{"id":103500,"date":"2024-02-20T14:28:14","date_gmt":"2024-02-20T13:28:14","guid":{"rendered":"https:\/\/industry-science.com\/?page_id=103500"},"modified":"2024-05-14T04:59:48","modified_gmt":"2024-05-14T02:59:48","slug":"product-piracy","status":"publish","type":"page","link":"https:\/\/industry-science.com\/en\/management\/product-piracy\/","title":{"rendered":"Product Piracy"},"content":{"rendered":"\n\n<!-- GITO_PUB_POST start flex-container -->\n<div class=\"gito-pub-flex-container\">\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/safety-cyber-security-industry\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/03\/AdobeStock_192800948-640x325.jpeg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/03\/AdobeStock_192800948-196x180.jpeg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/2025\/03\/AdobeStock_192800948-196x180.jpeg\" alt=\"Functional Safety and Cyber Security in the Process Industry\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"Functional Safety and Cyber Security in the Process Industry\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">Functional Safety and Cyber Security in the Process Industry<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">A tension between stability and agility<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/thimmo-kugele\/\">Thimmo Kugele<\/a>, <a href=\"\/authors\/claudia-nowak\/\">Claudia Nowak<\/a>, <a href=\"\/authors\/arno-goetz\/\">Arno G\u00f6tz<\/a>, <a href=\"\/authors\/alexander-lawall\/\">Alexander Lawall<\/a> <a href=\"https:\/\/orcid.org\/0000-0003-4703-6310\" target=\"_blank\" title=\"ORCID eintrag \u00f6ffnen.\" rel=\"noopener\">\n        <img decoding=\"async\" src=\"https:\/\/orcid.org\/assets\/vectors\/orcid.logo.icon.svg\" alt=\"ORCID Icon\" style=\"width:16px;height:16px;vertical-align:middle;\"><\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     <div class=\"gito-pub-frontend-post-card-abo-sign gito-pub-login-register-link\" data-targetabo=\"professional\" data-targeturl=\"https:\/\/industry-science.com\/en\/articles\/safety-cyber-security-industry\/\" title=\"please login or register - content can only be read in its entirety with a subscription  professional\">\n\t\t\t                         <img decoding=\"async\" src=\"https:\/\/industry-science.com\/wp-content\/plugins\/gito-publisher\/img\/i4s-login.png\">\n\t\t\t                      <\/div>Functional safety (safety) and cyber security (security) are key aspects of modern industry and technology. Safety aims to minimize risks posed by system malfunctions. This includes measures to protect people and the environment from failures and errors within systems. Security focuses on protecting systems and networks from digital attacks. The primary security objectives include ensuring confidentiality, integrity, and availability. A joint consideration of safety and security is essential for the future of the process industry, as both the physical safety and digital integrity of modern systems must be ensured. In industrial practice, this creates a field of tension: measures to enhance security can negatively impact safety and vice versa. This article analyzes relevant standards and regulations, presents key approaches for the integrated consideration of safety and security, and highlights areas of further research.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industry 4.0 Science<\/strong> | Volume 41 | 2025 | Edition 2 | Pages 87-93<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/increased-security-through-the-use-of-inherent-components-as-anti-counterfeiting-protection-measures\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-1400x788-640x325.jpg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-196x180.jpg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/abele_Technisches-Schutzkonzept-gegen-Produktpiraterie-IM-2015-5-196x180.jpg\" alt=\"Increased Security Through Anti-Counterfeiting Protection Measures\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"Increased Security Through Anti-Counterfeiting Protection Measures\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">Increased Security Through Anti-Counterfeiting Protection Measures<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/eberhard-abele\/\">Eberhard Abele<\/a>, <a href=\"\/authors\/eugenia-gossen\/\">Eugenia Gossen<\/a>, <a href=\"\/authors\/leonardo-gerardi\/\">Leonardo Gerardi<\/a>, <a href=\"\/authors\/christian-kaegeler\/\">Christian K\u00e4geler<\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     <div class=\"gito-pub-frontend-post-card-abo-sign gito-pub-login-register-link\" data-targetabo=\"digital\" data-targeturl=\"https:\/\/industry-science.com\/en\/articles\/increased-security-through-the-use-of-inherent-components-as-anti-counterfeiting-protection-measures\/\" title=\"please login or register - content can only be read in its entirety with a subscription  digital\">\n\t\t\t                         <img decoding=\"async\" src=\"https:\/\/industry-science.com\/wp-content\/plugins\/gito-publisher\/img\/i4s-login.png\">\n\t\t\t                      <\/div>Both globalization and digitalization yield high potential for an efficient exchange and use of information on the one hand, but on the other hand also require new levels of data management and security. In order to be able to exploit the full return on innovation, original producers need to secure their knowledge and competitive advantage, not ignoring the rising risk of being imitated any longer. Nowadays it is not sufficient to simply reduce the length of innovation cycles. Instead, companies have to actively invest into anti-counterfeiting measures in order to secure their local and global competitive advantage. Requirements relating to the security and effectivity of technical anti-counterfeiting concepts, and the development of such a security measure, are the subject of this article.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industrie Management<\/strong> | Volume 31 | 2015 | Edition 5 | Pages 49-52<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/counterfeiting-a-preventive-approach-for-product-protection\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/eckelt_Praeventiver-Produktschutz-IM_2014-1-1400x788-640x325.jpg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/eckelt_Praeventiver-Produktschutz-IM_2014-1-196x180.jpg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/eckelt_Praeventiver-Produktschutz-IM_2014-1-196x180.jpg\" alt=\"Counterfeiting &#8211; A Preventive Approach for Product Protection\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"Counterfeiting - A Preventive Approach for Product Protection\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">Counterfeiting - A Preventive Approach for Product Protection<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">Ein ganzheitlicher Ansatz f\u00fcr die Bedrohungsanalyse<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/daniel-eckelt\/\">Daniel Eckelt<\/a>, <a href=\"\/authors\/katharina-altemeier\/\">Katharina Altemeier<\/a>, <a href=\"\/authors\/daniel-kliewe\/\">Daniel Kliewe<\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     <div class=\"gito-pub-frontend-post-card-abo-sign gito-pub-login-register-link\" data-targetabo=\"digital\" data-targeturl=\"https:\/\/industry-science.com\/en\/articles\/counterfeiting-a-preventive-approach-for-product-protection\/\" title=\"please login or register - content can only be read in its entirety with a subscription  digital\">\n\t\t\t                         <img decoding=\"async\" src=\"https:\/\/industry-science.com\/wp-content\/plugins\/gito-publisher\/img\/i4s-login.png\">\n\t\t\t                      <\/div>The products of the German machinery and plant engineering are worldwide successful. Therefore a lot of counterfeits exist. These represent a serious problem because the companies lose their return on investment. Under these conditions the project aims are to develop a method to detect potential threats and link them to effective protective measures.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industrie Management<\/strong> | Volume 30 | 2014 | Edition 1 | Pages 55-58<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/preventive-anti-counterfeiting-in-mechanical-engineering-using-passive-signed-rfid-tags\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/durchholz_Praeventiver_Produktpiraterieschutz_IM_2012_4-1400x788-640x325.jpg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/durchholz_Praeventiver_Produktpiraterieschutz_IM_2012_4-196x180.jpg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/durchholz_Praeventiver_Produktpiraterieschutz_IM_2012_4-196x180.jpg\" alt=\"Preventive Anti-Counterfeiting in Mechanical Engineering\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"Preventive Anti-Counterfeiting in Mechanical Engineering\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">Preventive Anti-Counterfeiting in Mechanical Engineering<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">An approach using passive signed rfid-tags<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/janina-durchholz\/\">Janina Durchholz<\/a>, <a href=\"\/authors\/dominik-stockenberger\/\">Dominik Stockenberger<\/a>, <a href=\"\/authors\/willibald-a-guenthner\/\">Willibald A. G\u00fcnthner<\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     <div class=\"gito-pub-frontend-post-card-abo-sign gito-pub-login-register-link\" data-targetabo=\"digital\" data-targeturl=\"https:\/\/industry-science.com\/en\/articles\/preventive-anti-counterfeiting-in-mechanical-engineering-using-passive-signed-rfid-tags\/\" title=\"please login or register - content can only be read in its entirety with a subscription  digital\">\n\t\t\t                         <img decoding=\"async\" src=\"https:\/\/industry-science.com\/wp-content\/plugins\/gito-publisher\/img\/i4s-login.png\">\n\t\t\t                      <\/div>On the technical level there are different possibilities to fight counterfeiting and to prohibit the use of counterfeited parts in machinery and equipment. The aim should be to enable the machinery and equipment to recognize the exchange of wearing or the assembly of additional parts automatically and to check their originality independently. RFID offers not only the conditions to realize the suggested functions but also the possibility to check the authenti-city of products along the whole supply chain. Of course, the checking of parts along the supply chain avoids that co-pies or counterfeited goods break into the original value added chain.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industrie Management<\/strong> | Volume 28 | 2012 | Edition 4 | Pages 11-14<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/contolling-know-how-flow-in-supply-chains-in-the-context-of-product-piracy\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/meier_IM5-2010_druckversion-14-1400x788-640x325.jpg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/meier_IM5-2010_druckversion-14-196x180.jpg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/meier_IM5-2010_druckversion-14-196x180.jpg\" alt=\"Contolling Know-How Flow in Supply Chains in the Context of Product Piracy\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"Contolling Know-How Flow in Supply Chains in the Context of Product Piracy\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">Contolling Know-How Flow in Supply Chains in the Context of Product Piracy<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/horst-meier\/\">Horst Meier<\/a>, <a href=\"\/authors\/christian-siebel\/\">Christian Siebel<\/a>, <a href=\"\/authors\/michael-nahr\/\">Michael Nahr<\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     <div class=\"gito-pub-frontend-post-card-abo-sign gito-pub-login-register-link\" data-targetabo=\"digital\" data-targeturl=\"https:\/\/industry-science.com\/en\/articles\/contolling-know-how-flow-in-supply-chains-in-the-context-of-product-piracy\/\" title=\"please login or register - content can only be read in its entirety with a subscription  digital\">\n\t\t\t                         <img decoding=\"async\" src=\"https:\/\/industry-science.com\/wp-content\/plugins\/gito-publisher\/img\/i4s-login.png\">\n\t\t\t                      <\/div>Companies of the capital goods industry are more and more confronted with an increasing global competition. Furthermore the demand for a faster customisation of customers\u2019 goods is accompanied by a decreasing product lifecycle. This circumstances lead to an uniting of companies to a value added chain which can more resist the increasing requirements of the industry. Sensitive data is consequently changed beyond the enterprise limits and the threat of product piracy is increasing to a higher level. Due to the increasing problem of product piracy this article describes the different comprehension of product piracy and explains a procedure strategy for providing of central knowledge. This described approach is not only limited to the enterprise limits. It can be used for the entire value added chain.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industrie Management<\/strong> | Volume 26 | 2010 | Edition 5 | Pages 61-64<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/protecting-prime-quality-by-using-anti-counterfeiting-strategies\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abele_IM4-2010-druck2-2-1400x788-640x325.jpg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/abele_IM4-2010-druck2-2-196x180.jpg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/abele_IM4-2010-druck2-2-196x180.jpg\" alt=\"Protecting Prime Quality by Using Anti-Counterfeiting Strategies\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"Protecting Prime Quality by Using Anti-Counterfeiting Strategies\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">Protecting Prime Quality by Using Anti-Counterfeiting Strategies<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/eberhard-abele\/\">Eberhard Abele<\/a>, <a href=\"\/authors\/laura-schroeder\/\">Laura Schr\u00f6der<\/a>, <a href=\"\/authors\/philipp-kuske\/\">Philipp Kuske<\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     <div class=\"gito-pub-frontend-post-card-abo-sign gito-pub-login-register-link\" data-targetabo=\"digital\" data-targeturl=\"https:\/\/industry-science.com\/en\/articles\/protecting-prime-quality-by-using-anti-counterfeiting-strategies\/\" title=\"please login or register - content can only be read in its entirety with a subscription  digital\">\n\t\t\t                         <img decoding=\"async\" src=\"https:\/\/industry-science.com\/wp-content\/plugins\/gito-publisher\/img\/i4s-login.png\">\n\t\t\t                      <\/div>Product piracy has risen to a serious problem for almost every manufacturer in the capital goods industry. Especially if the customer unwittingly mistake counterparts for original products, the manufacturer will lose parts of reputation. So manufacturers have to expand their quality management with new tasks to ensure that their original products are delivered to their customers. A holistic anti-counterfeiting-strategy provides adequate counter measures for this challenge.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industrie Management<\/strong> | Volume 26 | 2010 | Edition 4 | Pages 53-56<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/strategic-management-of-product-piracy-quality-assurance-in-the-design-of-integrated-protection-strategies\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/kleine_IM4-2010-druck2-4-1400x788-640x325.jpg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/kleine_IM4-2010-druck2-4-196x180.jpg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/kleine_IM4-2010-druck2-4-196x180.jpg\" alt=\"Strategic Management of Product Piracy\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"Strategic Management of Product Piracy\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">Strategic Management of Product Piracy<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">Quality Assurance in the Design of integrated Protection Strategies<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/oliver-kleine\/\">Oliver Kleine<\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     <div class=\"gito-pub-frontend-post-card-abo-sign gito-pub-login-register-link\" data-targetabo=\"digital\" data-targeturl=\"https:\/\/industry-science.com\/en\/articles\/strategic-management-of-product-piracy-quality-assurance-in-the-design-of-integrated-protection-strategies\/\" title=\"please login or register - content can only be read in its entirety with a subscription  digital\">\n\t\t\t                         <img decoding=\"async\" src=\"https:\/\/industry-science.com\/wp-content\/plugins\/gito-publisher\/img\/i4s-login.png\">\n\t\t\t                      <\/div>The increasing threat of German industrial goods manufactures by product piracy and other types of unintentional know how transfer is all but accepted today. However, generally speaking, piracy management today is still rather reactive than preventive and in most parts the results of a more or less tactical planning approach. Strategic concerns such as the fundamental strategic fit of countermeasures and actual piracy situation have not yet been solved satisfactorily. Quality assurance in strategic decision making is a prerequisite for a successful strategy against product piracy. This article presents an approach to solve the issue based on the well-known quality function deployment (QFD) method.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industrie Management<\/strong> | Volume 26 | 2010 | Edition 4 | Pages 61-65<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/rfid-based-services-for-the-forgery-proof-authentication-and-tracking-of-products\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/abramovici_IM5-2009_druckversion-10-1400x788-640x325.jpg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/abramovici_IM5-2009_druckversion-10-196x180.jpg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/abramovici_IM5-2009_druckversion-10-196x180.jpg\" alt=\"RFID-based Services for the Forgery-proof Authentication and Tracking of Products\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"RFID-based Services for the Forgery-proof Authentication and Tracking of Products\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">RFID-based Services for the Forgery-proof Authentication and Tracking of Products<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">Authentifizierung entlang der Supply Chain<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/michael-abramovici\/\">Michael Abramovici<\/a>, <a href=\"\/authors\/matthias-flohr\/\">Matthias Flohr<\/a>, <a href=\"\/authors\/andreas-krebs\/\">Andreas Krebs<\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     <div class=\"gito-pub-frontend-post-card-abo-sign gito-pub-login-register-link\" data-targetabo=\"digital\" data-targeturl=\"https:\/\/industry-science.com\/en\/articles\/rfid-based-services-for-the-forgery-proof-authentication-and-tracking-of-products\/\" title=\"please login or register - content can only be read in its entirety with a subscription  digital\">\n\t\t\t                         <img decoding=\"async\" src=\"https:\/\/industry-science.com\/wp-content\/plugins\/gito-publisher\/img\/i4s-login.png\">\n\t\t\t                      <\/div>Product piracy poses an increasing threat to manufacturers and providers of products in the industrial sector. Therefore the application of technical solutions for the protection against product counterfeiting and copying becomes more and more important. In this context, especially the use of RFID technology constitutes an effective instrument for tracking original products and components along the supply chain and also for quick and reliable verification and confirmation of their authenticity. Within the joint project MobilAuthent, supported by the BMBF, a solution for forgery-proof product authentication and tracking along the supply chain based on RFID is being developed. This article introduces the first project results as well as the MobilAuthent concept. The presented solution can be flexibly adapted to different company and product-related requirements.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industrie Management<\/strong> | Volume 25 | 2009 | Edition 5 | Pages 47-50<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/product-piracy-does-it-still-make-sense-to-file-a-patent-application\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/IM6-2008_ann-1400x788-640x325.jpg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/IM6-2008_ann-196x180.jpg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/IM6-2008_ann-196x180.jpg\" alt=\"Product Piracy &#8211; Does it still make sense to file a patent application?\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"Product Piracy - Does it still make sense to file a patent application?\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">Product Piracy - Does it still make sense to file a patent application?<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">Sind Patente heute noch sinnvoll oder st\u00e4rken Sie nur die Piraten?<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/christoph-ann\/\">Christoph Ann<\/a>, <a href=\"\/authors\/barbara-grueneis\/\">Barbara Gr\u00fcneis<\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     <div class=\"gito-pub-frontend-post-card-abo-sign gito-pub-login-register-link\" data-targetabo=\"digital\" data-targeturl=\"https:\/\/industry-science.com\/en\/articles\/product-piracy-does-it-still-make-sense-to-file-a-patent-application\/\" title=\"please login or register - content can only be read in its entirety with a subscription  digital\">\n\t\t\t                         <img decoding=\"async\" src=\"https:\/\/industry-science.com\/wp-content\/plugins\/gito-publisher\/img\/i4s-login.png\">\n\t\t\t                      <\/div>Innovation is important for the competitiveness of an enterprise. Patents protect innovations and enable companies to exploit the fruits of their R&D. This article focuses on the effects of product piracy upon our Western patent system. It shows that in the future there will be only two alternatives for the strategic IP-management in sectors exposed to piracy threats: to patent the inventions in all relevant markets or to maintain them as trade secrets. This paper highlights the parameters as well as results.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industrie Management<\/strong> | Volume 24 | 2008 | Edition 6 | Pages 59-62<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n   <div class=\"gito-pub-frontend-post-card gito-pub-flex-item gito-pub-flex-item-1\">\n      <a href=\"https:\/\/industry-science.com\/en\/articles\/innovations-against-counterfeiting-effective-protection-against-counterfeiting-for-producing-companies\/\">\n         <div class=\"gito-pub-frontend-post-card-row\">         <div class=\"gito-pub-frontend-post-card-column gito-pub-frontend-post-card-column-image\">\n            <picture>\n               <source media=\"(max-width:640px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/2024\/03\/gausemeier_IM6-2008-druckversion-11-1400x788-640x325.jpg\">\n               <source media=\"(min-width:641px)\" srcset=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/gausemeier_IM6-2008-druckversion-11-196x180.jpg\">\n               <img decoding=\"async\" class=\"gito-pub-frontend-post-card-image\" src=\"https:\/\/industry-science.com\/wp-content\/uploads\/gito-publisher\/alternate-list-images\/gausemeier_IM6-2008-druckversion-11-196x180.jpg\" alt=\"Innovations against counterfeiting\">\n            <\/picture>\n         <\/div>\n            <div class=\"gito-pub-frontend-post-card-column\">               <div class=\"ellipsis\" style=\"height:166px !important;overflow:hidden;\" title=\"Innovations against counterfeiting\">                  <table class=\"gito-pub-frontend-post-card-header\">\n            \t     <tr>\n                        <td>                  \t\t   <h4 class=\"gito-pub-frontend-post-card-title\" style=\"line-height:1.2em;\">Innovations against counterfeiting<\/h4>\n                        <div class=\"gito-pub-frontend-post-card-subtitle\">Effective protection against counterfeiting for producing companies<\/div>                        <div class=\"gito-pub-frontend-post-card-author\"><a href=\"\/authors\/juergen-gausemeier\/\">J\u00fcrgen Gausemeier<\/a>, <a href=\"\/authors\/oliver-koester\/\">Oliver K\u00f6ster<\/a>, <a href=\"\/authors\/karsten-stoll\/\">Karsten Stoll<\/a><\/div>\n                        <\/td>\n                     <\/tr>\n                  <\/table>\n                  <div class=\"gito-pub-frontend-post-card-text\">\n                     <div class=\"gito-pub-frontend-post-card-abo-sign gito-pub-login-register-link\" data-targetabo=\"digital\" data-targeturl=\"https:\/\/industry-science.com\/en\/articles\/innovations-against-counterfeiting-effective-protection-against-counterfeiting-for-producing-companies\/\" title=\"please login or register - content can only be read in its entirety with a subscription  digital\">\n\t\t\t                         <img decoding=\"async\" src=\"https:\/\/industry-science.com\/wp-content\/plugins\/gito-publisher\/img\/i4s-login.png\">\n\t\t\t                      <\/div>Capital goods industry is imperilled by counterfeiting more than ever. Legal services are the preferred measure of companies facing this challenge. This article shows further possibilities how producing companies can protect themselves effectively against counterfeiting. There are many technological and organisational measures already available. Furthermore, innovative measures are being developed at the very moment. Considering this background it is necessary to inform affected companies about the manifold possibilities of preventing counterfeiting. Moreover it is essential to depict how a specific threat can be faced by combining stand alone measures to customised safety concepts.                  <\/div>\n               <\/div>\n               <div class=\"gito-pub-frontend-post-card-scientific\"><strong>Industrie Management<\/strong> | Volume 24 | 2008 | Edition 6 | Pages 51-54<\/div>            <\/div>\n         <\/div>\n      <\/a>\n   <\/div>\n<\/div>\n<!-- GITO_PUB_POST end flex-container -->\n<div class=\"col-lg-12\" style=\"text-align:center;margin-top:30px;\"><span aria-label=\"Page 1\" aria-current=\"page\" class=\"page-numbers current\">1<\/span>\n<a aria-label=\"Page 2\" class=\"page-numbers\" href=\"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/pages\/103500\/?paged=2\">2<\/a>\n<a aria-label=\"Page 3\" class=\"page-numbers\" href=\"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/pages\/103500\/?paged=3\">3<\/a>\n<a class=\"next page-numbers\" href=\"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/pages\/103500\/?paged=2\">\u00bb<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":461,"featured_media":0,"parent":103482,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","footnotes":""},"class_list":["post-103500","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"front-page-entry":false,"post-entry":false,"post-teaser":false,"post-teaser-mobile":false,"post-custom-size":false,"whitepaper-teaser":false,"card-big":false,"card-portrait":false,"card-big-company":false,"gp-listing":false,"1536x1536":false,"2048x2048":false,"woocommerce_thumbnail":false,"woocommerce_single":false,"woocommerce_gallery_thumbnail":false,"dgwt-wcas-product-suggestion":false},"uagb_author_info":{"display_name":"Nimesh Patel","author_link":"https:\/\/industry-science.com\/en\/author\/nimesh\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/pages\/103500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/users\/461"}],"replies":[{"embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/comments?post=103500"}],"version-history":[{"count":1,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/pages\/103500\/revisions"}],"predecessor-version":[{"id":103502,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/pages\/103500\/revisions\/103502"}],"up":[{"embeddable":true,"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/pages\/103482"}],"wp:attachment":[{"href":"https:\/\/industry-science.com\/en\/wp-json\/wp\/v2\/media?parent=103500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}