{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T15:49:11Z","timestamp":1773244151126,"version":"3.50.1"},"reference-count":52,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T00:00:00Z","timestamp":1747353600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004493","name":"International Atomic Energy Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004493","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100021219","name":"Community Foundation of Southern Indiana","doi-asserted-by":"publisher","award":["CRP- J02019"],"award-info":[{"award-number":["CRP- J02019"]}],"id":[{"id":"10.13039\/100021219","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Critical Infrastructure Protection"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1016\/j.ijcip.2025.100767","type":"journal-article","created":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T11:11:46Z","timestamp":1747393906000},"page":"100767","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Securing the nuclear supply chain: Addressing the issue of counterfeiting"],"prefix":"10.1016","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1269-1641","authenticated-orcid":false,"given":"Christopher","family":"Hobbs","sequence":"first","affiliation":[]},{"given":"Zoha","family":"Naser","sequence":"additional","affiliation":[]},{"given":"Sarah","family":"Tzinieris","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ijcip.2025.100767_bib0001","series-title":"The Oxford Handbook of Nuclear Security","year":"2023"},{"key":"10.1016\/j.ijcip.2025.100767_bib0002","series-title":"CSSS Occasional Paper Series","article-title":"Securing the supply Chain: a handbook of case studies of the nuclear security implications of counterfeit, fraudulent, and suspect items","author":"Hobbs","year":"2024"},{"key":"10.1016\/j.ijcip.2025.100767_bib0003","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.ijpe.2018.09.010","article-title":"Brand imitation: a dynamic-game approach","volume":"205","author":"Crettez","year":"2018","journal-title":"Int. J. Prod. Econ."},{"issue":"1","key":"10.1016\/j.ijcip.2025.100767_bib0004","first-page":"93","article-title":"Flying underground: the trade in bootleg aircraft parts","volume":"62","author":"Luedeman","year":"1996","journal-title":"J. Air Law Commer."},{"key":"10.1016\/j.ijcip.2025.100767_bib0005","unstructured":"World Trade Organization (WTO), \u201cCounterfeit,\u201d glossary term. https:\/\/www.wto.org\/english\/thewto_e\/glossary_e\/counterfeit_e.htm, undated (accessed March 10, 2025)."},{"key":"10.1016\/j.ijcip.2025.100767_bib0009","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1186\/2193-7680-2-8","article-title":"Defining the types of counterfeiters, counterfeiting, and offender organizations","volume":"2","author":"Spink","year":"2013","journal-title":"Crime Sci."},{"key":"10.1016\/j.ijcip.2025.100767_bib0010","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1111\/ijcs.12696","article-title":"Willingness to purchase counterfeit luxury brands: a cross-cultural comparison","volume":"46","author":"Tun\u00e7el","year":"2021","journal-title":"Int. J. Consum. Stud."},{"issue":"2","key":"10.1016\/j.ijcip.2025.100767_bib0011","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1080\/16258312.2021.1908844","article-title":"Deceptive counterfeit risk in global supply chains","volume":"22","author":"Ghadge","year":"2021","journal-title":"Supply Chain Forum: Int. J."},{"issue":"6","key":"10.1016\/j.ijcip.2025.100767_bib0012","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1197\/jamia.M2143","article-title":"The security implications of VeriChip cloning","volume":"13","author":"Halamka","year":"2006","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"10.1016\/j.ijcip.2025.100767_bib0013","series-title":"Profiting from Proliferation? North Korea\u2019s Exports of Missile and Nuclear Technology","author":"Salisbury","year":"2023"},{"issue":"3","key":"10.1016\/j.ijcip.2025.100767_bib0014","first-page":"32","article-title":"Understanding the links between counterfeiting and terrorism","volume":"107","author":"Gomez","year":"2017","journal-title":"Rev. Int. Strat\u00e9g."},{"key":"10.1016\/j.ijcip.2025.100767_bib0015","series-title":"Enforcement and Socio-economic Factors","article-title":"Why do countries export fakes? The role of governance frameworks","year":"2018"},{"key":"10.1016\/j.ijcip.2025.100767_bib0018","series-title":"Counterfeit, Substandard Chips Are Penetrating the Supply Chain","year":"2021"},{"key":"10.1016\/j.ijcip.2025.100767_bib0019","series-title":"The Committee\u2019s Investigation into Counterfeit Electronic Parts in the Department of Defense Supply Chain, Hearing before the Committee on Armed Services, US Senate 112th Congress","year":"2011"},{"key":"10.1016\/j.ijcip.2025.100767_bib0020","series-title":"The Anti-Counterfeiting Trade Agreement (ACTA)","author":"Ward","year":"2012"},{"key":"10.1016\/j.ijcip.2025.100767_bib0021","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1023\/A:1008769816565","article-title":"False profits: why product counterfeiting is increasing","volume":"8","author":"Vagg","year":"2000","journal-title":"Eur. J. Crim. Pol. Res."},{"key":"10.1016\/j.ijcip.2025.100767_bib0022","unstructured":"US Sentencing Commission, Quick facts: counterfeiting offences. https:\/\/www.ussc.gov\/sites\/default\/files\/pdf\/research-and-publications\/quick-facts\/Counterfeiting_FY23.pdf, undated (accessed March 10, 2025)."},{"key":"10.1016\/j.ijcip.2025.100767_bib0023","article-title":"Detecting and removing counterfeit semiconductors in the U.S","year":"2018","journal-title":"Supply Chain"},{"key":"10.1016\/j.ijcip.2025.100767_bib0024","unstructured":"ERAI, E.R.A.I. Counterfeit parts Prevention Program, https:\/\/www.erai.com\/counterfeit_part_reporting_and_alerts, undated (accessed May 1, 2025)."},{"key":"10.1016\/j.ijcip.2025.100767_bib0025","series-title":"SMTA International Conference","article-title":"Methods used in the detection of counterfeit electronic components","author":"Hewett","year":"2010"},{"issue":"1","key":"10.1016\/j.ijcip.2025.100767_bib0026","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/TCAPT.2007.893682","article-title":"Avoiding counterfeit electronic components","volume":"30","author":"Livingston","year":"2007","journal-title":"IEEE Trans. Compon. Packag. Technol."},{"key":"10.1016\/j.ijcip.2025.100767_bib0027","series-title":"Report to the Chairman, Subcommittee on Oversight and Investigations, Committee on Energy and Commerce, House of Representatives","article-title":"Nuclear safety and health: counterfeit and substandard products are a governmentwide concern","year":"1990"},{"key":"10.1016\/j.ijcip.2025.100767_bib0028","series-title":"IAEA Nuclear Energy Series, No. NP-T-3.26","article-title":"Managing counterfeit and fraudulent items in the nuclear industry","year":"2019"},{"key":"10.1016\/j.ijcip.2025.100767_bib0030","series-title":"Commercial Grade Dedication Application Handbook","year":"2019"},{"key":"10.1016\/j.ijcip.2025.100767_bib0031","series-title":"Fraudulent and Suspect Items Guide Book","article-title":"Managing counterfeit","year":"2022"},{"key":"10.1016\/j.ijcip.2025.100767_bib0032","series-title":"Incident Report 8402: Laguna Verde-2, Mexico; Critical Failure of Emergency Diesel Division III","year":"2008"},{"key":"10.1016\/j.ijcip.2025.100767_bib0033","series-title":"Carnegie Endowment for International Peace","article-title":"Why Fukushima was preventable","author":"Acton","year":"2012"},{"key":"10.1016\/j.ijcip.2025.100767_bib0034","series-title":"South Korea shuts More Nuclear Reactors Over Fake Certificates","author":"Cho","year":"2013"},{"key":"10.1016\/j.ijcip.2025.100767_bib0035","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/jwelb\/jwaa010","article-title":"South Korea\u2019s nuclear power industry: recovering from scandal","volume":"13","author":"Andrews-Speed","year":"2020","journal-title":"J. World Energy Law Bus."},{"key":"10.1016\/j.ijcip.2025.100767_bib0037","author":"Hansard"},{"key":"10.1016\/j.ijcip.2025.100767_bib0038","series-title":"Break-in At Y-12","author":"Schlosser","year":"2015"},{"key":"10.1016\/j.ijcip.2025.100767_bib0039","unstructured":"Y-12 National Security Complex, Highly Enriched Uranium Materials Facility, US Department of Energy (DoE), n.d., https:\/\/www.y12.doe.gov\/about\/transforming-y-12\/highly-enriched-uranium-materials-facility (accessed May 8, 2025)."},{"key":"10.1016\/j.ijcip.2025.100767_bib0040","series-title":"Nuclear Security: Actions, Accountability and Reform, hearing before the Subcommittee on Strategic Forces of the Committee on Armed Services, 113th Congress, 1st Session","year":"2013"},{"key":"10.1016\/j.ijcip.2025.100767_bib0041","series-title":"Export Ban For Useless \u2018bomb detector","author":"Hawley","year":"2010"},{"key":"10.1016\/j.ijcip.2025.100767_bib0042","series-title":"The Bangkok Post","article-title":"GT200 scam tests regime\u2019s mettle","author":"Wong-Anan","year":"2016"},{"key":"10.1016\/j.ijcip.2025.100767_bib0044","series-title":"Executives Convicted of Selling Falsely Labeled Body Armor to U.S. Government","year":"2019"},{"key":"10.1016\/j.ijcip.2025.100767_bib0047","series-title":"Tech CEO Gets 6 Years For Selling Fake Cisco Gear On Amazon","author":"Kan","year":"2024"},{"key":"10.1016\/j.ijcip.2025.100767_bib0048","author":"Goldman"},{"key":"10.1016\/j.ijcip.2025.100767_bib0049","series-title":"Go deeper: Bloomberg\u2019s fraying \u201csecret chips\u201d Story","author":"Uchill","year":"2018"},{"key":"10.1016\/j.ijcip.2025.100767_bib0051","unstructured":"US Department of Defense, Nuclear Matters Handbook 2020, https:\/\/www.acq.osd.mil\/ncbdp\/nm\/NMHB2020rev."},{"key":"10.1016\/j.ijcip.2025.100767_bib0052","unstructured":"J.S. Walker, T.R. Wellock, A Short History of Nuclear Regulation, 1946-2009, US Nuclear Regulatory Commission, https:\/\/www.nrc.gov\/docs\/ml1029\/ml102980443.pdf."},{"key":"10.1016\/j.ijcip.2025.100767_bib0054","unstructured":"US Nuclear Regulatory Commission (NRC), Guidance Documents and Background Information For Counterfeit, Fraudulent, and Suspect Items (CFSIs). https:\/\/www.nrc.gov\/about-nrc\/cfsi\/guidance.html (accessed March 13, 2025)."},{"key":"10.1016\/j.ijcip.2025.100767_bib0055","series-title":"IAEA TECDOC Series, No. 1169","article-title":"Managing suspect and counterfeit items in the nuclear industry","year":"2000"},{"key":"10.1016\/j.ijcip.2025.100767_bib0057","series-title":"Operating Experience Report: Counterfeit, Suspect and Fraudulent Items","year":"2011"},{"key":"10.1016\/j.ijcip.2025.100767_bib0060","series-title":"6th Review Meeting of the Contracting Parties to the Convention on Nuclear Safety","year":"2014"},{"key":"10.1016\/j.ijcip.2025.100767_bib0061","series-title":"IAEA General Conference","article-title":"Measures to strengthen international cooperation in nuclear, radiation, transport and water safety","year":"2017"},{"key":"10.1016\/j.ijcip.2025.100767_bib0062","unstructured":"International Atomic Energy Agency (IAEA), Coordinated Research Project, Nuclear Security Implications of Counterfeit, Fraudulent, and Suspect Items (CFSIs). https:\/\/www.iaea.org\/projects\/crp\/j02019, undated (accessed March 13, 2025)."},{"key":"10.1016\/j.ijcip.2025.100767_bib0063","unstructured":"Nuclear Energy Agency, Working Group on Supply Chain (WGSUP). https:\/\/www.oecd-nea.org\/jcms\/pl_87531\/working-group-on-supply-chain-wgsup, undated (accessed March 13, 2025)."},{"key":"10.1016\/j.ijcip.2025.100767_bib0064","series-title":"Seventh National Report For the Convention on Nuclear Safety","year":"2016"},{"key":"10.1016\/j.ijcip.2025.100767_bib0066","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1080\/10736700.2020.1811532","article-title":"Exploring the human dimension of nuclear security: the history, theory, and practice of security culture","volume":"28","author":"Hobbs","year":"2021","journal-title":"Nonproliferation Rev."},{"key":"10.1016\/j.ijcip.2025.100767_bib0067","series-title":"IAEA Nuclear Security Series No. 7","article-title":"Nuclear Security culture: implementing Guide","year":"2008"},{"issue":"3","key":"10.1016\/j.ijcip.2025.100767_bib0068","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1093\/jssam\/smw014","article-title":"How accurately do different evaluation methods predict the reliability of survey questions?","volume":"4","author":"Maitland","year":"2016","journal-title":"Surv. Stat. Methodol."}],"container-title":["International Journal of Critical Infrastructure Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874548225000289?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874548225000289?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T23:50:24Z","timestamp":1762559424000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1874548225000289"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":52,"alternative-id":["S1874548225000289"],"URL":"https:\/\/doi.org\/10.1016\/j.ijcip.2025.100767","relation":{},"ISSN":["1874-5482"],"issn-type":[{"value":"1874-5482","type":"print"}],"subject":[],"published":{"date-parts":[[2025,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Securing the nuclear supply chain: Addressing the issue of counterfeiting","name":"articletitle","label":"Article Title"},{"value":"International Journal of Critical Infrastructure Protection","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ijcip.2025.100767","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"100767"}}