A Strategic Approach Using Governance, Risk and Compliance Model to Deal with Online Counterfeit Market

One major aspect that attracts Indian online retail customer is buying products at ease & convenience at competitive prices. The India e-commerce growth story has so far been remarkable. The starts ups are being immensely funded by angel investor and venture capitalists and the valuation game is keeping them lucrative. Although the growth of many e-commerce in the past five to six years have been impressive, sale of counterfeit products and the online counterfeit market is a chronic problem for many industries, brands and also to the government. In this paper the authors have analyzed the factors that influence online counterfeit market to flourish, the present policies, framework and strategies available to deal with this threat. This paper also attempts to understand using a survey, if youngsters in the age group of 20 to 30 years, who shop online are aware of the online counterfeit market and the existing solution to deal with it. An attempt has been made to propose strategies to deal with the online counterfeit market. The authors have given a terminology for online counterfeit market and also have created a Governance Risk Compliance model at al level to deal with online counterfeiting.

[1]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[2]  Tim Phillips,et al.  Knockoff: The Deadly Trade in Counterfeit Goods: The True Story of the World's Fastest Growing Crime Wave , 2005 .

[3]  A. Radón Counterfeit Luxury Goods Online: An Investigation of Consumer Perceptions , 2012 .

[4]  Raquel Castaño,et al.  Constructing identity through the consumption of counterfeit luxury goods , 2010 .

[5]  Keke Gai,et al.  Internet-Based Anti-Counterfeiting Pattern with Using Big Data in China , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.

[6]  J. Kapferer Managing luxury brands , 1997 .

[7]  Seung-Hee Lee,et al.  A Review of the Determinants of Counterfeiting and Piracy and the Proposition for Future Research , 2009 .

[8]  T. Staake,et al.  Established Anti-counterfeiting Approaches – Best Practices , 2008 .

[9]  Hyeonho Park,et al.  Development of a product-counterfeiting incident cluster tool , 2014 .

[10]  Ian Phau,et al.  Targeting buyers of counterfeits of luxury brands: A study on attitudes of Singaporean consumers , 2009 .

[11]  Elgar Fleisch,et al.  Countering Counterfeit Trade - Illicit Market Insights, Best-Practice Strategies, and Management Toolbox , 2008 .

[12]  Dhanya Pramod A Study of Various Approaches to Assess and Provide Web based Application Security , 2011 .

[13]  Carl Shapiro,et al.  Foreign Counterfeiting of Status Goods , 1986 .

[14]  Jacqueline K. Eastman,et al.  The Elderly and Their Attitudes Toward the Internet: The Impact on Internet Use, Purchase, and Comparison Shopping , 2006 .

[15]  T. Staake,et al.  Business strategies in the counterfeit market , 2012 .

[16]  J. Zaichkowsky,et al.  Do counterfeits devalue the ownership of luxury brands , 2000 .

[17]  Alan Zimmerman,et al.  Protecting Your Intellectual Property Rights , 2013 .

[18]  A. Furnham,et al.  Faking it: Personality and individual difference predictors of willingness to buy counterfeit goods , 2009 .

[19]  Simon Wang,et al.  Shopping Online or Not? Cognition and Personality Matters , 2006, J. Theor. Appl. Electron. Commer. Res..

[20]  V. Ann Paulins,et al.  College students' attitudes toward shopping online for apparel products , 2005 .