{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T17:13:58Z","timestamp":1713978838176},"reference-count":43,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4,1]]},"abstract":"<p>Product piracy poses an existential threat to many companies. Juristic property rights, which are currently dominantly discussed, do not suffice to combat this threat. The rise in cases of piracy and increasing professionalism of the counterfeiter, give ground for effective prevention methods. Based on gaps of existing approaches, the authors evaluate how knowledge modeling could design preventive measures. They develop a new approach which makes information and knowledge leaks transparent, analyzable, and controllable. The approach is based on interactions and transfers of information and knowledge between departments of a company with internal and external business partners. For this purpose, a modeling process for knowledge-intensive business interactions is used and modified. Choosing dynamic assessment questions establishes the level of risk of information and knowledge on piracy and prioritizes company specific measures. In addition, the procedure reappraises companies\u2019 existing modes of prevention. Based on this analysis, the method helps to develop and rank measures to hinder the theft of information by pirates. The approach fills the gap in known concepts of protection, which are used only after a case of piracy has taken place. The approach also adds a new perspective in knowledge management.<\/p>","DOI":"10.4018\/jiit.2012040102","type":"journal-article","created":{"date-parts":[[2012,5,16]],"date-time":"2012-05-16T13:58:12Z","timestamp":1337176692000},"page":"14-30","source":"Crossref","is-referenced-by-count":2,"title":["Managing Knowledge Distribution to Prevent Product Imitation and Counterfeiting"],"prefix":"10.4018","volume":"8","author":[{"given":"Gergana","family":"Vladova","sequence":"first","affiliation":[{"name":"University of Potsdam, Germany"}]},{"given":"Julian","family":"Bahrs","sequence":"additional","affiliation":[{"name":"University of Potsdam, Germany"}]},{"given":"Norbert","family":"Gronau","sequence":"additional","affiliation":[{"name":"University of Potsdam, Germany"}]}],"member":"2432","reference":[{"key":"jiit.2012040102-0","unstructured":"Bahrs, J, Gronau, N., & Vladova, G. (2010). Mit Wissensflussmanagement Produktpiraterie unterbinden. ZFO, 2010(6), 376-382."},{"key":"jiit.2012040102-1","unstructured":"Barboza, D. (2009). China, knockoff cellphones are a hit. The New York Times. Retrieved from http:\/\/www.nytimes.com\/2009\/04\/28\/technology\/28cell.html"},{"issue":"4","key":"jiit.2012040102-2","first-page":"473","article-title":"Global patent costs must be reduced.","volume":"36","author":"E. F. J.Berrier","year":"1996","journal-title":"IDEA the Journal of Law and Technology"},{"key":"jiit.2012040102-3","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511812507","author":"P.Bourdieu","year":"1977","journal-title":"Outline of a theory of practice"},{"key":"jiit.2012040102-4","doi-asserted-by":"publisher","DOI":"10.1177\/016224399401900401"},{"key":"jiit.2012040102-5","author":"P.Chaudhry","year":"2009","journal-title":"The economics of counterfeit trade"},{"issue":"2","key":"jiit.2012040102-6","first-page":"1","article-title":"Action research in the academy: Why and whither? Reflections on the changing nature of research.","volume":"25","author":"D.Coghlan","year":"2004","journal-title":"Irish Journal of Management"},{"key":"jiit.2012040102-7","author":"T.Davenport","year":"1998","journal-title":"Working knowledge. How organizations manage what they know"},{"key":"jiit.2012040102-8","author":"E.De Bono","year":"2000","journal-title":"Six thinking hats"},{"key":"jiit.2012040102-9","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507974"},{"key":"jiit.2012040102-10","unstructured":"Fenoff, R. S., & Wilson, J. M. (2009). Africa's counterfeit pharmaceutical epidemic: The road ahead. Retrieved from http:\/\/www.a-cappp.msu.edu\/docs\/Africa%20Pharma%20Paper.pdf"},{"key":"jiit.2012040102-11","author":"M.Florian","year":"2006","journal-title":"Pierrre Bourdieu: Neue Perspektiven f\u00fcr die Soziologie der Wirtschaft"},{"key":"jiit.2012040102-12","author":"M.Foucault","year":"1979","journal-title":"Discipline and punish: The birth of the prison"},{"issue":"4","key":"jiit.2012040102-13","doi-asserted-by":"crossref","first-page":"32","DOI":"10.4018\/jkm.2006100103","article-title":"Improvement of software engineering by modeling knowledge-intensive business processes.","volume":"2","author":"J.Fr\u00f6ming","year":"2006","journal-title":"International Journal of Knowledge Management"},{"key":"jiit.2012040102-14","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-349-16161-4","author":"A.Giddens","year":"1979","journal-title":"Central problems in social theory. Action, structure and contradiction in social analysis"},{"key":"jiit.2012040102-15","author":"A.Giddens","year":"1984","journal-title":"The constitution of society. Outline of the theory of structuration"},{"key":"jiit.2012040102-16","author":"N.Gronau","year":"2009","journal-title":"Wissen prozessorientiert managen. Methoden und Werkzeuge f\u00fcr die Nutzung des Wettbewerbsfaktors Wissen in Unternehmen"},{"key":"jiit.2012040102-17","author":"N.Gronau","year":"2012","journal-title":"Modeling and analyzing knowledge intensive business processes with KMDL - Comprehensive insights into theory and practice"},{"key":"jiit.2012040102-18","unstructured":"Gronau, N., & Weber, E. (2004a, June 17-18). Management of knowledge intensive business processes. In J. Desel, B. Pernici, & M. Weske (Eds.), Proceedings of the Second International Conference on Business Process Management, Potsdam, Germany (LNCS 3080, pp. 163-178)."},{"key":"jiit.2012040102-19","unstructured":"Gronau, N., & Weber, E. (2004b). Defining an Infrastructure for knowledge intensive business processes. In Proceedings of the 4th International Conference on Knowledge Management, Graz, Austria (pp. 424-431)."},{"key":"jiit.2012040102-20","first-page":"15","article-title":"Business process oriented knowledge management","author":"P.Heisig","year":"2003","journal-title":"Knowledge management - Concepts and best practices"},{"key":"jiit.2012040102-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2006.02.002"},{"key":"jiit.2012040102-22","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6486.1980.tb00087.x"},{"key":"jiit.2012040102-23","unstructured":"International Chamber of Commerce. (2007). Global survey on counterfeiting and piracy. Retrieved from http:\/\/www.iccwbo.org\/uploadedFiles\/BASCAP\/Pages\/BASCAP%20Survey_%20Final%20Report_29%20January07.pdf"},{"key":"jiit.2012040102-24","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-8501(99)00105-4"},{"key":"jiit.2012040102-25","first-page":"175","article-title":"Objectual practice","author":"K.Knorr Cetina","year":"2001","journal-title":"The practice turn in contemporary theory"},{"key":"jiit.2012040102-26","first-page":"235","article-title":"Der Wissenstransfer in Unternehmen. Phasen des Wissenstransfers und wichtige Einflussfaktoren.","volume":"5","author":"G.Krogh","year":"1998","journal-title":"Die Unternehmung"},{"key":"jiit.2012040102-27","unstructured":"Maier, R., H\u00e4drich, T., & Peinl, R. (2005). Enterprise knowledge infrastructures. Berlin, Germnay: Springer-Verlag."},{"issue":"2","key":"jiit.2012040102-28","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1177\/147078530805000206","article-title":"New trends in innovation and customer relationship management: A challenge for market researchers.","volume":"50","author":"S.Maklan","year":"2008","journal-title":"International Journal of Market Research"},{"key":"jiit.2012040102-29","author":"C. W.Neemann","year":"2007","journal-title":"Methodik zum Schutz gegen Produktimitationen"},{"key":"jiit.2012040102-30","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195092691.001.0001","author":"I.Nonaka","year":"1995","journal-title":"The knowledge-creating company - How Japanese companies create the dynamics of innovation"},{"issue":"7","key":"jiit.2012040102-31","first-page":"65","article-title":"From value chain to value constellation: Designing interactive strategy.","volume":"71","author":"R.Normann","year":"1993","journal-title":"Harvard Business Review"},{"key":"jiit.2012040102-32","unstructured":"OECD. (2007). Counterfeiting and piracy - What we know and what could be done. Retrieved from http:\/\/www.oecd.org\/dataoecd\/11\/38\/38704571.pdf"},{"key":"jiit.2012040102-33","doi-asserted-by":"crossref","DOI":"10.7208\/chicago\/9780226668208.001.0001","article-title":"From science as knowledge to science in practice","author":"A.Pickering","year":"1992","journal-title":"Science as practice and culture"},{"key":"jiit.2012040102-34","author":"A.Picot","year":"2003","journal-title":"Die grenzenlose Unternehmung.Information, Organisation und Management. Lehrbuch zur Unternehmensf\u00fchrung im Informationszeitalter"},{"key":"jiit.2012040102-35","author":"G.Probst","year":"2010","journal-title":"Wissen managen. Wie Unternehmen ihre wertvollste Ressource optimal nutzen"},{"key":"jiit.2012040102-36","doi-asserted-by":"publisher","DOI":"10.1177\/13684310222225432"},{"issue":"8","key":"jiit.2012040102-37","first-page":"671","article-title":"The applicability of the SECI model to multi-organisational endeavours: an integrative review.","volume":"9","author":"J.Rice","year":"2005","journal-title":"International Journal of Organisational Behaviour"},{"key":"jiit.2012040102-38","first-page":"442","article-title":"Understanding scientific practices. Cultural studies of science as a philosophical program","author":"J.Rouse","year":"1999","journal-title":"The science studies reader"},{"key":"jiit.2012040102-39","article-title":"Introduction: Practice theory","author":"T.Schatzki","year":"2001","journal-title":"The practice turn in contemporary theory"},{"key":"jiit.2012040102-40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76947-7"},{"key":"jiit.2012040102-41","article-title":"Philosophische Untersuchungen","author":"L.Wittgenstein","year":"1984","journal-title":"Werkausgabe 1\u2026sage, du habest es rauschen geh\u00f6rt"},{"issue":"4","key":"jiit.2012040102-42","first-page":"565","article-title":"Process oriented knowledge management: A service based approach.","volume":"11","author":"R.Woitsch","year":"2005","journal-title":"Journal of Universal Knowledge Management"}],"container-title":["International Journal of Intelligent Information Technologies"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=66870","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,24]],"date-time":"2024-04-24T16:31:21Z","timestamp":1713976281000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jiit.2012040102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,4,1]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jiit.2012040102","relation":{},"ISSN":["1548-3657","1548-3665"],"issn-type":[{"value":"1548-3657","type":"print"},{"value":"1548-3665","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,1]]}}}