{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:54:02Z","timestamp":1754157242917,"version":"3.41.2"},"reference-count":43,"publisher":"Emerald","issue":"7","license":[{"start":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T00:00:00Z","timestamp":1282608000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,8,24]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to focus on the design of a counterfeit network analyzer (CNA) for aggregating all the problematic product flows in order to discover any counterfeit distribution source, and to control the spread of counterfeit goods. The analyzer leverages radio frequency identification (RFID) information stored within the electronic product code (EPC) network.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The system architecture of the proposed CNA is first discussed. A case study of the system application in a Hong Kong pharmaceutical manufacturing company then presents the adoption process and the challenges encountered in such technologies.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Compared with traditional approaches, the results show that the proposed RFID solution is reliable and is capable of discovering counterfeit distributions, as well as reducing the detection costs by means of higher product movement visibility within the supply chain.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>A prototype system has been constructed and trial implemented in a pharmaceutical manufacturing company. It proved to be of benefit to the manufacturer who is able to deter product counterfeiting effectively and visualize real\u2010time supply chain data automatically.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>The proposed CNA is designed to overcome issues of information invisibility, which is considered a huge cost lost in the identification of counterfeit products, loss of sales and reputation associated with the counterfeiting, and ineffective product authentication in the manufacturing industry. This paper contributes to the RFID research in the counterfeiting area by studying the feasibility and practicality of shifting the focus of product identification from the traditional package redesign solutions to the visualization of the movement of the product (i.e. product supply chain) via the use of RFID and EPC. Furthermore, a pharmaceutical manufacturing site provided a case study for discussing the advantages, critical issues for implementation of the RFID system, and lessons learned.<\/jats:p><\/jats:sec>","DOI":"10.1108\/02635571011069086","type":"journal-article","created":{"date-parts":[[2010,8,28]],"date-time":"2010-08-28T07:15:47Z","timestamp":1282979747000},"page":"1018-1037","source":"Crossref","is-referenced-by-count":31,"title":["A counterfeit network analyzer based on RFID and EPC"],"prefix":"10.1108","volume":"110","author":[{"given":"S.K.","family":"Kwok","sequence":"first","affiliation":[]},{"given":"S.L.","family":"Ting","sequence":"additional","affiliation":[]},{"given":"Albert H.C.","family":"Tsang","sequence":"additional","affiliation":[]},{"given":"C.F.","family":"Cheung","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022030720202686300_b1","doi-asserted-by":"crossref","unstructured":"Bastia, S. (2002), \u201cNext generation technologies to combat counterfeiting of electronic components\u201d, IEEE Transactions on Components and Packaging Technologies, Vol. 25 No. 1, pp. 175\u20106.","DOI":"10.1109\/6144.991192"},{"key":"key2022030720202686300_b2","unstructured":"Baudin, M. and Rao, A. (2005), \u201cRFID applications in manufacturing\u201d, available at: www.mmt\u2010inst.com (accessed February 15, 2010)."},{"key":"key2022030720202686300_b3","doi-asserted-by":"crossref","unstructured":"Berman, B. (2008), \u201cStrategies to detect and reduce counterfeiting activity\u201d, Business Horizons, Vol. 51 No. 3, pp. 191\u20109.","DOI":"10.1016\/j.bushor.2008.01.002"},{"key":"key2022030720202686300_b4","unstructured":"Bhatt, H. and Glover, B. (2006), RFID Essentials, O'Reilly, Sebastopol, CA."},{"key":"key2022030720202686300_b5","unstructured":"Choi, S.H. and Poon, C.H. (2008), \u201cAn RFID\u2010based anti\u2010counterfeiting system\u201d, IAENG International Journal of Computer Science, Vol. 35 No. 1, pp. 1\u201012."},{"key":"key2022030720202686300_b6","unstructured":"Clara, S. (2004), \u201cPharmaceutical anti\u2010counterfeit RFID package supports FDA mandate\u201d, available at: http:\/\/xml.coverpages.org\/SunRFID\u2010FDA.html (accessed April 1, 2009)."},{"key":"key2022030720202686300_b7","unstructured":"(The) Economist (2003), \u201cImitating property is theft\u201d, available at: www.economist.com\/displaystory.cfm?story_id=1780818 (accessed December 5, 2009)."},{"key":"key2022030720202686300_b9","unstructured":"EPCglobal (2006a), EPCglobal Tag Data Standards, Version 1.3, EPCglobal, Denver, CO."},{"key":"key2022030720202686300_b8","unstructured":"EPCglobal (2006b), \u201cRFID implementation cookbook\u201d, available at: www.epcglobalinc.org\/what\/cookbook (accessed March 15, 2009)."},{"key":"key2022030720202686300_b10","unstructured":"EPCglobal (2007), Drug Pedigree Stanadard Version 1.0, EPCglobal, Denver, CO."},{"key":"key2022030720202686300_b11","unstructured":"GBI Research (2010), Radio Frequency Identification (RFID) in Pharmaceuticals \u2013 Supply Chain Security Concerns Provide Impetus for RFID Adoption, GBI Research, London."},{"key":"key2022030720202686300_b12","unstructured":"Harrison, A. (1992), Just\u2010in\u2010Time Manufacturing Perspective, Prentice\u2010Hall, London."},{"key":"key2022030720202686300_b13","doi-asserted-by":"crossref","unstructured":"He, W., Zhang, N., Tan, P.S., Lee, E.W., Li, T.Y. and Lim, T.L. (2008), \u201cA secure RFID\u2010based track and trace solution in supply chains\u201d, Proceedings of the IEEE Interntional Conference on Industrial Informatics, Daejeon, Korea, July 13\u201016, pp. 1364\u20109.","DOI":"10.1109\/INDIN.2008.4618316"},{"key":"key2022030720202686300_b15","unstructured":"Hopkins, D., Kontnik, L.T. and Turnage, M.T. (2003), Counterfeiting Exposed: Protecting Your Brand and Customers, Wiley, Hoboken, NJ."},{"key":"key2022030720202686300_b14","doi-asserted-by":"crossref","unstructured":"Hou, J.L. and Huang, C.H. (2006), \u201cQuantitative performance evaluation of RFID applications in the supply chain of the printing industry\u201d, Industrial Management & Data Systems, Vol. 106 No. 1, pp. 96\u2010120.","DOI":"10.1108\/02635570610641013"},{"key":"key2022030720202686300_b16","doi-asserted-by":"crossref","unstructured":"Huang, G.Q., Zhang, Y.F. and Jiang, P.Y. (2007), \u201cRFID\u2010based wireless manufacturing for real\u2010time management of job shop WIP inventories\u201d, The International Journal of Advanced Manufacturing Technology, Vol. 36 Nos 8\/7, pp. 752\u201064.","DOI":"10.1007\/s00170-006-0897-4"},{"key":"key2022030720202686300_b17","unstructured":"ICC Counterfeiting Intelligence Bureau (2005), ICCHandbook, ICC Commercial Crime Services, London."},{"key":"key2022030720202686300_b18","doi-asserted-by":"crossref","unstructured":"Jones, P., Clarke\u2010Hill, C., Hillier, D. and Comfort, D. (2005), \u201cThe benefits, challenges and impacts of radio frequency identification technology (RFID) for retailers in the UK\u201d, Marketing Intelligence & Planning, Vol. 23 No. 4, pp. 395\u2010402.","DOI":"10.1108\/02634500510603492"},{"key":"key2022030720202686300_b19","doi-asserted-by":"crossref","unstructured":"Kelly, E.P. and Erickson, G.S. (2005), \u201cRFID tags: commercial applications v. privacy rights\u201d, Industrial Management & Data Systems, Vol. 105 No. 6, pp. 703\u201013.","DOI":"10.1108\/02635570510606950"},{"key":"key2022030720202686300_b20","unstructured":"Kim, J., Choi, D., Kim, I. and Kim, H. (2006), \u201cProduct authentication service of consumer's mobile RFID device\u201d, Proceedings of the 2006 IEEE Tenth International Symposium on Consumer Electronics (ISCE 2006), St Petersburg, pp. 1\u20106."},{"key":"key2022030720202686300_b26","doi-asserted-by":"crossref","unstructured":"Kitsos, P. and Zhang, Y. (Eds) (2008), \u201cRFID anticounterfeiting: an architectural perspective\u201d, RFID Security: Techniques, Protocols, and System\u2010on\u2010Chip Design, Springer, New York, NY, pp. 131\u201046.","DOI":"10.1007\/978-0-387-76481-8_6"},{"key":"key2022030720202686300_b21","unstructured":"Kwok, S.K., Tsang, A.H.C. and Cheung, B.C.F. (2007), Realizing the Potential of RFID in Counterfeit Prevention, Physical Asset Management, and Business Applications: Case Studies of Early Adopters, Department of Industrial and Systems Engineering, The Hong Kong Polytechnic University, Hong Kong."},{"key":"key2022030720202686300_b22","doi-asserted-by":"crossref","unstructured":"Kwok, S.K., Tsang, A.H.C., Ting, J.S.L., Lee, W.B. and Cheung, B.C.F. (2008), \u201cAn intelligent RFID\u2010based electronic anti\u2010counterfeit system (InRECS) for the manufacturing industry\u201d, Proceedings of the 17th World Congress, The International Federation of Automatic Control, Seoul, Korea, July 6\u201011, pp. 5482\u20107.","DOI":"10.3182\/20080706-5-KR-1001.00924"},{"key":"key2022030720202686300_b23","unstructured":"Lahiri, S. (2006), RFID Sourcebook, Pearson plc, Upper Saddle River, NJ."},{"key":"key2022030720202686300_b24","doi-asserted-by":"crossref","unstructured":"Lee, D. and Park, J. (2008), \u201cRFID\u2010based traceability in the supply chain\u201d, Industrial Management & Data Systems, Vol. 108 No. 6, pp. 713\u201025.","DOI":"10.1108\/02635570810883978"},{"key":"key2022030720202686300_b25","unstructured":"Lei, P., Claret\u2010Tournier, F., Chatwin, C. and Young, R. (2005), \u201cA secure mobile track and trace system for anti\u2010counterfeiting\u201d, paper presented at the 2005 IEEE International Conference on e\u2010Technology, e\u2010Commerce and e\u2010Service, Hong Kong, March 29\u2010April 1 , pp. 686\u20109."},{"key":"key2022030720202686300_b27","doi-asserted-by":"crossref","unstructured":"Li, S., Visich, J.K., Khumawala, B.M. and Zhang, C. (2006), \u201cRadio frequency identification technology: applications, technical challenges and strategies\u201d, Sensor Review, Vol. 26 No. 3, pp. 193\u2010202.","DOI":"10.1108\/02602280610675474"},{"key":"key2022030720202686300_b28","doi-asserted-by":"crossref","unstructured":"Lu, B.H., Bateman, R.J. and Cheng, K. (2006), \u201cRFID enabled manufacturing: fundamentals, methodology and applications\u201d, International Journal of Agile Systems and Management, Vol. 1 No. 1, pp. 73\u201092.","DOI":"10.1504\/IJASM.2006.008860"},{"key":"key2022030720202686300_b29","doi-asserted-by":"crossref","unstructured":"Mollin, R.A. (2003), RSA and Public\u2010key Cryptography, Chapman & Hall\/C, Boca Raton, FL.","DOI":"10.1201\/9781420035247"},{"key":"key2022030720202686300_b30","doi-asserted-by":"crossref","unstructured":"Newman, M.E.J. (2004), \u201cDetecting community structure in networks\u201d, The European Physical Journal B, Vol. 38 No. 2, pp. 321\u201030.","DOI":"10.1140\/epjb\/e2004-00124-y"},{"key":"key2022030720202686300_b31","doi-asserted-by":"crossref","unstructured":"Ngai, E.W.T., Suk, F.F.C. and Lo, S.Y.Y. (2008), \u201cDevelopment of an RFID\u2010based Sushi management system: the case of a conveyor\u2010belt Sushi restaurant\u201d, International Journal of Production Economics, Vol. 112 No. 2, pp. 630\u201045.","DOI":"10.1016\/j.ijpe.2007.05.011"},{"key":"key2022030720202686300_b32","doi-asserted-by":"crossref","unstructured":"Pawlak, M. and Malyszek, E. (2008), \u201cA local collaboration as the most successful co\u2010ordination scenario in the supply chain\u201d, Industrial Management & Data Systems, Vol. 108 No. 1, pp. 22\u201042.","DOI":"10.1108\/02635570810844061"},{"key":"key2022030720202686300_b33","unstructured":"Rochester Electronics (2007), Defending Against Counterfeit Electronic Parts and Gray Market Practices, Rochester Electronics, Newburyport, MA."},{"key":"key2022030720202686300_b34","doi-asserted-by":"crossref","unstructured":"Shih, D.H., Sun, P.L. and Lin, B. (2005), \u201cSecuring industry\u2010wide EPCglobal network with WS\u2010security\u201d, Industrial Management & Data Systems, Vol. 105 No. 7, pp. 972\u201096.","DOI":"10.1108\/02635570510616148"},{"key":"key2022030720202686300_b35","doi-asserted-by":"crossref","unstructured":"Thiesse, F. and Condea, C. (2009), \u201cRFID data sharing in supply chains: what is the value of the EPC network?\u201d, International Journal of Electronic Business, Vol. 7 No. 1, pp. 21\u201043.","DOI":"10.1504\/IJEB.2009.023607"},{"key":"key2022030720202686300_b36","doi-asserted-by":"crossref","unstructured":"Thompson, C.A. (2004), \u201cRadio frequency tags for identifying legitimate drug products discussed by tech industry\u201d, American Journal of Health\u2010System Pharmacy, Vol. 16 No. 14, pp. 1430\u20101.","DOI":"10.1093\/ajhp\/61.14.1430"},{"key":"key2022030720202686300_b37","doi-asserted-by":"crossref","unstructured":"Visich, J.K., Powers, J.T. and Roethlein, C.J. (2009), \u201cEmpirical applications of RFID in the manufacturing environment\u201d, International Journal of Radio Frequency Identification Technology and Applications, Vol. 2 Nos 3\/4, pp. 115\u201032.","DOI":"10.1504\/IJRFITA.2009.025148"},{"key":"key2022030720202686300_b38","doi-asserted-by":"crossref","unstructured":"Wamba, S.F. and Chatfield, A.T. (2009), \u201cA contingency model for creating value from RFID supply chain network projects in logistics and manufacturing environments\u201d, European Journal of Information Systems, Vol. 18 No. 6, pp. 615\u201036.","DOI":"10.1057\/ejis.2009.44"},{"key":"key2022030720202686300_b39","doi-asserted-by":"crossref","unstructured":"Wang, S.J., Wang, W.L. and Liu, S.F. (2009), \u201cThe configuration of a multi\u2010agent\u2010based inventory replenishment simulation system for RFID\u2010enabled TFT\u2010LCD supply chain\u201d, International Journal of Radio Frequency Identification Technology and Applications, Vol. 2 Nos 3\/4, pp. 195\u2010215.","DOI":"10.1504\/IJRFITA.2009.025152"},{"key":"key2022030720202686300_b40","unstructured":"Wang, S.W., Chen, W.H., Ong, C.S., Liu, L. and Chuang, Y.W. (2006), \u201cRFID application in hospitals: a case study on a demonstration RFID project in a Taiwan hospital\u201d, Proceedings of the 39th Annual Hawaii International Conference on System Sciences 2006, January 4\u20107, p. 184."},{"key":"key2022030720202686300_b41","doi-asserted-by":"crossref","unstructured":"Wu, N.C., Nystrom, M.A., Lin, T.R. and Yu, H.C. (2006), \u201cChallenges to global RFID adoption\u201d, Technovation, Vol. 26 No. 12, pp. 1317\u201023.","DOI":"10.1016\/j.technovation.2005.08.012"},{"key":"key2022030720202686300_b42","doi-asserted-by":"crossref","unstructured":"Wyld, D.C. and Jones, M.A. (2007), \u201cRFID is no fake: the adoption of radio frequency identification technology in the pharmaceutical supply chain\u201d, International Journal of Integrated Supply Management, Vol. 3 No. 2, pp. 156\u201071.","DOI":"10.1504\/IJISM.2007.011974"},{"key":"key2022030720202686300_b43","unstructured":"Zurich, E.T.H. (2007), Problem\u2010analysis Report on Counterfeiting and Illicit Trade, SAP Research, Brisbane."}],"container-title":["Industrial Management &amp; Data Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02635571011069086","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571011069086\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02635571011069086\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:38:24Z","timestamp":1753400304000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/imds\/article\/110\/7\/1018-1037\/176759"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,24]]},"references-count":43,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2010,8,24]]}},"alternative-id":["10.1108\/02635571011069086"],"URL":"https:\/\/doi.org\/10.1108\/02635571011069086","relation":{},"ISSN":["0263-5577"],"issn-type":[{"type":"print","value":"0263-5577"}],"subject":[],"published":{"date-parts":[[2010,8,24]]}}}