Contrafação nas cadeias de suprimentos: um risco para os negócios

Detalhes bibliográficos
Autor(a) principal: Luna, Roger Augusto
Data de Publicação: 2020
Tipo de documento: Tese
Idioma: por
Título da fonte: Repositório Institucional do FGV (FGV Repositório Digital)
Texto Completo: https://hdl.handle.net/10438/29847
Resumo: The complexity of supply chains has been considered by companies as a new challenge for managers, since new risks are imputed in these relationships and threaten to cause disruptions. The globalization of suppliers has also increased the risk of counterfeit products entering all countries. In this way, companies feel contingent on taking proactive positions, creating strategies to mitigate and combat counterfeiting, or reactive, hoping to develop the necessary skills for this challenge. This study consists of three articles, which aim to analyze and explain counterfeiting as a risk to business in companies' supply chains. The first article aims to verify the discussions on counterfeiting published in the main international journals on the topics of Operations Management and Supply Chain Management. The article presents the main theories, practices and technologies related to counterfeiting discussed in recent years. From their results, propositions about new studies could be elaborated and collaborated with the next steps for a greater understanding of the topic of counterfeiting in supply chains. As a second step, article 2 sought to understand, through an experiment method, whether the intention to purchase products can be affected when there are risks of counterfeiting in their acquisition. In this research, eight scenarios were created that bring narratives aimed at assessing whether certain influences can modify the purchase intention of managers. The results suggest that the purchase intention is affected by the origin of the product and the risk of counterfeiting perceived by managers in business-to-business (B2B) relationships. In general, the proposed model expands the understanding of the theme. As a managerial contribution, it is noted that managers tend to make decisions after analyzing as much information or variables as possible, in addition to highlighting the importance of risk management in operations. Finally, article 3 set out to understand how a technology company acts in the fight against counterfeiting under the vision of the Transaction Costs Theory (TCT). Through a single case study, it was found that companies use corporate governance processes to combat counterfeiting. Confidentiality contracts, audits and purchasing policies are some ways for companies to guard against these fraudulent acts. Thus, the technologies used still focus on business management systems such as systemic controls on production batches. On the other hand, technologies such as radio frequency identification (RFID), blockchain, 3D printing, among others, still need greater adherence to the strategies of companies as support for their actions to combat counterfeiting.
id FGV_84eee2c876c738f28e327a85ba169c0f
oai_identifier_str oai:repositorio.fgv.br:10438/29847
network_acronym_str FGV
network_name_str Repositório Institucional do FGV (FGV Repositório Digital)
repository_id_str 3974
spelling Luna, Roger AugustoEscolasBotelho, DelaneSilva, Andrea LagoSilva, Eliciane MariaPaiva, Ely Laureano2020-11-19T18:59:00Z2020-11-19T18:59:00Z2020-10-07https://hdl.handle.net/10438/29847The complexity of supply chains has been considered by companies as a new challenge for managers, since new risks are imputed in these relationships and threaten to cause disruptions. The globalization of suppliers has also increased the risk of counterfeit products entering all countries. In this way, companies feel contingent on taking proactive positions, creating strategies to mitigate and combat counterfeiting, or reactive, hoping to develop the necessary skills for this challenge. This study consists of three articles, which aim to analyze and explain counterfeiting as a risk to business in companies' supply chains. The first article aims to verify the discussions on counterfeiting published in the main international journals on the topics of Operations Management and Supply Chain Management. The article presents the main theories, practices and technologies related to counterfeiting discussed in recent years. From their results, propositions about new studies could be elaborated and collaborated with the next steps for a greater understanding of the topic of counterfeiting in supply chains. As a second step, article 2 sought to understand, through an experiment method, whether the intention to purchase products can be affected when there are risks of counterfeiting in their acquisition. In this research, eight scenarios were created that bring narratives aimed at assessing whether certain influences can modify the purchase intention of managers. The results suggest that the purchase intention is affected by the origin of the product and the risk of counterfeiting perceived by managers in business-to-business (B2B) relationships. In general, the proposed model expands the understanding of the theme. As a managerial contribution, it is noted that managers tend to make decisions after analyzing as much information or variables as possible, in addition to highlighting the importance of risk management in operations. Finally, article 3 set out to understand how a technology company acts in the fight against counterfeiting under the vision of the Transaction Costs Theory (TCT). Through a single case study, it was found that companies use corporate governance processes to combat counterfeiting. Confidentiality contracts, audits and purchasing policies are some ways for companies to guard against these fraudulent acts. Thus, the technologies used still focus on business management systems such as systemic controls on production batches. On the other hand, technologies such as radio frequency identification (RFID), blockchain, 3D printing, among others, still need greater adherence to the strategies of companies as support for their actions to combat counterfeiting.A complexidade das cadeias de suprimentos tem sido considerada pelas empresas como um novo desafio para os gestores, já que novos riscos são imputados nessas relações e ameaçam causar rupturas. A globalização dos fornecedores também aumentou o risco de entrada de produtos contrafeitos em todos os países. Deste modo, as empresas se sentem na contingência de assumir posições proativas, criando estratégias de mitigação e combate à contrafação, ou reativas, esperando desenvolver competências necessárias para este desafio. Este estudo é composto por três artigos, que têm por objetivo analisar e explicar a contrafação como um risco para os negócios nas cadeias de suprimentos das empresas. O primeiro artigo tem o objetivo de verificar as discussões sobre a contrafação publicadas nos principais periódicos internacionais relativos aos temas Gestão de Operações e Supply Chain Management. O artigo apresenta as principais teorias, práticas e tecnologias relacionadas à contrafação discutidas nos últimos anos. A partir de seus resultados, proposições sobre novos estudos puderam ser elaboradas e colaboraram com os próximos passos para uma maior compreensão do tema da contrafação nas cadeias de suprimentos. Como segundo passo, o artigo 2 buscou compreender, por meio de um método de experimento, se a intenção de compra de produtos pode ser afetada quando existem riscos de contrafação na sua aquisição. Nesta pesquisa, foram criados oito cenários que trazem narrativas destinadas a avaliar se determinadas influências podem modificar a intenção de compra de gestores. Os resultados sugerem que a intenção de compra é afetada pela origem do produto e pelo risco de contrafação percebido por gestores em relações business-to-business (B2B). De maneira geral, o modelo proposto expande a compreensão sobre o tema. Como contribuição gerencial, nota-se que os gestores tendem a tomar decisões após analisar o maior volume possível de informações ou variáveis, além de ressaltar a importância da gestão de risco nas operações. Por fim, o artigo 3 se propôs a compreender como uma empresa de tecnologia atua no combate à contrafação sob a visão da Teoria dos Custos de Transação (TCT). Por meio de um estudo de caso único, constatou-se que as empresas utilizam processos de governança corporativa no combate à contrafação. Contratos de confidencialidade, auditorias e políticas de compras são algumas formas de as empresas se resguardarem desses atos fraudulentos. Assim, as tecnologias utilizadas ainda se concentram em sistemas de gestão empresarial como controles sistêmicos de lotes de produção. Por outro lado, tecnologias como radio frequency identification (RFID), blockchain, impressão 3D, dentre outras, necessitam ainda de maior aderência às estratégias das empresas como suportes às suas ações de combate à contrafação.porCounterfeitingSupply chainTransaction costsRisk managementPurchase intentionContrafaçãoCadeia de suprimentosCusto de transaçãoGestão de riscoIntenção de comprasAdministração de empresasAção de contrafaçãoLogística empresarialAdministração de riscoCustos de transaçãoContrafação nas cadeias de suprimentos: um risco para os negóciosinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/doctoralThesisinfo:eu-repo/semantics/openAccessreponame:Repositório Institucional do FGV (FGV Repositório Digital)instname:Fundação Getulio Vargas (FGV)instacron:FGVORIGINALTese roger luna.pdfTese roger luna.pdfPDFapplication/pdf1860180https://repositorio.fgv.br/bitstreams/3ba5362a-dfda-4215-b2bd-948be831af6d/download7f7db87933f17cc7619049099938ef60MD51LICENSElicense.txtlicense.txttext/plain; charset=utf-84707https://repositorio.fgv.br/bitstreams/4faeddd2-5718-4611-ba41-93b371ea7ee7/downloaddfb340242cced38a6cca06c627998fa1MD52TEXTTese roger luna.pdf.txtTese roger luna.pdf.txtExtracted texttext/plain101446https://repositorio.fgv.br/bitstreams/8ba9f70e-184d-40a7-a9d6-df27fd11e975/downloadb9c87f6572fa25ae98a1976f4b27564cMD55THUMBNAILTese roger luna.pdf.jpgTese roger luna.pdf.jpgGenerated Thumbnailimage/jpeg2458https://repositorio.fgv.br/bitstreams/3f70b734-95af-4963-95d2-2d5e17242e75/download569ed21fa194ea34e098ae07459883bbMD5610438/298472024-10-08 13:55:29.82open.accessoai:repositorio.fgv.br:10438/29847https://repositorio.fgv.brRepositório InstitucionalPRIhttp://bibliotecadigital.fgv.br/dspace-oai/requestopendoar:39742024-10-08T13:55:29Repositório Institucional do FGV (FGV Repositório Digital) - Fundação Getulio Vargas (FGV)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
dc.title.por.fl_str_mv Contrafação nas cadeias de suprimentos: um risco para os negócios
title Contrafação nas cadeias de suprimentos: um risco para os negócios
spellingShingle Contrafação nas cadeias de suprimentos: um risco para os negócios
Luna, Roger Augusto
Counterfeiting
Supply chain
Transaction costs
Risk management
Purchase intention
Contrafação
Cadeia de suprimentos
Custo de transação
Gestão de risco
Intenção de compras
Administração de empresas
Ação de contrafação
Logística empresarial
Administração de risco
Custos de transação
title_short Contrafação nas cadeias de suprimentos: um risco para os negócios
title_full Contrafação nas cadeias de suprimentos: um risco para os negócios
title_fullStr Contrafação nas cadeias de suprimentos: um risco para os negócios
title_full_unstemmed Contrafação nas cadeias de suprimentos: um risco para os negócios
title_sort Contrafação nas cadeias de suprimentos: um risco para os negócios
author Luna, Roger Augusto
author_facet Luna, Roger Augusto
author_role author
dc.contributor.unidadefgv.por.fl_str_mv Escolas
dc.contributor.member.none.fl_str_mv Botelho, Delane
Silva, Andrea Lago
Silva, Eliciane Maria
dc.contributor.author.fl_str_mv Luna, Roger Augusto
dc.contributor.advisor1.fl_str_mv Paiva, Ely Laureano
contributor_str_mv Paiva, Ely Laureano
dc.subject.eng.fl_str_mv Counterfeiting
Supply chain
Transaction costs
Risk management
Purchase intention
topic Counterfeiting
Supply chain
Transaction costs
Risk management
Purchase intention
Contrafação
Cadeia de suprimentos
Custo de transação
Gestão de risco
Intenção de compras
Administração de empresas
Ação de contrafação
Logística empresarial
Administração de risco
Custos de transação
dc.subject.por.fl_str_mv Contrafação
Cadeia de suprimentos
Custo de transação
Gestão de risco
Intenção de compras
dc.subject.area.por.fl_str_mv Administração de empresas
dc.subject.bibliodata.por.fl_str_mv Ação de contrafação
Logística empresarial
Administração de risco
Custos de transação
description The complexity of supply chains has been considered by companies as a new challenge for managers, since new risks are imputed in these relationships and threaten to cause disruptions. The globalization of suppliers has also increased the risk of counterfeit products entering all countries. In this way, companies feel contingent on taking proactive positions, creating strategies to mitigate and combat counterfeiting, or reactive, hoping to develop the necessary skills for this challenge. This study consists of three articles, which aim to analyze and explain counterfeiting as a risk to business in companies' supply chains. The first article aims to verify the discussions on counterfeiting published in the main international journals on the topics of Operations Management and Supply Chain Management. The article presents the main theories, practices and technologies related to counterfeiting discussed in recent years. From their results, propositions about new studies could be elaborated and collaborated with the next steps for a greater understanding of the topic of counterfeiting in supply chains. As a second step, article 2 sought to understand, through an experiment method, whether the intention to purchase products can be affected when there are risks of counterfeiting in their acquisition. In this research, eight scenarios were created that bring narratives aimed at assessing whether certain influences can modify the purchase intention of managers. The results suggest that the purchase intention is affected by the origin of the product and the risk of counterfeiting perceived by managers in business-to-business (B2B) relationships. In general, the proposed model expands the understanding of the theme. As a managerial contribution, it is noted that managers tend to make decisions after analyzing as much information or variables as possible, in addition to highlighting the importance of risk management in operations. Finally, article 3 set out to understand how a technology company acts in the fight against counterfeiting under the vision of the Transaction Costs Theory (TCT). Through a single case study, it was found that companies use corporate governance processes to combat counterfeiting. Confidentiality contracts, audits and purchasing policies are some ways for companies to guard against these fraudulent acts. Thus, the technologies used still focus on business management systems such as systemic controls on production batches. On the other hand, technologies such as radio frequency identification (RFID), blockchain, 3D printing, among others, still need greater adherence to the strategies of companies as support for their actions to combat counterfeiting.
publishDate 2020
dc.date.accessioned.fl_str_mv 2020-11-19T18:59:00Z
dc.date.available.fl_str_mv 2020-11-19T18:59:00Z
dc.date.issued.fl_str_mv 2020-10-07
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/doctoralThesis
format doctoralThesis
status_str publishedVersion
dc.identifier.uri.fl_str_mv https://hdl.handle.net/10438/29847
url https://hdl.handle.net/10438/29847
dc.language.iso.fl_str_mv por
language por
dc.rights.driver.fl_str_mv info:eu-repo/semantics/openAccess
eu_rights_str_mv openAccess
dc.source.none.fl_str_mv reponame:Repositório Institucional do FGV (FGV Repositório Digital)
instname:Fundação Getulio Vargas (FGV)
instacron:FGV
instname_str Fundação Getulio Vargas (FGV)
instacron_str FGV
institution FGV
reponame_str Repositório Institucional do FGV (FGV Repositório Digital)
collection Repositório Institucional do FGV (FGV Repositório Digital)
bitstream.url.fl_str_mv https://repositorio.fgv.br/bitstreams/3ba5362a-dfda-4215-b2bd-948be831af6d/download
https://repositorio.fgv.br/bitstreams/4faeddd2-5718-4611-ba41-93b371ea7ee7/download
https://repositorio.fgv.br/bitstreams/8ba9f70e-184d-40a7-a9d6-df27fd11e975/download
https://repositorio.fgv.br/bitstreams/3f70b734-95af-4963-95d2-2d5e17242e75/download
bitstream.checksum.fl_str_mv 7f7db87933f17cc7619049099938ef60
dfb340242cced38a6cca06c627998fa1
b9c87f6572fa25ae98a1976f4b27564c
569ed21fa194ea34e098ae07459883bb
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositório Institucional do FGV (FGV Repositório Digital) - Fundação Getulio Vargas (FGV)
repository.mail.fl_str_mv
_version_ 1813797727913377792