image

Designing Innovative Quick Response Codes-Based Product Authenticity Safeguards: Risk Analysis

Download Paper PDF: Download pdf
Author(s):
Abstract:

This paper examines the potential risks that may occur when designing and implementing innovative products’ authenticity safeguards based on quick response (QR) codes. The study identified ten key risks, which were then analyzed in two dimensions: the probability of their occurrence and the strength of their impact, should they occur. Using the matrix-based method, risks were visualized on an intensity scale in both dimensions and with adequate color notation. Subsequently, the identified risks were grouped thematically. This enabled the identification of four key areas containing the identified risks, namely: competition, external websites, technological integration and risks dependent on internal factors. After aggregating individual risk levels, for each key area the average risk level was calculated. The first three areas were characterized by an average low level of risk, while the area related to risks dependent on internal factors was characterized by an average medium level of risk. The study’s systematic approach to identify and evaluate risks related to the execution of QR code-based authenticity safeguards project can be applied by businesses to similar projects, as it enables scientific-based risk identification and management, and consideration of strategies to mitigate the potential issues, ensuring smoother project execution and more reliable product performance.

How to cite:

Kuligowska, K., & Huć, A. (2024). Designing innovative quick response codes-based product authenticity safeguards: Risk analysis. Journal of Applied Economic Sciences, Volume XIX, Summer, 2(84), 201 – 207. https://doi.org/10.57017/jaes.v19.2(84).07 

References:

[1] Aulia, M. M., Saha, N., & Rahman, M. M. (2024). Protected QR Code-based Anti-counterfeit System for Pharmaceutical Manufacturing. ArXiv, 1-6. https://doi.org/10.48550/arXiv.2404.07831 

[2] Aven, T. (2016). Risk assessment and risk management: Review of recent advances on their foundation. European Journal of Operational Research, 253, 1-13. http://dx.doi.org/10.1016/j.ejor.2015.12.023 

[3]  Bansal, D., Malla, S., Gudala, K., & Tiwari, P. (2013). Anti-Counterfeit Technologies: A Pharmaceutical Industry Perspective. Scientia Pharmaceutica, 81(1), 1 - 14. https://doi.org/10.3797/scipharm.1202-03 

[4] Berglund, H. (2007). Risk Conception and Risk Management in Corporate Innovation: Lessons from two Swedish Cases. International Journal of Innovation Management, 11(4), 497-513. https://doi.org/10.1142/S1363919607001849 

[5] Deptuła, A. M. (2024). Assessment Criteria of Innovations Risks: Analysis of Research Results. Journal of the Knowledge Economy, 1-17. https://doi.org/10.1007/s13132-023-01659-1 

[6] Deptuła, A. M., & Knosala, R. (2015). Risk assessment of the innovative projects implementation. Management and Production Engineering Review, 6(4), 15-25. http://dx.doi.org/10.1515/mper-2015-0032 

[7] Gorokhovatskyi, V., Sergienko, O., Sosnov, I., Tatar, M., & Shapran, E. (2021). Risk Assessment of Innovative Projects: Development of Forecasting Models. [in:] Guryanova, L., Yatsenko, R., Dubrovina, N., & Babenko, V. (eds.), Machine Learning Methods and Models, Predictive Analytics and Applications. Proceedings of the Workshop on the XIII International Scientific Practical Conference Modern problems of social and economic systems modelling (MPSESM-W 2021), Kharkiv, Ukraine, 2927, 18-37.

[8] Huo, L., Zhu, J., Singh, P. K., & Pavlovich, P. A. (2021). Research on QR image code recognition system based on artificial intelligence algorithm. Journal of Intelligent Systems, 30(1), 855-867. https://doi.org/10.1515/jisys-2020-0143 

[9] Karrach, L., Pivarčiová, E., & Božek, P. (2020). Identification of QR Code Perspective Distortion Based on Edge Directions and Edge Projections Analysis. Journal of Imaging, 6(7), 67-86. https://doi.org/10.3390/jimaging6070067 

[10] Kovačević, N., Stojiljković, A., & Kovač, M. (2019). Application of the matrix approach in risk assessment. Operational Research in Engineering Sciences: Theory and Applications, 2(3), 55-64. http://dx.doi.org/10.31181/oresta1903055k 

[11] Li, D., Gao, X., Sun, Y., & Cui, L. (2017). Research on Anti-counterfeiting Technology Based on QR Code image Watermarking Algorithm. International Journal of Multimedia and Ubiquitous Engineering, 12(5), 57-66. http://dx.doi.org/10.14257/ijmue.2017.12.5.05 

[12] Murray, S.L., Grantham, K., & Damle, S.B. (2011). Development of a Generic Risk Matrix to Manage Project Risks. Journal of Industrial and Systems Engineering, 5(1), 35-51.

[13] Nasr, O. A., Alsisi, E. A., Mohiuddin, K., & Alqahtani, A. M. (2023). Designing an intelligent QR code-based mobile application: A novel approach for vehicle identification and authentication. Indian Journal of Science and Technology, 16(37), 3139-3147. https://doi.org/10.17485/IJST/v16i37.1389 

[14] Pawar, A., Fatnani, C., Sonavane, R., Waghmare, R., & Saoji, S. (2022). Secure QR Code Scanner to Detect Malicious URL using Machine Learning. [in:] 2nd Asian Conference on Innovation in Technology (ASIANCON), 1-8, https://doi.org/10.1109/ASIANCON55314.2022.9908759 

[15] Petrova, K., Romaniello, A., Medlin, B.D., & Vannoy, S.A. (2016). QR Codes Advantages and Dangers. [in:] Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2(ICE-B), 112-115. http://dx.doi.org/10.5220/0005993101120115 

[16] Picard, J., Landry, P., & Bolay, M. (2021). Counterfeit detection with QR codes. [in:] Proceedings of the 21st ACM Symposium on Document Engineering (DocEng '21), 16, 1-4. https://doi.org/10.1145/3469096.3474924 

[17] Vaithilingam, S., & Shankar, S. A. M. (2024). Enhancing security in QR code technology using AI: Exploration and mitigation strategies. International Journal of Intelligence Science, 14, 49-57. https://doi.org/10.4236/ijis.2024.142003 

[18] Walas-Trębacz, J., & Bartusik, K. (2023). Identification of risk types in innovation projects. International Journal of Contemporary Management, 59(4), 74-93. http://dx.doi.org/10.2478/ijcm-2023-0013

[19] Wang, T., Zheng, H., You, C., & Ju, J. (2023). A Texture-Hidden Anti-Counterfeiting QR Code and Authentication Method. Sensors, 23(2), 795, 1-25. https://doi.org/10.3390/s23020795