[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Authentication of Luxury Products – Identifying Key Requirements from a Seller and Consumer Perspective

  • Conference paper
  • First Online:
Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications (FDSE 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1688))

Included in the following conference series:

Abstract

Luxury products are expensive goods of high quality that are produced in limited quantities. Unsurprisingly, the problem of counterfeiting is especially high for such products, causing various issues for sellers and consumers. Therefore, product authentication represents an important endeavor. While traditional approaches such as expert-based product authentication are reliable but expensive, consumer-based approaches are cheaper but significantly more error-prone. Hence, the development of efficient approaches that also consider the advantages of modern technologies, such as e.g., blockchains, provide a high potential for improving the status-quo. The current paper applies a mixed-method approach and reports about a quantitative survey in combination with expert interviews to identify the main requirements and preferences from consumer and seller perspective. Results show that the knowledge of authentication methods is unevenly distributed between experts and consumers. While both consumers and experts are aware of traditional, serial number-based approaches, blockchain-enabled ways of product authentication are only known by experts. However, both groups tend to prefer digital ways of authentication and agree that sellers, followed by producers, and lastly consumers are responsible for ensuring authentic products. Consumers desire many additional features for product authentication than experts. Most desired features include tracking the sales history via e.g., the blockchain or online directories, the traceability of ownership, or the possibility to conduct home tests for consumers. The results of the paper provide researchers and practitioners with a requirement base for developing novel authentication approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 39.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 49.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Sharma, A., Soni, M., Borah, S.B., Haque, T.: From silos to synergies: a systematic review of luxury in marketing research. J. Bus. Res. 139, 893–907 (2022). https://doi.org/10.1016/j.jbusres.2021.09.007

    Article  Google Scholar 

  2. Singh, D.P., Kastanakis, M.N., Paul, J., Felix, R.: Non-deceptive counterfeit purchase behavior of luxury fashion products. J. Consum. Behav 20, 1078–1091 (2021). https://doi.org/10.1002/cb.1917

    Article  Google Scholar 

  3. Ting, S.L., Tsang, A.H.C.: A two-factor authentication system using radio frequency identification and watermarking technology. Comput. Ind. 64, 268–279 (2013). https://doi.org/10.1016/j.compind.2012.11.002

    Article  Google Scholar 

  4. Ma, T., Zhang, H., Qian, J., Liu, S., Zhang, X., Ma, X.: The design of brand cosmetics anti-counterfeiting system based on RFID technology. In: 2015 International Conference on Network and Information Systems for Computers, pp. 184–189. IEEE (2015). https://doi.org/10.1109/ICNISC.2015.36

  5. Rana, A., Ciardulli, A.: Enabling consumers to self-verify authenticity of products. In: The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), pp. 254–255. IEEE (2014). https://doi.org/10.1109/ICITST.2014.7038816

  6. de Boissieu, E., Kondrateva, G., Baudier, P., Ammi, C.: The use of blockchain in the luxury industry: supply chains and the traceability of goods. J. Enterp. Inform. Mange. 34, 1318–1338 (2021). https://doi.org/10.1108/JEIM-11-2020-0471

    Article  Google Scholar 

  7. Brocke, J.v., Simons, A., Niehaves, B., Reimer, K.: Reconstructing the giant. on the importance of rigour in documenting the literature search process. In: ECIS 2009 Proceedings, vol. 161 (2009)

    Google Scholar 

  8. Peng, J., Zou, B., Zhu, C.: Combining external attention GAN with deep convolutional neural networks for real–fake identification of luxury handbags. Vis. Comput. 26, 357 (2021). https://doi.org/10.1007/s00371-021-02378-x

    Article  Google Scholar 

  9. Larin, A.O., et al.: Luminescent erbium‐doped silicon thin films for advanced anti‐counterfeit labels. Adv. Mater. 33(16), 2005886 (2021). https://doi.org/10.1002/adma.202005886

    Article  Google Scholar 

  10. Li, G., Fan, Z.-P., Wu, X.-Y.: The choice strategy of authentication technology for luxury e-commerce platforms in the Blockchain Era. IEEE Trans. Eng. Manag. 1–14 (2022). https://doi.org/10.1109/TEM.2021.3076606

  11. Amaral, N.B.: What can be done to address luxury counterfeiting? an integrative review of tactics and strategies. J. Brand Manag. 27, 691–709 (2020). https://doi.org/10.1057/s41262-020-00206-6

    Article  Google Scholar 

  12. Juma, H., Shaalan, K., Kamel, I.: Customs-based blockchain solution for exportation protection. In: Shen, H., Sang, Y. (eds.) PAAP 2019. CCIS, vol. 1163, pp. 405–416. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-2767-8_36

    Chapter  Google Scholar 

  13. Wabeke, T., Moura, G.C.M., Franken, N., Hesselman, C.: Counterfighting counterfeit: detecting and taking down fraudulent webshops at a ccTLD. In: Sperotto, A., Dainotti, A., Stiller, B. (eds.) PAM 2020. LNCS, vol. 12048, pp. 158–174. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-44081-7_10

    Chapter  Google Scholar 

  14. Chia-Yu, W., Shin-Fu, S., Sheng-Ming, W.: Applying block-chain technology for commodity authenticity. In: 2019 IEEE International Conference on Consumer Electronics – Taiwan (ICCE-TW), pp. 1–2. IEEE (2019). https://doi.org/10.1109/ICCE-TW46550.2019.8991933

  15. Wlodarczyk, K.L., Ardron, M., Weston, N.J., Hand, D.P.: Holographic watermarks and steganographic markings for combating the counterfeiting practices of high-value metal products. J. Mater. Process. Technol. 264, 328–335 (2019). https://doi.org/10.1016/j.jmatprotec.2018.09.020

    Article  Google Scholar 

  16. Randhawa, P., Calantone, R.J., Voorhees, C.M.: The pursuit of counterfeited luxury: an examination of the negative side effects of close consumer–brand connections. J. Bus. Res. 68, 2395–2403 (2015). https://doi.org/10.1016/j.jbusres.2015.02.022

    Article  Google Scholar 

  17. Wilson, J.M., Fenoff, R.: Distinguishing counterfeit from authentic product retailers in the virtual marketplace. Int. Crim. Justice Rev. 24, 39–58 (2014). https://doi.org/10.1177/1057567714527390

    Article  Google Scholar 

  18. Kaplan, B., Duchon, D.: Combining qualitative and quantitative methods in information systems research: a case study. MIS Quart. 12, 571–586 (1988)

    Article  Google Scholar 

  19. Brandtner, P.: Design and evaluation of a process model for the early stages of product innovation. In: New Waves in Innovation Management Research-Ispim Insights: Series in Innovation Studies, pp. 149–162 (2017)

    Google Scholar 

  20. Venkatesh, V., Brown, S.A., Bala, H.: Bridging the qualitative-quantitative divide: guidelines for conducting mixed methods research in information systems. MIS Quart. 37, 21–54 (2013). https://doi.org/10.25300/MISQ/2013/37.1.02

    Article  Google Scholar 

  21. Brandtner, P., Helfert, M.: Multi-media and web-based evaluation of design artifacts-syntactic, semantic and pragmatic quality of process models. Syst., Signs Actions: An Int. J. Inform. Technol., Action, Commun. Workpractices 11, 54–78 (2018)

    Google Scholar 

  22. Andreas, A., Patrick, B., Petra, G., Andreas, H.: Search engine optimization meets e-business – a theory-based evaluation: findability and usability as key success factors. In: Proceedings of the International Conference on Data Communication Networking, e-Business and Optical Communication Systems, pp. 237–250 (2012)

    Google Scholar 

  23. Udokwu, C., Darbanian, F., Falatouri, T.N., Brandtner, P.: Evaluating technique for capturing customer satisfaction data in retail supply chain. In: 2020 The 4th International Conference on E-commerce, E-Business and E-Government, pp. 89–95. ACM, New York, NY, USA (2020). https://doi.org/10.1145/3409929.3414743

  24. Brandtner, P., Udokwu, C., Darbanian, F., Falatouri, T.: Applications of big data analytics in supply chain management: findings from expert interviews. In: 2021 The 4th International Conference on Computers in Management and Business, pp. 77–82. ACM, New York, NY, USA (2021)

    Google Scholar 

  25. Döringer, S.: ‘The problem-centred expert interview’. Combining qualitative interviewing approaches for investigating implicit expert knowledge. Int. J. Soc. Res. Methodol. 24(3), 265–278 (2020). https://doi.org/10.1080/13645579.2020.1766777

    Article  Google Scholar 

  26. Kellermayr-Scheucher, M., Hörandner, L., Brandtner, P.: Digitalization at the point-of-sale in grocery retail - state of the art of smart shelf technology and application scenarios. Procedia Comput. Sci. 196, 77–84 (2022). https://doi.org/10.1016/j.procs.2021.11.075

    Article  Google Scholar 

  27. Kurz, A., Stockhammer, C., Fuchs, S., Meinhard, D.: Das problemzentrierte interview. In: Buber, R., Holzmüller, H.H. (eds.) Qualitative Marktforschung, pp. 463–475. Gabler, Wiesbaden (2007). https://doi.org/10.1007/978-3-8349-9258-1_29

    Chapter  Google Scholar 

  28. Brandtner, P., Mates, M.: Artificial intelligence in strategic foresight – current practices and future application potentials. In: Proceedings of the 2021 12th International Conference on E-business, Management and Economics (ICEME 2021), pp. 75–81 (2021)

    Google Scholar 

  29. Albers, S., Klapper, D., Konradt, U., Walter, A., Wolf, J. (eds.): Methodik der empirischen Forschung. Gabler Verlag, Wiesbaden (2009). https://doi.org/10.1007/978-3-322-96406-9

    Book  Google Scholar 

  30. Clickworker.Com: Our Clickworker community (2022). https://www.clickworker.com/clickworker-crowd/

  31. Mayring, P., et al.: Qualitative content analysis. A companion to qualitative research, vol. 1, pp. 159–176 (2004)

    Google Scholar 

  32. Markengesetz - § 143. MarkenG (2021)

    Google Scholar 

  33. Colicev, A.: How can non-fungible tokens bring value to brands. Int. J. Res. Mark. 78, 120 (2022). https://doi.org/10.1016/j.ijresmar.2022.07.003

    Article  Google Scholar 

  34. Thompson, S.: The preservation of digital signatures on the blockchain. See Also 2017(3), (2017). https://doi.org/10.14288/sa.v0i3.188841

  35. Norta, A., Kormiltsyn, A., Udokwu, U., Dwivedi, V., Aroh, S., Nikolajev, I. (eds.) A Blockchain Implementation for Configurable Multi-Factor Challenge-Set Self-Sovereign Identity Authentication. Zenodo (2022). https://doi.org/10.5281/zenodo.6810583

  36. Leiding, B., Cap, C.H., Mundt, T., Rashidibajgan, S.: Authcoin: Validation and Authentication in Decentralized Networks. arXiv:1609.04955 [cs.CR] (2016)

    Google Scholar 

  37. Chen, Y., Bellavitis, C.: Blockchain disruption and decentralized finance: the rise of decentralized business models. J. Bus. Ventur. Insights 13, e00151 (2020). https://doi.org/10.1016/j.jbvi.2019.e00151

    Article  Google Scholar 

  38. Udokwu, C., Kormiltsyn, A., Thangalimodzi, K., Norta, A.: The state of the art for Blockchain-enabled smart-contract applications in the organization. In: 2018 Ivannikov Ispras Open Conference (ISPRAS), pp. 137–144. IEEE (2018). https://doi.org/10.1109/ISPRAS.2018.00029

  39. Flyvbjerg, B.: Five misunderstandings about case-study research. Qual. Inq. 12, 219–245 (2006). https://doi.org/10.1177/1077800405284363

    Article  Google Scholar 

Download references

Acknowledgement

This research is partly sponsored by Robonomics Grant Program and the Government of Upper Austria as part of the excellence network for logistics Logistikum.Retail.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert Zimmermann .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zimmermann, R., Udokwu, C., Kompp, R., Brandtner, P., Norta, A. (2022). Authentication of Luxury Products – Identifying Key Requirements from a Seller and Consumer Perspective. In: Dang, T.K., Küng, J., Chung, T.M. (eds) Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications. FDSE 2022. Communications in Computer and Information Science, vol 1688. Springer, Singapore. https://doi.org/10.1007/978-981-19-8069-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-8069-5_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-8068-8

  • Online ISBN: 978-981-19-8069-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics