Journal of Brand Management

, Volume 23, Issue 3, pp 345–361 | Cite as

Organizing for brand protection and responding to product counterfeit risk: An analysis of global firms

Original Article

Abstract

Product counterfeiting represents a large, growing risk to many global firms, albeit one whose dimensions are not easily measured. While firms increasingly recognize the need to address the threat of counterfeiting, there has been little research, typically highly specific case studies, on how they do so. To advance analysis of how firms respond to product-counterfeiting issues, we interviewed representatives of 10 large global firms providing goods and services in a wide variety of industries. Our interviews covered organization for brand protection, measurement of counterfeiting and its effects, practices the organization uses for brand protection, success of brand-protection efforts and other issues related to brand-protection efforts. All these firms report a multifaceted approach to counterfeit risks. Most report multiple measures to assess prevalence and impact of counterfeit products. Programs claiming success attribute management support and adequate funding and understanding of counterfeiting problems. Respondents also agree that constant communication is a key determinant of success. Though having the shortcomings of any study with a limited sample, this work finds several common themes in brand-protection efforts, identifies several lessons for firms and identifies issues for further exploration.

Keywords

counterfeit risk brand organization trademark 

Notes

Acknowledgements

The authors would like to thank David Howard for his assistance in the collection of data for this project.

References

  1. Abbott, G. and Sporn, L. (2002) Trademark Counterfeiting. New York: Aspen Publisher.Google Scholar
  2. BASCAP (Business Action to Stop Counterfeiting and Piracy) (2011) Estimating the Global Economic and Social Impacts of Counterfeiting and Piracy. London: Frontier Economics.Google Scholar
  3. Beasley, M.S., Clune, R. and Hermanson, D.R. (2005) Enterprise risk management: An empirical analysis of factors associated with the extent of implementation. Journal of Accounting and Public Policy 24 (6): 521–531.CrossRefGoogle Scholar
  4. Brigham, T. and Linssen, S. (2010) Your brand reputational value is irreplaceable. Protect it! Forbes 1 February, http://www.forbes.com/2010/02/01/brand-reputation-value-leadership-managing-ethisphere.html, accessed 22 January 2016.
  5. Centre for Economics and Business Research (CEBR) (2002) Counting counterfeits: Defining a method to collect, analyse, and compare data on counterfeiting and piracy in the single market. London, UK: European commission directorate – Single market, http://ec.europa.eu/internal_market/indprop/docs/piracy/final-report-cebr_en.pdf, accessed 12 January 2015.
  6. Chaudhry, P. and Zimmerman, A. (2009) The Economics of Counterfeit Trade: Governments, Pirates and Intellectual Property Rights. Heidelberg, Germany: Springer-Verlag.Google Scholar
  7. Cordner, G.W. (1981) The effects of directed patrol: A natural quasi-experiment in pontiac. In: J. Fyfe (ed.) Contemporary Issues in Law Enforcement. Beverly Hills, CA: Sage.Google Scholar
  8. Counterfeiting Intelligence Bureau (1997) Countering Counterfeiting: A Guide to Protecting and Enforcing Intellectual Property Rights. London: Counterfeiting Intelligence Bureau, International Chamber of Commerce.Google Scholar
  9. Deloitte (2007) Supply Chain’s Last Straw: A Vicious Cycle of Risk. London, UK: Deloitte University Press.Google Scholar
  10. Deloitte (2014) Global survey on reputation risk, http://www2.deloitte.com/content/dam/Deloitte/pl/Documents/Reports/pl_Reputation_Risk_survey_EN.pdf, accessed 11 October 2015.
  11. Federal Bureau of Investigation (2005) Financial crimes report to the public 2005. Washington DC: U.S. federal bureau of investigation, https://www.fbi.gov/stats-services/publications/fcs_report2005, accessed 20 January 2016.
  12. Firth, G. (2006) IP protection best practice tips. The China Business Review 33 (1): 18–25.Google Scholar
  13. Fortune (2015) Fortune 500, http://fortune.com/fortune500/, accessed 4 December 2015.
  14. Heinonen, J., Spink, J. and Wilson, J.M. (2014) When crime events defy classification: The case of product counterfeiting as white-collar crime. Security Journal. doi:10.1057/sj.2014.18.Google Scholar
  15. Hoecht, A. and Trott, P. (2014) How should firms deal with counterfeiting? A review of the success conditions of anti-counterfeiting strategies. International Journal of Emerging Markets 9 (1): 98–119.CrossRefGoogle Scholar
  16. Government Accountability Office (GAO) (2010) Intellectual property: Observations on efforts to quantify the economic effects of counterfeit and pirated goods. Washington DC, http://www.gao.gov/products/GAO-10-423, accessed 23 May 2015.
  17. Green, R.T. and Smith, T. (2002) Executive insights: Countering brand counterfeiters. Journal of International Marketing 10 (4): 89–106.CrossRefGoogle Scholar
  18. International Anti-Counterfeiting Coalition (2005) The negative consequences of international intellectual property theft: Economic harm, threats to the public health and safety, and links to organized crime and terrorist organizations, http://cdm16064.contentdm.oclc.org/cdm/ref/collection/p266901coll4/id/3379, accessed 23 May 2015.
  19. International Organization for Standardization (2012) Performance criteria for authentication solutions used to combat counterfeiting of material goods, ISO 12931:2012 http://www.iso.org/iso/catalogue_detail?csnumber=52210.
  20. IMA (2014) Unrecognized intangible assets: Identification, management, and reporting, http://www.imanet.org/docs/default-source/thought_leadership/management_control_systems/unrecognized_intangible_assets.pdf?sfvrsn=2, accessed 10 October 2015.
  21. Kavilanz, P.B. (2007) Lax oversight, globalization erode product safety. CNN money. 14 June, http://money.cnn.com/2007/06/14/news/economy/supplychain_risk, accessed 10 October 2015.
  22. Kirk, C.P., Ray, I. and Wilson, B. (2013) The impact of brand value on firm valuation: The moderating influence of firm type. Journal of Brand Management 20 (6): 488–500.CrossRefGoogle Scholar
  23. Kotler, P. and Pfoertsch, W. (2006) B2B Brand Management. Berlin, Germany: Springer Science & Business Media.Google Scholar
  24. Liu, K., Li, J.A., Wu, Y. and Lai, K.K. (2005) Analysis of monitoring and limiting of commercial cheating: A newsvendor model. Journal of the Operational Research Society 56 (7): 844–854.CrossRefGoogle Scholar
  25. McGarrell, E.F., Chermak, S., Weiss, A. and Wilson, J.M. (2001) Reducing firearms violence through directed police patrol. Criminology and Public Policy 1 (1): 119–148.CrossRefGoogle Scholar
  26. Murray, B. (2004) Defending the Brand: Aggressive Strategies for Protecting Your Brand in the Online Arena. New York: American Management Association.Google Scholar
  27. National Defense Authorization Act (2012) Public Law 112-81, https://www.treasury.gov/resource-center/sanctions/Programs/Documents/ndaa_publaw.pdf.
  28. National Organisation for Economic Cooperation and Development (2008) The Economic Impact of Counterfeiting and Piracy. Paris: OECD, http://www.oecd.org/sti/ind/theeconomicimpactofcounterfeitingandpiracy.htm, accessed 20 January 2016.
  29. Post, R.S. and Post, P.N. (2007) Global Brand Integrity Management. New York: McGraw Hill Professional.Google Scholar
  30. Reynolds, D. (2011) Manipulating perceived risk to deter and disrupt counterfeiters. Journal of Financial Crime 18 (1): 105–118.CrossRefGoogle Scholar
  31. Salinas, G. and Ambler, T. (2009) A taxonomy of brand valuation practice: Methodologies and purposes. Journal of Brand Management 17 (1): 39–61.CrossRefGoogle Scholar
  32. Sampson, R.J. and Cohen, J. (1988) Deterrent effects of the police on crime: A replication and theoretical extension. Law and Society Review 22 (1): 163–189.CrossRefGoogle Scholar
  33. Sherman, L.W., Gottfredson, D., MacKenzie, D., Eck, J., Reuter, P. and Bushway, S. (1997) Preventing Crime: What Works, What Doesn’t, What’s Promising. Washington DC: Office of Justice Programs.Google Scholar
  34. Sherman, L.W. and Rogan, D.P. (1995) The effects of gun seizures on gun violence: ‘Hot spots’ patrol in Kansas city. Justice Quarterly 12 (4): 673–693.CrossRefGoogle Scholar
  35. Shultz, C.J. and Saporito, B. (1996) Protecting intellectual property: Strategies and recommendations to deter counterfeiting and brand piracy in global markets. The Columbia Journal of World Business 31 (1): 18–28.CrossRefGoogle Scholar
  36. Sonmez, M. and Yang, D. (2005) Manchester United versus China: A counterfeiting and trademark match. Managing Leisure 10 (1): 1–18.CrossRefGoogle Scholar
  37. Spink, J. and Fejes, Z.L. (2012) A review of the economic impact of counterfeiting and piracy methodologies and assessment of currently utilized estimates. International Journal of Comparative and Applied Criminal Justice 36 (4): 249–271.CrossRefGoogle Scholar
  38. Stevenson, M. and Busby, J. (2015) An exploratory analysis of counterfeiting strategies: Towards counterfeit-resilient supply chains. International Journal of Operations & Production Management 35 (1): 110–144.CrossRefGoogle Scholar
  39. Stumpf, S.A., Chaudhry, P.E. and Perretta, L. (2011) Fake: Can business stanch the flow of counterfeit products? Journal of Business Strategy 32 (2): 4–12.CrossRefGoogle Scholar
  40. Sullivan, B., Chermak, S., Wilson, J.M. and Freilich, J.D. (2014) The nexus between terrorism and product counterfeiting in the United States. Global Crime 15 (3-4): 357–378.CrossRefGoogle Scholar
  41. Trott, P. and Hoecht, A. (2007) Product counterfeiting, non-consensual acquisition of technology and new product development: An innovation perspective. European Journal of Innovation Management 10 (1): 126–143.CrossRefGoogle Scholar
  42. Underwriters Laboratories, Inc. (2011) Mitigating the risk of counterfeit products, http://library.ul.com/?document=mitigating-the-risk-of-counterfeit-products, accessed 11 October 2015.
  43. U.S. Customs and Border Protection (2002) US Customs Announces International Counterfeit Case Involving Caterpillar Heavy Equipment. Washington DC: U.S. Department of Homeland Security.Google Scholar
  44. Wald, J. and Holleran, J. (2007) Counterfeit products and faulty supply chain. Risk Management 54 (4): 58–62.Google Scholar
  45. Waring, A. (2013) Corporate Risk and Governance: An End to Mismanagement, Tunnel Vision and Quackery. Burlington, VT: Gower.Google Scholar
  46. Wilson, J.M. and Kinghorn, R. (2014a) Brand Protection as a Total Business Solution. Center for Anti-Counterfeiting and Product Protection Paper Series. Lansing, MI: Michigan State University.Google Scholar
  47. Wilson, J.M. and Kinhorn, R. (2014b) Training for brand protection: What your team needs to know. Global Edge Business Review. Michigan State University 8 (5).Google Scholar
  48. Wilson, J. M. (2015) Brand Protection 2020: Perspectives on the Issues Shaping the Global Risk and Response to Product Counterfeiting. Center for Anti-Counterfeiting and Product Protection Paper Series. Lansing, MI: Michigan State University.Google Scholar
  49. Wilson, J.M. and Kinghorn, R. (2015) The Global Risk of Product Counterfeiting: Facilitators of the Criminal Opportunity. Center for Anti-Counterfeiting and Product Protection Backgrounder Series. Lansing, MI: Michigan State University.Google Scholar
  50. Wilson, J.M. and Kinghorn, R. (2016) A total business approach to the global risk of product counterfeiting. Global Edge Business Review 10 (1): 1–6.Google Scholar
  51. Wilson, J.Q. and Boland, B. (1978) The effect of the police on crime. Law and Society Review 12 (3): 367–390.CrossRefGoogle Scholar
  52. World Economic Forum (2003) Corporate brand reputation outranks financial performance as most important measure of success, http://web.worldbank.org/archive/website00818/WEB/OTHER/CORPORAT.HTM, accessed 10 October 2015.
  53. Yang, D., Sonmez, M. and Bosworth, D. (2004) Intellectual property abuses: How should multinationals respond? Long Range Planning 37 (5): 459–475.CrossRefGoogle Scholar

Copyright information

© Palgrave Macmillan, a division of Macmillan Publishers Ltd 2016

Authors and Affiliations

  1. 1.Center for Anti-Counterfeiting and Product Protection, School of Criminal Justice, Michigan State UniversityEast LansingUSA

Personalised recommendations