• Title/Summary/Keyword: Counterfeiting

Search Result 55, Processing Time 0.029 seconds

Analysis of Actual Condition of Counterfeits and Anti-Counterfeiting Strategies of Korean Fashion Firms (국내 패션기업의 위조상품 관리실태 및 대응전략분석)

  • 김용주
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.1
    • /
    • pp.53-67
    • /
    • 2004
  • The purpose of this study was to analyze anti-counterfeiting strategies of fashion firms in Korea. Data was collected by in-depth interviews for 25 fashion firms and 5 buying offices who had been victims of counterfeiting. The result showed that fashion firms recognized the counterfeiting, especially deceptive counterfeiting, as a serious problem in Korea and seek for stronger protection. Fashion firms adopted diverse strategies for the protection of trademark and for the protection of design; (1) Investigation and Surveillance, (2) Warning, (3) Prosecution, (4) Lawsuit, (5) Consumer education (6) High-tech tabooing, (7) Provide incentives, (8) Penalty, (9) Do nothing. Despite the diverse efforts, they proposed the most desirable strategies to deter the counterfeiting as the changes of consumer attitude and stronger legal protection.

Anti-Counterfeiting Mechanism Based on RFID Tag Ownership Transfer Protocol (RFID 태그의 소유권 이전 프로토콜을 기반으로 한 위조 방지 메카니즘)

  • Lee, Jae-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.6
    • /
    • pp.710-722
    • /
    • 2015
  • Counterfeit products have been a major concern in global market. With the emergence of RFID systems, to detect counterfeit products in supply chain is relatively easy. Many anti-counterfeiting techniques for products attached by RFID tag are proposed. Most of the previous anti-counterfeiting techniques are not considering the distribution of the counterfeit from a customer to a customer. Using the ownership transfer protocols we can prevent the counterfeit from being distributed on the supply chain as well as between the customers and the customers. The ownership transfer protocols must be modified for anti-counterfeiting because of the usage of the protocol. In this paper, we modify the ownership transfer protocol proposed by G. Kapoor and S. Piramuthu[1] to be able to detect the counterfeit and track and trace the products in the supply chain. Our proposed protocol consists of three phases: the products delivery phase, the products takeover phase, and the products sale phase. We show that our protocol is anti-counterfeiting as well as secure against the security attacks.

Korean Firms' Intellectual Property Rights Protection Strategies to Deter Counterfeiting and Brand Piracy in Global Markets (한국기업의 해외시장에서의 위조상품 대응전략에 관한 연구)

  • Seo, Min-Kyo
    • International Commerce and Information Review
    • /
    • v.9 no.4
    • /
    • pp.351-374
    • /
    • 2007
  • Recently, there has been rapid and spectacular increase in world wide counterfeiting and other forms of piracy. According to the World Customs Organization(WCO), counterfeiting accounts for 5 to 7 percent of global merchandise trade, equivalent to lost sales of as much as US$512 billion last year. Also Korean firms' damages arising from the infringement of intellectual property rights in global markets, especially in China market, are increasing. However, the existing studies on the intellectual property rights(IRP) protection have mainly focused on legal protection. Because the law is often not the best defense against theft of intellectual property rights, we must develop more effective defensive weapons for protection of IRP. Given this troublesome trend, the intention of this paper is to discuss strategic and tactical efforts, including legal protection, that can serve as proactive measures to deter counterfeiting and thus to assure the protection of Korean firms' intellectual property rights.

  • PDF

Antecedents of attitudes toward counterfeit luxury fashion goods (패션명품 복제품 태도에 대한 선행변수)

  • Park, Hye-Jung
    • The Research Journal of the Costume Culture
    • /
    • v.23 no.2
    • /
    • pp.310-325
    • /
    • 2015
  • The market for counterfeit luxury fashion goods is proliferating across the globe. In an effort to provide some insight into this phenomenon, this study aimed to identify the antecedents of attitudes toward counterfeits of luxury fashion goods. As antecedents, counterfeit proneness and attitudes toward counterfeiting were considered. It was hypothesized that counterfeit proneness not only influences attitudes toward counterfeits of luxury fashion goods directly but also indirectly through attitudes toward counterfeiting. Data were gathered by surveying university students in Seoul, using convenience sampling. Three hundred five questionnaires were used in the statistical analysis. SPSS was used for exploratory factor analysis, and AMOS was used for confirmatory factor analysis and path analysis. The results showed that all the fit statistics for the variable measures were quite acceptable. In addition, the overall fits of the hypothesized model suggest that the model fits the data well. Factor analysis revealed that counterfeit proneness and attitudes toward counterfeits of luxury fashion goods were uni-dimensional and that attitudes toward counterfeiting were two dimensional, which are 'normatively less susceptible' and 'value conscious'. Test of the hypothesized path showed that counterfeit proneness influences attitudes toward counterfeits of luxury fashion goods indirectly through the two factors of attitudes toward counterfeiting. The results suggest some implications for anti-counterfeit businesses.

Plagiarism dispute Cases of Fashion Design and Undergraduate Students' Perceptions Regarding Plagiarism of Fashion Design (패션디자인의 표절 분쟁 사례와 대학생들의 패션디자인 표절에 대한 인식)

  • Kim, Jang-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.480-489
    • /
    • 2020
  • Controversy and legal disputes over counterfeit fashion designs have recently arisen in the fashion industry. The purpose of this study is to examine cases of counterfeiting disputes over fashion designs, and how the perception of counterfeit fashion designs is fostered from the learner's point of view, suggesting implications for the counterfeiting problem. As a result of this study, first, counterfeiting disputes over fashion design started from a lack of utilization of the Design Protection Act and the ambiguity in counterfeit design criteria. Second, the negative perceptions of counterfeit designs were mainly about unethical behavior, inhibiting the growth of the fashion industry, and reducing consumers' willingness to buy the genuine article. Positive perceptions were mainly about the process of creation, the promotion of a developmental environment for the fashion industry, and the expansion of opportunities to promote new designs. The most common perception was the absence of clear criteria for judgments about counterfeiting. Third, the implications of the counterfeiting problem in fashion design require effective institutional improvement in the fashion industry, the establishment of standards to deal with counterfeiting, the development and practical introduction of education proposals regarding intellectual property rights, and changing the perception of counterfeiting in the fashion industry.

A Study on Integrated Anti-counterfeiting Strategy to stop the forgery for Korean cosmetics in China (중국에서 한국 화장품의 위조근절을 위한 통합적 위조방지 전략 연구)

  • Koh, Joong Hyun
    • International Commerce and Information Review
    • /
    • v.18 no.4
    • /
    • pp.81-112
    • /
    • 2016
  • About 60 percent of cosmetic products sold in the dominant Taobao internet shopping mall proved recently to be counterfeit products made in China. This paper is to investigate the anti-counterfeiting strategies to clean up fake goods for Korean cosmetics which have been exported to China. Using the scienter rule the paper classified the forgery action for Korean cosmetics into four broad groups - counterfeit, piracy, illegally distributed product, and brand prior register. This paper suggested interior company's anti-counterfeiting strategies for each group, focusing on the construction for an integrated anti-counterfeiting system including consumer's rationality through the government cooperation between Korea and China.

  • PDF

U.S. Consumers' Motivations for Purchasing and Not Purchasing Fashion Counterfeit Goods

  • Kim, Hye-Jeong;Latour, Brittany N.
    • International Journal of Costume and Fashion
    • /
    • v.12 no.1
    • /
    • pp.11-27
    • /
    • 2012
  • This study explores U.S. consumers' perceptions about fashion counterfeit goods and counter feiting and motivations for purchasing and not purchasing those goods. A qualitative research technique utilizing self-administered essay questions was used to collect data. A convenience sample of female college students(N=128) drawn from classes at Midwestern and Southern universities in the U.S. participated in this study. This study found that a majority of consumers tended to perceive that fashion counterfeit goods are merely imitations of the legitimate goods and that counterfeiting is producing and selling fake goods, but a small number of consumers associated those goods with illegally produced goods and illegal practices or violations of intellectual property rights. The major motivations for purchasing counterfeit fashion goods were found to be price/value consciousness, appearance of counterfeit goods, status consumption, availability of the goods, desire for souvenirs, and social(family and peer) influences. In addition, the major deterrents to purchasing these goods were identified as integrity/ethical judgment, poor quality of counterfeit goods, self-image/status, and unavailability of the goods. This study provides policy makers and anti-counterfeit coalitions with information to develop effective educational programs or campaigns to influence consumers' counterfeit fashion purchasing behavior.

A Study on the Next Generation Identification System of Mobile-Based using Anonymous Authentication Scheme (익명 인증기법을 이용한 모바일 기반 차세대 본인확인수단에 관한 연구)

  • Park, Jeong Hyo;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.511-516
    • /
    • 2013
  • The cases of identification forgery and counterfeiting are increasing under the current identification system, which was established based on social conditions and administrative environments over 20 years ago. This leads to an increase of various criminal acts including illegal loan using fake ID and a number of damages caused out of good intentions that result in interference with the operations of public organizations. In addition, according to the advancement of information society, privacy protection has emerged as an important issue. However, ID card exposes individuals' personal information, such as names, resident registration numbers, photos, addresses and fingerprints, and thus the incidents associated with illegal use of personal information are increasing continuously. Accordingly, this study aimed at examining the issues of ID card forgery/counterfeiting and privacy protection and at proposing a next-generation identification system to supplement such weaknesses. The top priority has been set as prevention of forgery/counterfeiting and privacy protection in order to ensure the most important function of national identification system, which is user identification.

Phase-based virtual image encryption and decryption system using Joint Transform Correlator

  • Seo, Dong-Hoan;Cho, Kyu-Bo;Park, Se-Joon;Cho, Woong-Ho;Noh, Duck-Soo;Kim, Soo-Joong
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.450-453
    • /
    • 2002
  • In this paper a Phase-based virtual image encryption and decryption techniques based on a joint transform correlator (JTC) are proposed. In this method, an encrypted image is obtained by multiplying a phase-encoded virtual image that contains no information from the decrypted image with a random phase. Even if this encryption process converts a virtual image into a white-noise-like image, the unauthorized users can permit a counterfeiting of the encrypted image by analyzing the random phase mask using some phase-contrast technique. However, they cannot reconstruct the required image because the virtual image protects the original image from counterfeiting and unauthorized access. The proposed encryption technique does not suffer from strong auto-correlation terms appearing in the output plane. In addition, the reconstructed data can be directly transmitted to a digital system for real-time processing. Based on computer simulations, the proposed encryption technique and decoding system were demonstrated as adequate for optical security applications.

  • PDF