Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 5

Technical Writing and Presentation

Supervisory: Nguyen Hoang Nam

Student:
Nguyen Minh Tu - 20174317

1
I. Structure of the abstract

1. The background of the study


• “ With the increase of globalization in trading and online shopping, phony products are on the rise in
the market”
2. The thesis statement
• “ This article introduces a range of technologies that have been implemented in the supply chain to
deter counterfeiters”
3. The methodology
• “ Technology for both product authentication and tracing and tracking products in the supply chain
will be discussed, along with the advantages and disadvantages of each solution”
4. The findings
• “Finally, issues related to rising anti-counterfeing costs, collaborative efforts in fighting fakes, and a
multi-pronged plan are explored”

2
II. Literature review

1. Introductions

• With the increase of globalization in trading and online shopping, the amount of counterfeit
goods and fake products has skyrocketed.
• The monetary loss from counterfeit and piracy products is enormous.

Applying technology to Safeguarding authentic products and keeping companies from unfair
competition.

• This article introduces a range of technologies that have been implemented in the supply chain
to deter counterfeiters.

3
II. Literature review

2. Anti-counterfeiting technology

• The purpose of applying anti-counterfeiting • Technology for product authentication:


technology is to protect brand names, suppliers’ determine whether a product is in fact what it
reputations, and public safety. is declared to be.
 Example: Overt technology, Covert
• These technologies usually have four main technology.
features:
 Difficult to duplicate or forge. • Technology for tracing and tracking products:
 Easily identifiable visually without the follow products as they move through supply
need of special equipment. chain.
 Hard to re-label or reuse.  Example: electronic product codes (EPCs)
 Easily noticeable when tampered with. and radio frequency identification (RFID)
.
• All these technologies aim at detecting fake
products or deterring counterfeiting.
4
III. Evalution of Article

2. Anti-counterfeiting technology

You might also like