• Non ci sono risultati.

Strategies from the

N/A
N/A
Protected

Academic year: 2021

Condividi "Strategies from the"

Copied!
2
0
0

Testo completo

(1)

Free Access Academy of Management Annual Meeting Proceedings includes abstracts of all papers and symposia presented at the annual conference, plus 6-page abridged versions of the “Best Papers” accepted for inclusion in the program (approximately 10%). Papers published in the Proceedings are abridged because presenting papers at their full length could preclude subsequent journal publication. Please contact the author(s) directly for the full papers.

Strategies from the

counterfeiting battlefield - Protecting firms’ identity

Karin Beukel and Francesco Rullani

Abstract

Organizations experience both costs and benefits when facing counterfeits. Recent research has highlighted the differences in outcome of entry of counterfeits as being dependent on quality

uncertainties, pricing, networks and non-price signaling, however, the role of organizations identity remains unexplored. Organizations protect their identity by fighting counterfeiters in their main and ancillary markets, as well as against diffusion of dangerous

counterfeit products that can damage their brand and reputation. We describe the strategies of the firm and of the counterfeiters in these two contexts, and test our hypotheses using a unique dataset reporting 3,333 battles taken by a high-tech firm against more than 2000

counterfeiters in 75 countries over a 6-year period. We find broad support for our hypotheses on the strategic behavior of the firm and of the counterfeiters, highlighting the difficulties firms face in protecting their main markets, and their advantages in limiting the diffusion of dangerous counterfeit products. Counterfeits can thereby be

understood as a potential source for disruptive identity shifts, which explain the heterogeneous impact from counterfeits.

Figures References Related Details

Vol. 2014, No. 1

Permissions

Metrics

Downloaded 0 times in the past 12 months

History

Published online 30 November 2017

Published in print 1 January 2014

Information

Copyright of Academy of Management Journal is the property of Academy of

Management and its content may

Strategies from the counterfeiting battlefield - Protecting firms’ identity |... https://journals.aom.org/doi/10.5465/ambpp.2014.12347abstract

1 di 2 27/03/2020, 12:04

(2)

Academy of Management 555 Pleasantville Road, Suite N200

Briarcliff Manor, NY 10510-8020, USA

Phone: +1 (914) 326-1800 Fax: +1 (914) 326-1900

Privacy Policy Logo Use

© 2020 Academy of Management Powered by Atypon® Literatum

Strategies from the counterfeiting battlefield - Protecting firms’ identity |... https://journals.aom.org/doi/10.5465/ambpp.2014.12347abstract

2 di 2 27/03/2020, 12:04

Riferimenti

Documenti correlati

For the validation we proceeded as follows: (i) we reproduced the full-genome-based tree as for the learning genome set, containing the already evaluated 39 strains plus the

A transcortical extra-articular approach to facilitate curettage, irrigation, and placement of an absorbable implant to treat subchondral cystic lesions of the medial femoral

To address these issues, we exposed male and female TgF344-AD rats and congenic controls to real-time TRAP or filtered air (FA) over the course of 15 months, using a mobile

Today’s XY project has interpreted the most current instances of scientif- ic publishing and in addition to the pa- per edition, published by the Universi- ty of Trento and

Come Vito Cardone ha ricordato du- rante la presentazione della nuova se- rie digitale, che ha sostenuto con con- vinzione, tenutasi presso l’Università di.. La ricerca nel campo

Abstract The convergence rate of the sample mean of fractionally integrated processes is exploited to build test statistics for the fractional integration parameter d of

In addition, the comparison between the values of the objective functions shows that adding the second worker reduces the relocation costs, but this lessening is not so

The work presented in this volume examines those integrations through the study of how communities and cultures are forming in and through use of the Internet, as well as how