Technology and Security: Countering Criminal Infiltrations in the Legitimate Supply Chain

Page 84

2.4 Examples of technology targeting e-commerce fraud

Step 5 – Building a parallel market for catering food supplies targeting small shops.

The same considerations described in step 3 apply to this step.

Step 6 – Distortion of competition.

Scenario 3: E-commerce: criminal infiltration of online supermarket chains for home delivery of fake food Step 1 – Control of legitimate e-operators. Step 2 – Selling fraudulent food as genuine through the controlled e-supermarkets.

The technology will be able to analyse the marketed products and determine if they are fraudulent, of low quality and whether they do not originate from the correct geographical location.

Step 3 – Expansion of e-commerce market through the creation of a Super E-food app. Step 4 – Creation of dedicated social network groups/ pages to sell fraudulent products to final customers.

2.4 Examples of technology targeting e-commerce fraud Technology option for e-commerce 1 The technology solution uses artificial intelligence to detect fraudulent product reviews and third-party sellers. Fraudulent reviews are used by sellers of counterfeit goods to create a false public image of consumer trust and exploit the fact that online consumers frequently use existing reviews as a reference point to base their purchases on, making them an important factor to consider in order to increase sales and consumer trust. Through the use of big data analytics and artificial intelligence, this technology option can identify fraudulent reviews supporting the selling of counterfeit products online. The solution consists in an online analyser bar where consumers can introduce the web address of a website in which the product they are interested in is being advertised. Another option is to install a browser extension in order to have a real-time analysis. As a result of the analysis, the technology displays relevant information related to the product, including: 1) A review grade that compares the review displayed on the website or app with the one generated by the analyser, 2) Highlights on the product (quality, packaging, competitiveness), its overview (reliability, deception level, total number of reviews), details about the reviews, insights, and review count and price graphs. In addition to the online analyser bar and the browser extension, the technology also gives consumers the possibility of downloading an app to perform the same check on a smartphone. This is a customer-centric solution that helps individuals to identify fraudulent products and providers through the detection of faults in the algorithms of the marketplace platforms, thus highlighting false reviews or suspicious low prices that can be the symptoms of counterfeit products and fraudulent sellers. Technology developed by Fakespot

83


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

3.2 Technology solutions to address the risk scenarios

4hr
pages 95-195

3.1 Risk scenarios

6min
pages 93-94

2.5 Conclusions

15min
pages 88-92

2.3.5 Fourier Transform InfraRed (FTIR) spectroscopy, Optical- Photothermal InfraRed (O-PTIR) spectroscopy and X-ray Fluorescence spectroscopy (XRF

9min
pages 80-83

2.3.4 Using ion beam analytical techniques

6min
pages 77-79

2.4 Examples of technology targeting e-commerce fraud

10min
pages 84-87

2.3.3 Iso-elemental fingerprinting techniques

9min
pages 73-76

2.3.2 Accelerator Mass Spectrometry

8min
pages 69-72

2.2.6 Focus on authenticating, tracking and tracing ingredients

17min
pages 55-60

2.3 Nuclear and other analytical techniques

4min
pages 61-62

2.3.1 Focus on portable devices

14min
pages 63-68

2.2.5 Innovative marking methods and satellite integration

17min
pages 49-54

2.2.4 DNA ID, mass balance products’ flow reconciliation and satellite integration

17min
pages 43-48

2.2.2 Using metameric inks

10min
pages 33-36

2.2.3 Focus on labels – the “all in one label

15min
pages 37-42

2.2.1 Product authentication and track and trace: unique visual identity

14min
pages 27-32

b) Forensics

5min
pages 18-21

2.2 Supply Chain Security Solutions to address the risk scenarios

9min
pages 24-26

2.1 Risk scenarios

6min
pages 22-23

1.2 An introduction to the evolution of technology solutions for securing the products’ supply chain

5min
pages 11-12
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.