Using social network analysis to combat counterfeiting
暂无分享,去创建一个
[1] C. L. Hung. The business of product counterfeiting in China and the post-WTO membership environment , 2003 .
[2] Pasi Fränti,et al. Web Data Mining , 2009, Encyclopedia of Database Systems.
[3] Celso Augusto de Matos,et al. Consumer attitudes toward counterfeits: a review and extension , 2007 .
[4] László Monostori,et al. A survey of applications and requirements of unique identification systems and RFID techniques , 2011, Comput. Ind..
[5] John Scott. What is social network analysis , 2010 .
[6] M. Christopher. Logistics and supply chain management , 2011 .
[7] Patrick Chi-leung Hui,et al. Cryptography and authentication on RFID passive tags for apparel products , 2006, Comput. Ind..
[8] Anand Swaminathan,et al. NETWORK STRUCTURE AND BUSINESS SURVIVAL: THE CASE OF U.S. AUTOMOBILE COMPONENT SUPPLIERS , 2002 .
[9] John Spink,et al. Overview of the Selection of Strategic Authentication and Tracing Programmes 9 , 2012 .
[10] Tom A. B. Snijders,et al. Social Network Analysis , 2011, International Encyclopedia of Statistical Science.
[11] P. V. Marsden,et al. NETWORK DATA AND MEASUREMENT , 1990 .
[12] Elif Akagun Ergin. The rise in the sales of counterfeit brands: The case of Turkish consumers , 2010 .
[13] Daria Battini,et al. Performance measurement in supply chains: new network analysis and entropic indexes , 2010 .
[14] Vladimir Batagelj,et al. Centrality in Social Networks , 1993 .
[15] Sophie Cockcroft. The use of Social Network Analysis to explore relationships between the Medical Informatics and Information Systems literature , 2010, AMCIS.
[16] S. Borgatti,et al. On Social Network Analysis in a Supply Chain Context , 2009 .
[17] D. Brinkerhoff,et al. Accountability and health systems: toward conceptual clarity and policy relevance. , 2004, Health policy and planning.
[18] S. Lazzarini,et al. Integrating supply chain and network analyses: The study of netchains , 2001 .
[19] Chi Fai Cheung,et al. A counterfeit network analyzer based on RFID and EPC , 2010, Ind. Manag. Data Syst..
[20] Mikko Lehtonen,et al. From Identification to Authentication – A Review of RFID Product Authentication Techniques , 2008 .
[21] Fred A. Kuglin,et al. The Supply Chain Network @ Internet Speed: Preparing Your Company for the E-Commerce Revolution , 2000 .
[22] Leonard M. Freeman,et al. A set of measures of centrality based upon betweenness , 1977 .
[23] L. Freeman. Centrality in social networks conceptual clarification , 1978 .
[24] Stephen P. Borgatti,et al. Social Networks and Organizations , 2012 .
[25] C. N. Bezuidenhout,et al. Network-analysis approaches to deal with causal complexity in a supply network , 2012 .
[26] I. Chen,et al. Understanding supply chain management: critical research and a theoretical framework , 2004 .
[27] Laoucine Kerbache,et al. Queueing networks and the topological design of supply chain systems , 2004 .
[28] Lewis T. Kontnik,et al. Counterfeiting exposed : protecting your brand and customers , 2003 .
[29] W. B. Lee,et al. Critical Elements and Lessons Learnt from the Implementation of an RFID-enabled Healthcare Management System in a Medical Organization , 2011, Journal of Medical Systems.
[30] Wing Bun Lee,et al. An Intelligent RFID-based Electronic Anti-Counterfeit System (InRECS) for the Manufacturing Industry , 2008 .
[31] S. Bastia,et al. Next generation technologies to combat counterfeiting of electronic components , 2002 .
[32] N. R. Srinivasa Raghavan,et al. Generalized queueing network analysis of integrated supply chains , 2001 .