Technological strategies to deal with counterfeit m edicines: the European and North-American perspectives

 Abstract— The magnitude of counterfeit medicines represents a serious and increasingly rising international concern. In fact, it is estimated that 10% of the pharmaceutical products sold worldwide are counterfeited. The scope of counterfeited medicines is equally worrisome since counterfeiting activities target both branded and generic products as well as non-prescription medicines to life-saving drugs. It is therefore critical for the stakeholders of different pharmaceutical supply chains to elaborate and develop effective technological strategies to combat the phenomenon of counterfeit medicines. This paper examines the effectiveness of such strategies from both the European and

[1]  A. Peterson,et al.  A survey of selected Internet pharmacies in the United States. , 2001, Journal of the American Pharmaceutical Association.

[2]  Suhong Li,et al.  Reviewing the drivers and challenges in RFID implementation in the pharmaceutical supply chain , 2009, Int. J. Electron. Bus..

[3]  Chin-Ling Chen,et al.  Anti-counterfeit ownership transfer protocol for low cost RFID system , 2008 .

[4]  Dimitra Voulgaridou,et al.  Electronic alliances and the (para) pharmaceutical supply chain: identification of risks , 2005 .

[5]  Lucian Constantin Gabriel Budacia,et al.  Identification based on radio frequency (RFID): a new information technology with broad applications in economics , 2009 .

[6]  Bharatendu Srivastava,et al.  Radio frequency ID technology: The next revolution in SCM , 2004 .

[7]  May Tajima Strategic value of RFID in supply chain management , 2007 .

[8]  R. Henderson Of life cycles real and imaginary : the unexpectedly long old age of optical lithography , 1995 .

[9]  R. Garud,et al.  Inter-generational transitions in socio-technical systems: The case of mobile communications , 2009 .

[10]  J.D. MacDonald Safe and Secure , 2006, IEEE Power and Energy Magazine.

[11]  Indy Chakrabarti An auto-ID based approach to reduce counterfeiting in the U.S. pharmaceutical supply chain , 2003 .

[12]  Andrew G. White,et al.  RFID in the supply chain : lessons from European early adopters , 2008 .

[13]  Kwoting Fang,et al.  Enhancing medication safety and reduce adverse drug events on inpatient medication administration using RFID , 2008 .

[14]  Anup Kumar,et al.  RFID Security and Privacy Concerns , 2005 .

[15]  E. W. Schuster,et al.  Global RFID: The Value of the EPCglobal Network for Supply Chain Management , 2007 .

[16]  S. Wamba,et al.  RFID Adoption Issues: Analysis of Organizational Benefits and Risks , 2009 .

[17]  ChiaCheng Chao,et al.  Determining technology trends and forecasts of RFID by a historical review and bibliometric analysis from 1991 to 2005 , 2007 .

[18]  Tatsuhiro Tamaki,et al.  Development of a traceability system based on open source software for small and medium enterprises in Japan , 2009 .

[19]  M. Attaran RFID: an enabler of supply chain operations , 2007 .

[20]  Norman Azah Anir,et al.  The users perceptions and opportunities in Malaysia in introducing RFID system for Halal food tracking , 2008 .

[21]  Daniel P. Lorence,et al.  Using IP law as a medical patient safety tool: efforts from the US and China , 2009 .

[22]  Ruey-Shun Chen,et al.  Using RFID technology in produce traceability , 2008 .

[23]  V. Potdar,et al.  Applications of RFID in Pharmaceutical Industry , 2006, 2006 IEEE International Conference on Industrial Technology.

[24]  M. Lynne Markus,et al.  Toward a “Critical Mass” Theory of Interactive Media , 1987 .

[25]  Yossi Sheffi,et al.  RFID AND THE INNOVATION CYCLE , 2004 .

[26]  Egils Ginters,et al.  RFID protocol evaluation using Bayesian networks , 2009 .

[27]  Roy Want,et al.  RFID. A key to automating everything. , 2004, Scientific American.

[28]  Anil K Deisingh,et al.  Pharmaceutical counterfeiting. , 2005, The Analyst.

[29]  Jason C. Gallagher,et al.  Issues in Internet Pharmacy Practice , 2000, The Annals of pharmacotherapy.

[30]  Egils Ginters,et al.  Security problems of RFID authentication protocols , 2007 .

[31]  Sean Cavanagh,et al.  Safe and Secure. , 2004 .