Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Peggy E. Chaudhry is active.

Publication


Featured researches published by Peggy E. Chaudhry.


The Columbia Journal of World Business | 1996

An assessment of the impact of counterfeiting in international markets: The piracy paradox persists

Peggy E. Chaudhry; Michael G. Walsh

Abstract This paper investigates recent trends in counterfeiting in the international marketplace. The primary objectives of this paper are to provide the international manager with (1) an overview of the legal framework that governs the protection of intellectual property rights, primarily against pirates; (2) a review of different anti-counterfeiting strategies; and (3) a summary of distinct labeling techniques used to distinguish between the “real” versus “fake” good.


Expert Systems | 2003

A model of a decision support system based on case-based reasoning for third-party logistics evaluation

Jianyuan Yan; Peggy E. Chaudhry; Sohail S. Chaudhry

: The social demands for third-party logistics (3PL) are further developing the model of supply chain management. The analysis of an effective approach for 3PL service supplier evaluation is given in terms of its direct relation to the operational efficiency and benefit of the service-demanding enterprise as well as its supply chain management. An analysis of the traditional academic theoretical results and practical methods for 3PL supplier selection indicates the deficiencies of this approach. In this paper, a case-based reasoning model framework is postulated for a 3PL evaluation and selection system. This work further expands upon the theoretical basis of this system and its reasoning process by discussing the advantages and practical value of this framework.


Enterprise Information Systems | 2011

Piracy in cyber space: consumer complicity, pirates and enterprise enforcement

Peggy E. Chaudhry; Sohail S. Chaudhry; Stephen A. Stumpf; Hasshi Sudler

This article presents an overview of the growth of internet piracy in the global marketplace. The ethical perceptions (or lack of) of the younger generation is addressed, in terms of their willingness to consume counterfeit goods on the web. Firms face the task of educating the consumer that downloading music, software, movies and the like, without compensation, is unethical. This awareness is critical for decreasing the demand for counterfeit goods in the virtual marketplace, where a consumer can exhibit a rogue behaviour with a limited fear of prosecution. We address the pyramid of internet piracy, which encompasses sophisticated suppliers/facilitators, such as the Warez group. Recent sting operations, such as Operation Buccaneer, are also depicted to highlight successful tactical manoeuvres of enforcement agencies. An overview of the Digital Millennium Copyright Act and the No Electronic Theft Act is included to debate the controversy surrounding this legislation. A discussion of enterprise enforcement mechanisms and novel anti-piracy technology for cyberspace is provided to reveal some of the tools used to fight the pirates, such as innovations in digital watermarking and NECs recently announced video content identification technology. Enterprise information systems and its interdependence on the internet are also demanding new technologies that enable internet investigators to rapidly search, verify and potentially remove pirated content using web services. The quality of service of web services designed to efficiently detect pirated content is a growing consideration for new anti-piracy technology.


Expert Systems | 2003

Solving a class of facility location problems using genetic algorithms

Sohail S. Chaudhry; Shiwei He; Peggy E. Chaudhry

Locating p facilities to serve a number of customers is a problem in many areas of business. The problem is to determine p facility locations such that the weighted average distance traveled from all the demand points to their nearest facility sites is minimized. A variant of the p-median problem is one in which a maximum distance constraint is imposed between the demand point and its nearest facility location, also known as the p-median problem with maximum distance constraint. In this paper, we apply a fairly new methodology known as genetic algorithms to solve a relatively large sized constrained version of the p-median problem. We present our computational experience on the use of genetic algorithms for solving the constrained version of the p-median problem using two different data sets. Our comparative experimental experience shows that this solution procedure performs quite well compared with the results obtained from existing techniques.


Journal of Asia-pacific Business | 2009

Protecting Intellectual Property Rights: The Special Case of China

Alan Zimmerman; Peggy E. Chaudhry

China is the largest source of counterfeit goods. Both U.S. and European Union customs statistics put the Peoples Republic of China at the top of the list of pirated product seizures. Along with the remarkable growth in the Chinese economy and exports has come the growth of counterfeit product production and distribution throughout the world. To present a full picture of the many intellectual property rights (IPR) protection problems in China this article reviews Chinese history and traditional attitudes toward individual ownership of IP under Confucianism and communism. Finally, the article presents a view of the current enforcement of IPR rights in China describing the major difficulties encountered by rights owners.


The Multinational Business Review | 2009

Evidence of Managerial Response to the Level of Consumer Complicity, Pirate Activity, and Host Country Enforcement of Counterfeit Goods: An Exploratory Study

Peggy E. Chaudhry; Jonathan R. Peters; Alan Zimmerman

The major findings of this exploratory research are that a firm’s level of market commitment through future investments will increase in strategically important markets, regardless of high consumer complicity to purchase fake goods; that companies will employ additional anti‐counterfeiting tactics in markets with a high level of pirates and a high degree of enforcement of its intellectual property rights; and that companies employ a standardized approach of anti‐counterfeiting tactics targeted at consumers.


European Management Journal | 1994

The pharmaceutical industry and European community integration

Peggy E. Chaudhry; Peter Dacin; J.Paul Peter; James R. McManus

This paper investigates the changing business environment of the pharmaceutical industry as a result of regional integration. Peggy Chaudhry, Peter Dacin and J. Paul Peter develop specific research propositions on such issues as regulated prices, Pan-European selling tactics, gray markets, and strategic alliances and test these propositions by means of a content analysis of interviews conducted with pharmaceutical managers. In general, the perceptions of the pharmaceutical managers supported the propositions developed for this exploratory research.


Journal of Research in Marketing and Entrepreneurship | 2007

Developing a Process to Enhance Customer Relationship Management for Small Entrepreneurial Businesses in the Service Sector

Peggy E. Chaudhry

The words in the CRM (Customer Relationship Management) have become short‐hand buzz words for describing how firms foster a 360‐degree review of the customer lifecycle. The primary goal of this study is to provide a synopsis of innovative CRM concepts that can assist entrepreneurial small firms develop a process to effectively communicate with their customers, such as an e‐newsletter and CD‐ROM direct mail campaign. A practitioner‐oriented model is developed that depicts the CRM process of using multiple communication channels, building loyalty, establishing customer retention tactics, and changing service offers to foster the customer experience.


5th Working Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS) | 2012

Enterprise Information Systems Security: A Conceptual Framework

Peggy E. Chaudhry; Sohail S. Chaudhry; Ronald Reese; Darryl S. Jones

Over the past half a century, organizations have implemented information systems for managing their business processes. These information systems have now evolved into what are more commonly known as enterprise information systems. An important facet of implementing an enterprise information system in an organization is the development of security related issues within the information system for the business processes. In this paper, we review the relevant literature related to the security policies that are associated with the use of enterprise information systems within organizations. Based on this literature review, we identify four major issues which are security policy documentation, employee awareness, top management support, and access control. A conceptual framework based on these four issues is then presented within the context of corporate governance for the security of the enterprise information systems. We conclude our work with the future direction for this research.


Archive | 2007

Product Counterfeiting in China: Managerial Perceptions of Supplier and Buyer Interest in Counterfeit Goods and the Probable Effectiveness of Corporate Anti-Counterfeiting Actions

Peggy E. Chaudhry; Stephen A. Stumpf

Die Verfugbarkeit und der Kauf von Raubkopien in China stellt ein groses okonomisches Risiko und oft einen finanziellen Verlust fur Unternehmen, deren Produkte gefalscht werden, dar. Die meisten Manager sind sich uber dieses Problem und uber dessen Grunde und mogliche Losungen bewusst. Mit einer Gruppe von Managern aus 53 Landern untersuchen wir das Bewusstsein fur dieses Problem, d.h. wie stark ist das Falschungsproblem angebotsgesteuert (Produktverfugbarkeit) bzw. nachfragegesteuert (Konsumenten verlangen nach einem Produkt, auch wenn es eine Raubkopie ist). Zudem werden die Grunde, warum ein Unternehmen ein gefalschtes Produkt anbieten wurde oder ein Chinese dies kaufen wurde, untersucht. Es wird die Meinung der Manager uber die relative Wirksamkeit von Gegenmasnahmen von Unternehmen erhoben, wobei Moglichkeiten, die Konsumenten daruber zu informieren, dass ein Produkt eine Raubkopie ist, einbezogen werden. Die Ergebnisse eines Fragebogens zeigen auf, dass sie unterschiedlicher Meinung daruber sind, ob ein chinesischer Konsument wissentlich ein gefalschtes Produkt kaufen wurde; dass das Angebot des Produktes als Haupttreiber fur die Zunahme von Raubkopien uberwiegt; dass der Gewinnanreiz weiterhin diese Art von Unternehmern motivieren wird und dass erwunschte Produkteigenschaften von Raubkopien (wie z.B. der geringe Preis oder das prestigereiche Image) weiterhin die Konsumentennachfrage fordern werden. Viele Manager glauben, dass die meisten Masnahmen zur Bekampfung von Raubkopien nur wenig wirksam zur Reduzierung von Falschungshandel in China sein werden.

Collaboration


Dive into the Peggy E. Chaudhry's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alan Zimmerman

City University of New York

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jonathan R. Peters

City University of New York

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ludovica Cesareo

Sapienza University of Rome

View shared research outputs
Top Co-Authors

Avatar

Goksel Yalcinkaya

University of New Hampshire

View shared research outputs
Top Co-Authors

Avatar

J.Paul Peter

University of Wisconsin-Madison

View shared research outputs
Researchain Logo
Decentralizing Knowledge