Contrafação nas cadeias de suprimentos: um risco para os negócios
Autor(a) principal: | |
---|---|
Data de Publicação: | 2020 |
Tipo de documento: | Tese |
Idioma: | por |
Título da fonte: | Repositório Institucional do FGV (FGV Repositório Digital) |
Texto Completo: | https://hdl.handle.net/10438/29847 |
Resumo: | The complexity of supply chains has been considered by companies as a new challenge for managers, since new risks are imputed in these relationships and threaten to cause disruptions. The globalization of suppliers has also increased the risk of counterfeit products entering all countries. In this way, companies feel contingent on taking proactive positions, creating strategies to mitigate and combat counterfeiting, or reactive, hoping to develop the necessary skills for this challenge. This study consists of three articles, which aim to analyze and explain counterfeiting as a risk to business in companies' supply chains. The first article aims to verify the discussions on counterfeiting published in the main international journals on the topics of Operations Management and Supply Chain Management. The article presents the main theories, practices and technologies related to counterfeiting discussed in recent years. From their results, propositions about new studies could be elaborated and collaborated with the next steps for a greater understanding of the topic of counterfeiting in supply chains. As a second step, article 2 sought to understand, through an experiment method, whether the intention to purchase products can be affected when there are risks of counterfeiting in their acquisition. In this research, eight scenarios were created that bring narratives aimed at assessing whether certain influences can modify the purchase intention of managers. The results suggest that the purchase intention is affected by the origin of the product and the risk of counterfeiting perceived by managers in business-to-business (B2B) relationships. In general, the proposed model expands the understanding of the theme. As a managerial contribution, it is noted that managers tend to make decisions after analyzing as much information or variables as possible, in addition to highlighting the importance of risk management in operations. Finally, article 3 set out to understand how a technology company acts in the fight against counterfeiting under the vision of the Transaction Costs Theory (TCT). Through a single case study, it was found that companies use corporate governance processes to combat counterfeiting. Confidentiality contracts, audits and purchasing policies are some ways for companies to guard against these fraudulent acts. Thus, the technologies used still focus on business management systems such as systemic controls on production batches. On the other hand, technologies such as radio frequency identification (RFID), blockchain, 3D printing, among others, still need greater adherence to the strategies of companies as support for their actions to combat counterfeiting. |
id |
FGV_84eee2c876c738f28e327a85ba169c0f |
---|---|
oai_identifier_str |
oai:repositorio.fgv.br:10438/29847 |
network_acronym_str |
FGV |
network_name_str |
Repositório Institucional do FGV (FGV Repositório Digital) |
repository_id_str |
3974 |
spelling |
Luna, Roger AugustoEscolasBotelho, DelaneSilva, Andrea LagoSilva, Eliciane MariaPaiva, Ely Laureano2020-11-19T18:59:00Z2020-11-19T18:59:00Z2020-10-07https://hdl.handle.net/10438/29847The complexity of supply chains has been considered by companies as a new challenge for managers, since new risks are imputed in these relationships and threaten to cause disruptions. The globalization of suppliers has also increased the risk of counterfeit products entering all countries. In this way, companies feel contingent on taking proactive positions, creating strategies to mitigate and combat counterfeiting, or reactive, hoping to develop the necessary skills for this challenge. This study consists of three articles, which aim to analyze and explain counterfeiting as a risk to business in companies' supply chains. The first article aims to verify the discussions on counterfeiting published in the main international journals on the topics of Operations Management and Supply Chain Management. The article presents the main theories, practices and technologies related to counterfeiting discussed in recent years. From their results, propositions about new studies could be elaborated and collaborated with the next steps for a greater understanding of the topic of counterfeiting in supply chains. As a second step, article 2 sought to understand, through an experiment method, whether the intention to purchase products can be affected when there are risks of counterfeiting in their acquisition. In this research, eight scenarios were created that bring narratives aimed at assessing whether certain influences can modify the purchase intention of managers. The results suggest that the purchase intention is affected by the origin of the product and the risk of counterfeiting perceived by managers in business-to-business (B2B) relationships. In general, the proposed model expands the understanding of the theme. As a managerial contribution, it is noted that managers tend to make decisions after analyzing as much information or variables as possible, in addition to highlighting the importance of risk management in operations. Finally, article 3 set out to understand how a technology company acts in the fight against counterfeiting under the vision of the Transaction Costs Theory (TCT). Through a single case study, it was found that companies use corporate governance processes to combat counterfeiting. Confidentiality contracts, audits and purchasing policies are some ways for companies to guard against these fraudulent acts. Thus, the technologies used still focus on business management systems such as systemic controls on production batches. On the other hand, technologies such as radio frequency identification (RFID), blockchain, 3D printing, among others, still need greater adherence to the strategies of companies as support for their actions to combat counterfeiting.A complexidade das cadeias de suprimentos tem sido considerada pelas empresas como um novo desafio para os gestores, já que novos riscos são imputados nessas relações e ameaçam causar rupturas. A globalização dos fornecedores também aumentou o risco de entrada de produtos contrafeitos em todos os países. Deste modo, as empresas se sentem na contingência de assumir posições proativas, criando estratégias de mitigação e combate à contrafação, ou reativas, esperando desenvolver competências necessárias para este desafio. Este estudo é composto por três artigos, que têm por objetivo analisar e explicar a contrafação como um risco para os negócios nas cadeias de suprimentos das empresas. O primeiro artigo tem o objetivo de verificar as discussões sobre a contrafação publicadas nos principais periódicos internacionais relativos aos temas Gestão de Operações e Supply Chain Management. O artigo apresenta as principais teorias, práticas e tecnologias relacionadas à contrafação discutidas nos últimos anos. A partir de seus resultados, proposições sobre novos estudos puderam ser elaboradas e colaboraram com os próximos passos para uma maior compreensão do tema da contrafação nas cadeias de suprimentos. Como segundo passo, o artigo 2 buscou compreender, por meio de um método de experimento, se a intenção de compra de produtos pode ser afetada quando existem riscos de contrafação na sua aquisição. Nesta pesquisa, foram criados oito cenários que trazem narrativas destinadas a avaliar se determinadas influências podem modificar a intenção de compra de gestores. Os resultados sugerem que a intenção de compra é afetada pela origem do produto e pelo risco de contrafação percebido por gestores em relações business-to-business (B2B). De maneira geral, o modelo proposto expande a compreensão sobre o tema. Como contribuição gerencial, nota-se que os gestores tendem a tomar decisões após analisar o maior volume possível de informações ou variáveis, além de ressaltar a importância da gestão de risco nas operações. Por fim, o artigo 3 se propôs a compreender como uma empresa de tecnologia atua no combate à contrafação sob a visão da Teoria dos Custos de Transação (TCT). Por meio de um estudo de caso único, constatou-se que as empresas utilizam processos de governança corporativa no combate à contrafação. Contratos de confidencialidade, auditorias e políticas de compras são algumas formas de as empresas se resguardarem desses atos fraudulentos. Assim, as tecnologias utilizadas ainda se concentram em sistemas de gestão empresarial como controles sistêmicos de lotes de produção. Por outro lado, tecnologias como radio frequency identification (RFID), blockchain, impressão 3D, dentre outras, necessitam ainda de maior aderência às estratégias das empresas como suportes às suas ações de combate à contrafação.porCounterfeitingSupply chainTransaction costsRisk managementPurchase intentionContrafaçãoCadeia de suprimentosCusto de transaçãoGestão de riscoIntenção de comprasAdministração de empresasAção de contrafaçãoLogística empresarialAdministração de riscoCustos de transaçãoContrafação nas cadeias de suprimentos: um risco para os negóciosinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/doctoralThesisinfo:eu-repo/semantics/openAccessreponame:Repositório Institucional do FGV (FGV Repositório Digital)instname:Fundação Getulio Vargas (FGV)instacron:FGVORIGINALTese roger luna.pdfTese roger luna.pdfPDFapplication/pdf1860180https://repositorio.fgv.br/bitstreams/3ba5362a-dfda-4215-b2bd-948be831af6d/download7f7db87933f17cc7619049099938ef60MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-84707https://repositorio.fgv.br/bitstreams/4faeddd2-5718-4611-ba41-93b371ea7ee7/downloaddfb340242cced38a6cca06c627998fa1MD52TEXTTese roger luna.pdf.txtTese roger luna.pdf.txtExtracted texttext/plain101446https://repositorio.fgv.br/bitstreams/8ba9f70e-184d-40a7-a9d6-df27fd11e975/downloadb9c87f6572fa25ae98a1976f4b27564cMD55THUMBNAILTese roger luna.pdf.jpgTese roger luna.pdf.jpgGenerated Thumbnailimage/jpeg2458https://repositorio.fgv.br/bitstreams/3f70b734-95af-4963-95d2-2d5e17242e75/download569ed21fa194ea34e098ae07459883bbMD5610438/298472024-10-08 13:55:29.82open.accessoai:repositorio.fgv.br:10438/29847https://repositorio.fgv.brRepositório InstitucionalPRIhttp://bibliotecadigital.fgv.br/dspace-oai/requestopendoar:39742024-10-08T13:55:29Repositório Institucional do FGV (FGV Repositório Digital) - Fundação Getulio Vargas (FGV)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 |
dc.title.por.fl_str_mv |
Contrafação nas cadeias de suprimentos: um risco para os negócios |
title |
Contrafação nas cadeias de suprimentos: um risco para os negócios |
spellingShingle |
Contrafação nas cadeias de suprimentos: um risco para os negócios Luna, Roger Augusto Counterfeiting Supply chain Transaction costs Risk management Purchase intention Contrafação Cadeia de suprimentos Custo de transação Gestão de risco Intenção de compras Administração de empresas Ação de contrafação Logística empresarial Administração de risco Custos de transação |
title_short |
Contrafação nas cadeias de suprimentos: um risco para os negócios |
title_full |
Contrafação nas cadeias de suprimentos: um risco para os negócios |
title_fullStr |
Contrafação nas cadeias de suprimentos: um risco para os negócios |
title_full_unstemmed |
Contrafação nas cadeias de suprimentos: um risco para os negócios |
title_sort |
Contrafação nas cadeias de suprimentos: um risco para os negócios |
author |
Luna, Roger Augusto |
author_facet |
Luna, Roger Augusto |
author_role |
author |
dc.contributor.unidadefgv.por.fl_str_mv |
Escolas |
dc.contributor.member.none.fl_str_mv |
Botelho, Delane Silva, Andrea Lago Silva, Eliciane Maria |
dc.contributor.author.fl_str_mv |
Luna, Roger Augusto |
dc.contributor.advisor1.fl_str_mv |
Paiva, Ely Laureano |
contributor_str_mv |
Paiva, Ely Laureano |
dc.subject.eng.fl_str_mv |
Counterfeiting Supply chain Transaction costs Risk management Purchase intention |
topic |
Counterfeiting Supply chain Transaction costs Risk management Purchase intention Contrafação Cadeia de suprimentos Custo de transação Gestão de risco Intenção de compras Administração de empresas Ação de contrafação Logística empresarial Administração de risco Custos de transação |
dc.subject.por.fl_str_mv |
Contrafação Cadeia de suprimentos Custo de transação Gestão de risco Intenção de compras |
dc.subject.area.por.fl_str_mv |
Administração de empresas |
dc.subject.bibliodata.por.fl_str_mv |
Ação de contrafação Logística empresarial Administração de risco Custos de transação |
description |
The complexity of supply chains has been considered by companies as a new challenge for managers, since new risks are imputed in these relationships and threaten to cause disruptions. The globalization of suppliers has also increased the risk of counterfeit products entering all countries. In this way, companies feel contingent on taking proactive positions, creating strategies to mitigate and combat counterfeiting, or reactive, hoping to develop the necessary skills for this challenge. This study consists of three articles, which aim to analyze and explain counterfeiting as a risk to business in companies' supply chains. The first article aims to verify the discussions on counterfeiting published in the main international journals on the topics of Operations Management and Supply Chain Management. The article presents the main theories, practices and technologies related to counterfeiting discussed in recent years. From their results, propositions about new studies could be elaborated and collaborated with the next steps for a greater understanding of the topic of counterfeiting in supply chains. As a second step, article 2 sought to understand, through an experiment method, whether the intention to purchase products can be affected when there are risks of counterfeiting in their acquisition. In this research, eight scenarios were created that bring narratives aimed at assessing whether certain influences can modify the purchase intention of managers. The results suggest that the purchase intention is affected by the origin of the product and the risk of counterfeiting perceived by managers in business-to-business (B2B) relationships. In general, the proposed model expands the understanding of the theme. As a managerial contribution, it is noted that managers tend to make decisions after analyzing as much information or variables as possible, in addition to highlighting the importance of risk management in operations. Finally, article 3 set out to understand how a technology company acts in the fight against counterfeiting under the vision of the Transaction Costs Theory (TCT). Through a single case study, it was found that companies use corporate governance processes to combat counterfeiting. Confidentiality contracts, audits and purchasing policies are some ways for companies to guard against these fraudulent acts. Thus, the technologies used still focus on business management systems such as systemic controls on production batches. On the other hand, technologies such as radio frequency identification (RFID), blockchain, 3D printing, among others, still need greater adherence to the strategies of companies as support for their actions to combat counterfeiting. |
publishDate |
2020 |
dc.date.accessioned.fl_str_mv |
2020-11-19T18:59:00Z |
dc.date.available.fl_str_mv |
2020-11-19T18:59:00Z |
dc.date.issued.fl_str_mv |
2020-10-07 |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/doctoralThesis |
format |
doctoralThesis |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
https://hdl.handle.net/10438/29847 |
url |
https://hdl.handle.net/10438/29847 |
dc.language.iso.fl_str_mv |
por |
language |
por |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.source.none.fl_str_mv |
reponame:Repositório Institucional do FGV (FGV Repositório Digital) instname:Fundação Getulio Vargas (FGV) instacron:FGV |
instname_str |
Fundação Getulio Vargas (FGV) |
instacron_str |
FGV |
institution |
FGV |
reponame_str |
Repositório Institucional do FGV (FGV Repositório Digital) |
collection |
Repositório Institucional do FGV (FGV Repositório Digital) |
bitstream.url.fl_str_mv |
https://repositorio.fgv.br/bitstreams/3ba5362a-dfda-4215-b2bd-948be831af6d/download https://repositorio.fgv.br/bitstreams/4faeddd2-5718-4611-ba41-93b371ea7ee7/download https://repositorio.fgv.br/bitstreams/8ba9f70e-184d-40a7-a9d6-df27fd11e975/download https://repositorio.fgv.br/bitstreams/3f70b734-95af-4963-95d2-2d5e17242e75/download |
bitstream.checksum.fl_str_mv |
7f7db87933f17cc7619049099938ef60 dfb340242cced38a6cca06c627998fa1 b9c87f6572fa25ae98a1976f4b27564c 569ed21fa194ea34e098ae07459883bb |
bitstream.checksumAlgorithm.fl_str_mv |
MD5 MD5 MD5 MD5 |
repository.name.fl_str_mv |
Repositório Institucional do FGV (FGV Repositório Digital) - Fundação Getulio Vargas (FGV) |
repository.mail.fl_str_mv |
|
_version_ |
1813797727913377792 |