Who are the guardians in product counterfeiting? A theoretical application of routine activities theory
Crossref DOI link: https://doi.org/10.1057/cpcs.2014.6
Published Online: 2014-07-18
Published Print: 2014-08
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Hollis, Meghan E
Wilson, Jeremy
Text and Data Mining valid from 2014-07-18