Coverart for item
The Resource Global brand integrity management : how to protect your product in today's competitive environment, Richard S. Post and Penelope N. Post

Global brand integrity management : how to protect your product in today's competitive environment, Richard S. Post and Penelope N. Post

Label
Global brand integrity management : how to protect your product in today's competitive environment
Title
Global brand integrity management
Title remainder
how to protect your product in today's competitive environment
Statement of responsibility
Richard S. Post and Penelope N. Post
Creator
Contributor
Subject
Language
eng
Cataloging source
DLC
http://library.link/vocab/creatorName
Post, Richard S
Dewey number
658.8/27
Illustrations
illustrations
Index
index present
LC call number
HD69.B7
LC item number
P68 2008
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
Post, Penelope N
http://library.link/vocab/subjectName
  • Brand name products
  • Trademark infringement
  • Product counterfeiting
  • Product management
Target audience
adult
Label
Global brand integrity management : how to protect your product in today's competitive environment, Richard S. Post and Penelope N. Post
Link
Instantiates
Publication
Copyright
Note
Includes index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • 15
  • 120
  • Supply Chain Components
  • 122
  • Restricted Shipments
  • 125
  • Checking the Deal
  • 126
  • Marketplace
  • 129
  • Understand Your Supply Chain
  • What's the Problem?
  • 133
  • Application of the Due Diligence Process
  • 136
  • Best Practices to Prevent Distribution-Related Problems
  • 142
  • Dashboard Questions
  • 143
  • Chapter 6
  • Protect Your Products, and the Bad Guys Will Attack Your Competition
  • 145
  • 22
  • How to Stop Attacks
  • 147
  • Get Ahead of the Risk
  • 151
  • Stages in Company Program Development
  • 157
  • How to Proceed
  • 159
  • Best Practices
  • 162
  • How Do We Fix It?
  • Dashboard Questions
  • 162
  • Chapter 7
  • Your Own Products Are Often Your Largest Competitors for Profits
  • 163
  • Do You Know the Risk?
  • 164
  • Gray Market Problems
  • 165
  • Differential Pricing
  • 24
  • 166
  • Differential Pricing-a Fact of Business
  • 176
  • C.O.P.E.
  • 180
  • Best Practices
  • 183
  • Dashboard Questions
  • 184
  • Chapter 8
  • What Questions Should You Ask about Brand Integrity?
  • Continually Monitor the Marketplace to Lower Risks and Increase Profits
  • 185
  • Know Your Markets
  • 186
  • Get Solid Marketplace Data
  • 188
  • Industry Group Initiatives
  • 191
  • Internal Staff Positions
  • 193
  • 27
  • Why Is It Necessary to Vet Companies?
  • 204
  • Why Is End-User Verification Necessary?
  • 204
  • Suspected Violations
  • 205
  • Best Practices for Product Channel Integrity Verification
  • 207
  • Dashboard Questions
  • 211
  • Chapter 2
  • Chapter 9
  • Brand Integrity as a Basic Management Tool
  • 213
  • Managing the BI Process
  • 213
  • Implementing Brand Integrity
  • 216
  • Strategic Use of Brand Integrity
  • 217
  • Suggested BI Responsibilities and Activities
  • Brand Integrity Is More Than Legal Protection
  • 218
  • Strategic Planning and Program Development
  • 221
  • Protecting Products in the Marketplace
  • 224
  • Product-Launch Readiness
  • 232
  • Corporate and Sector Policies
  • 234
  • Working Relationship
  • 29
  • 234
  • Risk Reviews and Development of a New BI Policy
  • 237
  • Delineation of the Corporate Role in BI
  • 239
  • Best Practices
  • 245
  • Dashboard Questions
  • 249
  • Chapter 10
  • Chapter 1
  • Organizing the Business
  • Setting Up and Managing a Brand Integrity Program
  • 251
  • Types of Programs
  • 252
  • Approaches to BI
  • 254
  • Current Models
  • 258
  • BI Program Models
  • 261
  • 29
  • BI Program Operations
  • 265
  • Best Practices
  • 279
  • Dashboard Questions
  • 279
  • Chapter 11
  • Questions the CEO Should Ask about BI Metrics
  • 281
  • Development of BI Performance Standards
  • Value of Brand Integrity
  • 282
  • Evaluate Results
  • 285
  • 32
  • Legal Controls for Brand Integrity
  • 33
  • How Much Does Brand Integrity Cost?
  • 42
  • Best Practices
  • 43
  • Rethinking the Business Model with Brand Integrity: An Organizing Concept
  • Dashboard Questions
  • 43
  • Chapter 3
  • If a Product Is Valuable, Somebody Will Try to Take Your Profits
  • 45
  • Key Concepts for the Implementation of Law No. 2
  • 45
  • A New Way of Thinking Is Required
  • 47
  • Know Your Enemy
  • 9
  • 51
  • How Are You Organized?
  • 54
  • Benefits to Your Company
  • 56
  • Link between Strategy and Brand Integrity
  • 57
  • Coordinate with Business Strategy across Functional Lines
  • 58
  • Benefits to Specific Management
  • Global Threats: Who's Interested in Your Brand?
  • 60
  • Confidence in Products
  • 62
  • Preventing Diversion of Licensed Technology
  • 66
  • Authenticity
  • 67
  • Uncontrolled Counterfeiting
  • 72
  • Patent and Trade Secret Protection
  • 11
  • 73
  • Gray Market Products and Product Diversion
  • 76
  • Shareholder Value
  • 81
  • Best Practices
  • 83
  • Dashboard Questions
  • 83
  • Chapter 4
  • Brand Integrity
  • If You Do Not Protect Your Products, Nobody Will Do It for You
  • 85
  • Types of Product Problems
  • 85
  • Why a Product Protection Program?
  • 87
  • Research and Development Operations
  • 89
  • Product Protection Environment
  • 90
  • 13
  • Building a Product Protection Program
  • 90
  • Global Brand Integrity Programs
  • 98
  • Research and Development
  • 99
  • Manufacturing
  • 106
  • Controlling Product Problems
  • 113
  • Information Protection
  • Best Practices to Lower Risks
  • 116
  • Best Practices to Prevent Manufacturing-Related Problems
  • 117
  • Dashboard Questions
  • 118
  • Chapter 5
  • If You Wait until Your Products Are Attacked, You Will Lose
  • 119
  • How to Know If You Are Being Attacked
Control code
ocm85814097
Dimensions
24 cm
Extent
xv, 309 pages
Isbn
9780071494441
Lccn
2007009029
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Note
658.827 P8452 ; P ; XX-N ; C-CR; C0712BT2.
Other physical details
illustrations
System control number
  • (Sirsi) 85814097
  • (Sirsi) 85814097
  • (OCoLC)85814097
Label
Global brand integrity management : how to protect your product in today's competitive environment, Richard S. Post and Penelope N. Post
Link
Publication
Copyright
Note
Includes index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • 15
  • 120
  • Supply Chain Components
  • 122
  • Restricted Shipments
  • 125
  • Checking the Deal
  • 126
  • Marketplace
  • 129
  • Understand Your Supply Chain
  • What's the Problem?
  • 133
  • Application of the Due Diligence Process
  • 136
  • Best Practices to Prevent Distribution-Related Problems
  • 142
  • Dashboard Questions
  • 143
  • Chapter 6
  • Protect Your Products, and the Bad Guys Will Attack Your Competition
  • 145
  • 22
  • How to Stop Attacks
  • 147
  • Get Ahead of the Risk
  • 151
  • Stages in Company Program Development
  • 157
  • How to Proceed
  • 159
  • Best Practices
  • 162
  • How Do We Fix It?
  • Dashboard Questions
  • 162
  • Chapter 7
  • Your Own Products Are Often Your Largest Competitors for Profits
  • 163
  • Do You Know the Risk?
  • 164
  • Gray Market Problems
  • 165
  • Differential Pricing
  • 24
  • 166
  • Differential Pricing-a Fact of Business
  • 176
  • C.O.P.E.
  • 180
  • Best Practices
  • 183
  • Dashboard Questions
  • 184
  • Chapter 8
  • What Questions Should You Ask about Brand Integrity?
  • Continually Monitor the Marketplace to Lower Risks and Increase Profits
  • 185
  • Know Your Markets
  • 186
  • Get Solid Marketplace Data
  • 188
  • Industry Group Initiatives
  • 191
  • Internal Staff Positions
  • 193
  • 27
  • Why Is It Necessary to Vet Companies?
  • 204
  • Why Is End-User Verification Necessary?
  • 204
  • Suspected Violations
  • 205
  • Best Practices for Product Channel Integrity Verification
  • 207
  • Dashboard Questions
  • 211
  • Chapter 2
  • Chapter 9
  • Brand Integrity as a Basic Management Tool
  • 213
  • Managing the BI Process
  • 213
  • Implementing Brand Integrity
  • 216
  • Strategic Use of Brand Integrity
  • 217
  • Suggested BI Responsibilities and Activities
  • Brand Integrity Is More Than Legal Protection
  • 218
  • Strategic Planning and Program Development
  • 221
  • Protecting Products in the Marketplace
  • 224
  • Product-Launch Readiness
  • 232
  • Corporate and Sector Policies
  • 234
  • Working Relationship
  • 29
  • 234
  • Risk Reviews and Development of a New BI Policy
  • 237
  • Delineation of the Corporate Role in BI
  • 239
  • Best Practices
  • 245
  • Dashboard Questions
  • 249
  • Chapter 10
  • Chapter 1
  • Organizing the Business
  • Setting Up and Managing a Brand Integrity Program
  • 251
  • Types of Programs
  • 252
  • Approaches to BI
  • 254
  • Current Models
  • 258
  • BI Program Models
  • 261
  • 29
  • BI Program Operations
  • 265
  • Best Practices
  • 279
  • Dashboard Questions
  • 279
  • Chapter 11
  • Questions the CEO Should Ask about BI Metrics
  • 281
  • Development of BI Performance Standards
  • Value of Brand Integrity
  • 282
  • Evaluate Results
  • 285
  • 32
  • Legal Controls for Brand Integrity
  • 33
  • How Much Does Brand Integrity Cost?
  • 42
  • Best Practices
  • 43
  • Rethinking the Business Model with Brand Integrity: An Organizing Concept
  • Dashboard Questions
  • 43
  • Chapter 3
  • If a Product Is Valuable, Somebody Will Try to Take Your Profits
  • 45
  • Key Concepts for the Implementation of Law No. 2
  • 45
  • A New Way of Thinking Is Required
  • 47
  • Know Your Enemy
  • 9
  • 51
  • How Are You Organized?
  • 54
  • Benefits to Your Company
  • 56
  • Link between Strategy and Brand Integrity
  • 57
  • Coordinate with Business Strategy across Functional Lines
  • 58
  • Benefits to Specific Management
  • Global Threats: Who's Interested in Your Brand?
  • 60
  • Confidence in Products
  • 62
  • Preventing Diversion of Licensed Technology
  • 66
  • Authenticity
  • 67
  • Uncontrolled Counterfeiting
  • 72
  • Patent and Trade Secret Protection
  • 11
  • 73
  • Gray Market Products and Product Diversion
  • 76
  • Shareholder Value
  • 81
  • Best Practices
  • 83
  • Dashboard Questions
  • 83
  • Chapter 4
  • Brand Integrity
  • If You Do Not Protect Your Products, Nobody Will Do It for You
  • 85
  • Types of Product Problems
  • 85
  • Why a Product Protection Program?
  • 87
  • Research and Development Operations
  • 89
  • Product Protection Environment
  • 90
  • 13
  • Building a Product Protection Program
  • 90
  • Global Brand Integrity Programs
  • 98
  • Research and Development
  • 99
  • Manufacturing
  • 106
  • Controlling Product Problems
  • 113
  • Information Protection
  • Best Practices to Lower Risks
  • 116
  • Best Practices to Prevent Manufacturing-Related Problems
  • 117
  • Dashboard Questions
  • 118
  • Chapter 5
  • If You Wait until Your Products Are Attacked, You Will Lose
  • 119
  • How to Know If You Are Being Attacked
Control code
ocm85814097
Dimensions
24 cm
Extent
xv, 309 pages
Isbn
9780071494441
Lccn
2007009029
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Note
658.827 P8452 ; P ; XX-N ; C-CR; C0712BT2.
Other physical details
illustrations
System control number
  • (Sirsi) 85814097
  • (Sirsi) 85814097
  • (OCoLC)85814097

Library Locations

    • South Independence BranchBorrow it
      13700 E. 35th St., Independence, MO, 64055 , US
      39.05803 -94.41822
Processing Feedback ...