain Context , 2009 .

[17]  D. Brinkerhoff,et al.  Accountability and health systems: toward conceptual clarity and policy relevance. , 2004, Health policy and planning.

[18]  S. Lazzarini,et al.  Integrating supply chain and network analyses: The study of netchains , 2001 .

[19]  Chi Fai Cheung,et al.  A counterfeit network analyzer based on RFID and EPC , 2010, Ind. Manag. Data Syst..

[20]  Mikko Lehtonen,et al.  From Identification to Authentication – A Review of RFID Product Authentication Techniques , 2008 .

[21]  Fred A. Kuglin,et al.  The Supply Chain Network @ Internet Speed: Preparing Your Company for the E-Commerce Revolution , 2000 .

[22]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .

[23]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[24]  Stephen P. Borgatti,et al.  Social Networks and Organizations , 2012 .

[25]  C. N. Bezuidenhout,et al.  Network-analysis approaches to deal with causal complexity in a supply network , 2012 .

[26]  I. Chen,et al.  Understanding supply chain management: critical research and a theoretical framework , 2004 .

[27]  Laoucine Kerbache,et al.  Queueing networks and the topological design of supply chain systems , 2004 .

[28]  Lewis T. Kontnik,et al.  Counterfeiting exposed : protecting your brand and customers , 2003 .

[29]  W. B. Lee,et al.  Critical Elements and Lessons Learnt from the Implementation of an RFID-enabled Healthcare Management System in a Medical Organization , 2011, Journal of Medical Systems.

[30]  Wing Bun Lee,et al.  An Intelligent RFID-based Electronic Anti-Counterfeit System (InRECS) for the Manufacturing Industry , 2008 .

[31]  S. Bastia,et al.  Next generation technologies to combat counterfeiting of electronic components , 2002 .

[32]  N. R. Srinivasa Raghavan,et al.  Generalized queueing network analysis of integrated supply chains , 2001 .