Peggy E. Chaudhry
Villanova University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Peggy E. Chaudhry.
The Columbia Journal of World Business | 1996
Peggy E. Chaudhry; Michael G. Walsh
Abstract This paper investigates recent trends in counterfeiting in the international marketplace. The primary objectives of this paper are to provide the international manager with (1) an overview of the legal framework that governs the protection of intellectual property rights, primarily against pirates; (2) a review of different anti-counterfeiting strategies; and (3) a summary of distinct labeling techniques used to distinguish between the “real” versus “fake” good.
Expert Systems | 2003
Jianyuan Yan; Peggy E. Chaudhry; Sohail S. Chaudhry
: The social demands for third-party logistics (3PL) are further developing the model of supply chain management. The analysis of an effective approach for 3PL service supplier evaluation is given in terms of its direct relation to the operational efficiency and benefit of the service-demanding enterprise as well as its supply chain management. An analysis of the traditional academic theoretical results and practical methods for 3PL supplier selection indicates the deficiencies of this approach. In this paper, a case-based reasoning model framework is postulated for a 3PL evaluation and selection system. This work further expands upon the theoretical basis of this system and its reasoning process by discussing the advantages and practical value of this framework.
Enterprise Information Systems | 2011
Peggy E. Chaudhry; Sohail S. Chaudhry; Stephen A. Stumpf; Hasshi Sudler
This article presents an overview of the growth of internet piracy in the global marketplace. The ethical perceptions (or lack of) of the younger generation is addressed, in terms of their willingness to consume counterfeit goods on the web. Firms face the task of educating the consumer that downloading music, software, movies and the like, without compensation, is unethical. This awareness is critical for decreasing the demand for counterfeit goods in the virtual marketplace, where a consumer can exhibit a rogue behaviour with a limited fear of prosecution. We address the pyramid of internet piracy, which encompasses sophisticated suppliers/facilitators, such as the Warez group. Recent sting operations, such as Operation Buccaneer, are also depicted to highlight successful tactical manoeuvres of enforcement agencies. An overview of the Digital Millennium Copyright Act and the No Electronic Theft Act is included to debate the controversy surrounding this legislation. A discussion of enterprise enforcement mechanisms and novel anti-piracy technology for cyberspace is provided to reveal some of the tools used to fight the pirates, such as innovations in digital watermarking and NECs recently announced video content identification technology. Enterprise information systems and its interdependence on the internet are also demanding new technologies that enable internet investigators to rapidly search, verify and potentially remove pirated content using web services. The quality of service of web services designed to efficiently detect pirated content is a growing consideration for new anti-piracy technology.
Expert Systems | 2003
Sohail S. Chaudhry; Shiwei He; Peggy E. Chaudhry
Locating p facilities to serve a number of customers is a problem in many areas of business. The problem is to determine p facility locations such that the weighted average distance traveled from all the demand points to their nearest facility sites is minimized. A variant of the p-median problem is one in which a maximum distance constraint is imposed between the demand point and its nearest facility location, also known as the p-median problem with maximum distance constraint. In this paper, we apply a fairly new methodology known as genetic algorithms to solve a relatively large sized constrained version of the p-median problem. We present our computational experience on the use of genetic algorithms for solving the constrained version of the p-median problem using two different data sets. Our comparative experimental experience shows that this solution procedure performs quite well compared with the results obtained from existing techniques.
Journal of Asia-pacific Business | 2009
Alan Zimmerman; Peggy E. Chaudhry
China is the largest source of counterfeit goods. Both U.S. and European Union customs statistics put the Peoples Republic of China at the top of the list of pirated product seizures. Along with the remarkable growth in the Chinese economy and exports has come the growth of counterfeit product production and distribution throughout the world. To present a full picture of the many intellectual property rights (IPR) protection problems in China this article reviews Chinese history and traditional attitudes toward individual ownership of IP under Confucianism and communism. Finally, the article presents a view of the current enforcement of IPR rights in China describing the major difficulties encountered by rights owners.
The Multinational Business Review | 2009
Peggy E. Chaudhry; Jonathan R. Peters; Alan Zimmerman
The major findings of this exploratory research are that a firm’s level of market commitment through future investments will increase in strategically important markets, regardless of high consumer complicity to purchase fake goods; that companies will employ additional anti‐counterfeiting tactics in markets with a high level of pirates and a high degree of enforcement of its intellectual property rights; and that companies employ a standardized approach of anti‐counterfeiting tactics targeted at consumers.
European Management Journal | 1994
Peggy E. Chaudhry; Peter Dacin; J.Paul Peter; James R. McManus
This paper investigates the changing business environment of the pharmaceutical industry as a result of regional integration. Peggy Chaudhry, Peter Dacin and J. Paul Peter develop specific research propositions on such issues as regulated prices, Pan-European selling tactics, gray markets, and strategic alliances and test these propositions by means of a content analysis of interviews conducted with pharmaceutical managers. In general, the perceptions of the pharmaceutical managers supported the propositions developed for this exploratory research.
Journal of Research in Marketing and Entrepreneurship | 2007
Peggy E. Chaudhry
The words in the CRM (Customer Relationship Management) have become short‐hand buzz words for describing how firms foster a 360‐degree review of the customer lifecycle. The primary goal of this study is to provide a synopsis of innovative CRM concepts that can assist entrepreneurial small firms develop a process to effectively communicate with their customers, such as an e‐newsletter and CD‐ROM direct mail campaign. A practitioner‐oriented model is developed that depicts the CRM process of using multiple communication channels, building loyalty, establishing customer retention tactics, and changing service offers to foster the customer experience.
5th Working Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS) | 2012
Peggy E. Chaudhry; Sohail S. Chaudhry; Ronald Reese; Darryl S. Jones
Over the past half a century, organizations have implemented information systems for managing their business processes. These information systems have now evolved into what are more commonly known as enterprise information systems. An important facet of implementing an enterprise information system in an organization is the development of security related issues within the information system for the business processes. In this paper, we review the relevant literature related to the security policies that are associated with the use of enterprise information systems within organizations. Based on this literature review, we identify four major issues which are security policy documentation, employee awareness, top management support, and access control. A conceptual framework based on these four issues is then presented within the context of corporate governance for the security of the enterprise information systems. We conclude our work with the future direction for this research.
Archive | 2007
Peggy E. Chaudhry; Stephen A. Stumpf
Die Verfugbarkeit und der Kauf von Raubkopien in China stellt ein groses okonomisches Risiko und oft einen finanziellen Verlust fur Unternehmen, deren Produkte gefalscht werden, dar. Die meisten Manager sind sich uber dieses Problem und uber dessen Grunde und mogliche Losungen bewusst. Mit einer Gruppe von Managern aus 53 Landern untersuchen wir das Bewusstsein fur dieses Problem, d.h. wie stark ist das Falschungsproblem angebotsgesteuert (Produktverfugbarkeit) bzw. nachfragegesteuert (Konsumenten verlangen nach einem Produkt, auch wenn es eine Raubkopie ist). Zudem werden die Grunde, warum ein Unternehmen ein gefalschtes Produkt anbieten wurde oder ein Chinese dies kaufen wurde, untersucht. Es wird die Meinung der Manager uber die relative Wirksamkeit von Gegenmasnahmen von Unternehmen erhoben, wobei Moglichkeiten, die Konsumenten daruber zu informieren, dass ein Produkt eine Raubkopie ist, einbezogen werden. Die Ergebnisse eines Fragebogens zeigen auf, dass sie unterschiedlicher Meinung daruber sind, ob ein chinesischer Konsument wissentlich ein gefalschtes Produkt kaufen wurde; dass das Angebot des Produktes als Haupttreiber fur die Zunahme von Raubkopien uberwiegt; dass der Gewinnanreiz weiterhin diese Art von Unternehmern motivieren wird und dass erwunschte Produkteigenschaften von Raubkopien (wie z.B. der geringe Preis oder das prestigereiche Image) weiterhin die Konsumentennachfrage fordern werden. Viele Manager glauben, dass die meisten Masnahmen zur Bekampfung von Raubkopien nur wenig wirksam zur Reduzierung von Falschungshandel in China sein werden.