Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-3 of 3
Keywords: Counterfeiting
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
ManMohan S. Sodhi, Samuel Roscoe, Lisa Marie Ellram, Christopher Tang, Joseph Sarkis, Robert B. Handfield, Jens K. Roehrich, Martin C. Schleper
International Journal of Operations & Production Management (2025) 45 (13): 233–252.
Published: 22 October 2025
... Counterfeiting In September 2024, a coordinated explosion of pagers and walkie-talkies in Beirut, Lebanon, sent hundreds of Hezbollah members, a militant group, to the hospital for emergency treatment and killed at least 12 people, including non-combatants (BBC, 2024a ; FT, 2024). Soon after, Israeli...
Journal Articles
Designing blockchain systems to prevent counterfeiting in wine supply chains: a multiple-case study
Open Access
International Journal of Operations & Production Management (2021) 41 (13): 1–33.
Published: 18 February 2021
...Pamela Danese; Riccardo Mocellin; Pietro Romano Purpose The purpose of this paper is to contribute to the debate on blockchain (BC) adoption for preventing counterfeiting by investigating BC systems where different options for BC feeding and reading complement the use of BC technology...
Includes: Supplementary data
Journal Articles
An exploratory analysis of counterfeiting strategies: Towards counterfeit-resilient supply chains
Available to Purchase
International Journal of Operations & Production Management (2015) 35 (1): 110–144.
Published: 05 January 2015
...Mark Stevenson; Jerry Busby Purpose – The purpose of this paper is to identify strategies employed by product counterfeiters in their exploitation of legitimate supply chains; to develop a theoretical understanding of counterfeiting and its impact on competitive resources; and, to propose counter...
