Fake Medicines
Fake Medicines
To cite this article: Tim K. Mackey & Gaurvika Nayyar (2017) A review of existing and emerging
digital technologies to combat the global trade in fake medicines, Expert Opinion on Drug Safety,
16:5, 587-602, DOI: 10.1080/14740338.2017.1313227
REVIEW
A review of existing and emerging digital technologies to combat the global trade
in fake medicines
a,b,c
Tim K. Mackey and Gaurvika Nayyarb
a
Department of Anesthesiology, University of California San Diego School of Medicine, San Diego, USA; bGlobal Health Policy Institute, San Diego;
c
Department of Medicine, Division of Global Public Health, University of California San Diego School of Medicine, San Diego, USA
preventable deaths, exacerbating disease burden, and con- While these solutions can be effective, advances in infor-
tributing to a rise of resistant strains [20,43–46]. mation science, software development, and web-enabled
technologies are transforming security for electronic transac-
tions and supply networks of other industries (such as in the
1.3. Digital ‘gray’ market financial technology and e-commerce sectors). These same
emerging ‘digital’ technologies are also increasingly being
Globalization of consumer markets coupled with the rise of
used to improve performance, management, and interoper-
e-commerce platforms has also resulted in new channels that
ability of the global pharmaceutical supply chain (including
fake medicines can penetrate, including purchase and deliv-
use of IT infrastructures, data analytics, inventory manage-
ery via the Internet [47–51]. Specifically, the accessibility,
ment, and end-to-end supply chains) yet have yet to be fully
anonymity, low-cost, and global reach of Internet-based tech-
leveraged to detect and prevent fake medicines [63].
nologies has enabled the rapid proliferation of online phar-
Despite advances in many digital technologies, the poten-
macies (estimated as more than 35,000 websites), or more
tial application and translation of these solution to address the
simply websites that purport to operate as legitimate phar-
complex drug safety challenge of fake medicines is only
macies via the Internet or mail-order and sell prescription
beginning to take shape. This despite growing importance
drugs direct-to-the-consumer [51–53]. However, the vast
for a digital ‘modernization’ of the drug supply chain, given
majority of these online ‘pharmacies’ conduct business illeg-
that 3.5 billion people are now connected to the Internet and
ally and without appropriate safeguards, including not requir-
95% of the world is connected to a mobile cellular network
ing a valid prescription, operating without a valid license/
[64]. Importantly, these technologies may hold real promise in
certification, and failing to meet national or international
turning the tide in the fight against the fake medicines trade
pharmacy regulations [49–51,54–56] These illicit or ‘rogue’
by tackling supply chain vulnerabilities, but more in-depth
online pharmacies pose a serious threat to global patient
assessment is needed to identify opportunities and barriers
safety as they act as a source and distribution point for
to their realization.
medicines of questionable quality are not subject to the
regulatory safeguards of the controlled supply chain, and
lack clinical oversight from a clinician/physician, pharmacist, 2. Methods
or other trained healthcare professional [51,57].
When consumers purchase medicines from illegal online 2.1. Aim
pharmacies, they become active participants in circumventing The aim of this review was to identify existing and emerging
a regulatory system designed to protect the safety, quality, digital technologies designed to ensure the integrity of the
and appropriate use of prescription drugs, while also creating global drug supply chain by combating fake medicines. We
broader market demand for the global manufacture, distribu- undertake this review to better understand how digital tech-
tion and spread of fake medicines [9,47,51,58]. Consumers also nologies can enable cooperation and coordination among
face cybersecurity risks such as financial fraud, data phishing, different international stakeholders to address a decades-
and infection by computer viruses/malware/spyware that can long public health problem that demands innovative solutions
add to existing health-related harms [51]. Hence, the globali- in order to protect patients globally. We note that we did not
zation of e-commerce has enabled the creation of a ‘digital’ include discussion about traditional forms of anticounterfeit-
pharmaceutical gray market completely separate from the ing technologies that do not specifically have a digital tech-
legitimate supply chain, but in many ways, more convenient nology application (e.g. product serialization, use of packaging
though equally dangerous. Importantly, ongoing challenges authentication, visual inspection solutions, laboratory or for-
regarding ensuring equitable access and affordability to pre- ensic detection technology including but not limited to x-ray
scription drugs remain driving factors in perpetuating this powder diffraction, spectroscopy, nuclear magnetic resonance,
alternative avenue of demand and sourcing [12,16,59,60]. infrared imaging, and liquid chromatography) as these coun-
termeasures have been extensively covered in a 2014 review
article published in PLoS One by Kovacs et al. [45] We also did
1.4. ‘Digital’ supply chain solutions not focus on the review of policies related to public health
As physical and digital vulnerabilities remain exposed, differ- interventions or health system-level interventions (i.e. regula-
ent methods of ensuring the integrity of the global drug tory measures, public education/awareness, and pharmacov-
supply chain are needed to address the unique challenges igilance) as this has been previously examined in systematic
posed by different international markets, supply chain review articles by Hamilton et al. in Health Policy and Planning
dynamics, and legal jurisdictions. Primarily, fake medicines and Fadlallah et al. in Pharmaceutical Medicine respectively,
countermeasures have relied upon serialization (i.e. identify- both recently published in 2016 [17,58].
ing a medicine by using unique printed codes, images, or
holograms on packaging to verify authenticity), authentica-
2.2. Literature review
tion (i.e. scanning a medicine product at point of supply
through to the patient to verify authenticity), and track and We first conducted a literature review for journal articles, origi-
trace technology (i.e. logistic technology that follows the nal research, conference papers, case reports, technology
current and past locations of medical products through the reviews, commentaries and news reports that were indexed in
supply chain) [18,45,61,62]. four scholarly databases. This included conducting search term
590 T. K. MACKEY AND G. NAYYAR
queries on the databases PubMed (Medline), IEEE Xplore, ACM subject has increased at the highest rate over the past 5 years
Digital Library, and Google Scholar. The rationale for choosing [24]. A visual description of how we conducted the literature
these databases was the interdisciplinary nature of the study review and the keywords used are provided in Figure 1 and
aims, which required a review of the science/health literature detailed below.
(PubMed-indexed journals that cover life sciences and biome- After our initial search results, we applied an inclusion and
dical topics), studies on information, communication and engi- exclusion criteria that filtered results by reviewing abstracts of
neering technologies (IEEE Xplore-indexed articles that focus on extracted articles. We first excluded articles that did not discuss
scientific and technical content published by the Institute of application of technology to fake medicines (e.g. discussed
Electrical and Electronics Engineers [IEEE]), research on other fields of study or other counterfeit goods such as con-
advances in computing sciences (ACM Digital Library indexes sumer products, currency, electronic components/equipment,
various journals, conference proceedings, technical magazines, cosmetic products, foods, cigarettes, or dietary supplements)
newsletters and books in the computing literature), and a gen- and then excluded articles that included fake medicines but did
eral search of the literature (Google Scholar indexes a variety of not discuss forms of digital technologies and solutions (e.g.
peer review papers, theses, preprints, abstracts, and technical laboratory-based technologies not connected to the Internet,
reports for a variety of disciplines). survey instruments or analysis of secondary data, discussion of
We limited our searches to English-language articles pub- professional guidelines and/or recommendations, policy and
lished between 2010 and 2016. Our search queries included the regulatory related topics, and traditional forms of packaging
combination of two keyword categories: (a) terms associated authentication and serialization).
with fake medicines and online pharmacies; and (b) terms In order to expand our search and capture emerging and new
associated with emerging ‘digital technology’. We define ‘digi- technologies that may have been absent or not extensively
tal technologies and solutions’ as those that are: (1) enabled by covered in the academic literature, we also reviewed gray litera-
Internet-based technologies and/or platforms (e.g. online por- ture sources using structured natural language web searches
tals and management systems, Internet-based supply chain with a similar combination of keywords on the popular Google
tools, cloud-connected databases, social media-based applica- search engine. We retrieved and reviewed information sources
tions); (2) use mobile or wireless technologies (e.g. mobile including technical reports, reports from government agencies,
phone applications or wireless transmitting devices that con- news reports from media outlets (i.e. nonscientific sources),
nect to the Internet); (3) use of algorithms or other advanced company websites, blogs, and press releases, information from
computational methods for data analysis; and (4) solutions that nongovernmental organizations/trade associations/solution pro-
share common IT-platforms, web connected databases or uti- viders/supply chain companies, and information from govern-
lize cloud-based systems. ment and regulatory agency websites. We specifically focused on
Keywords were queried in the Title/Abstract field using existing and emerging technology already identified and/or
advanced search function settings for PubMed, IEEE Xplore, referenced in our academic literature review (e.g. specific types
and ACM Digital Library databases. For Google Scholar, we of technologies, names of companies, names of solutions) and
used natural language queries limited in time frame of pub- reviewed results carefully to identify case studies, updates, and
lished date and excluded results of published patents. We other supplemental information. Gray literature searches were
chose a 6-year literature review period as this study is focused conducted from November 2016 – January 2016 and were lim-
on relatively new, emerging, or innovative technologies and ited to the first five pages of results for each keyword search
based on findings indicating that published literature on the query combination.
Figure 2. Visual summary of existing and emerging categories of digital technologies to combat fake medicines.
592
mPedigree mPedigree is a mobile pedigree identification record and product authentication solution powered 10 million packs x x Pharmaceutical,
[Founded 2007] by a cloud-based system offered by Hewlett Packard. mPedigree refers to mobile short code of medicine2 governments, distributors,
platform (using QR codes and barcodes) to interconnect GSM mobile networks via a central retail outlets and patients
registry wherein pedigree information of product brands belonging to participant manufacturers
are stored. mPedigree also offers other supply chain security and coordination solutions for retail
pharmacies
PharmaSecure PharmaSecure is a mobile product authentication solution focused on end-user verification. 40 countries, 60 x x Pharmaceutical, retail
[Founded 2007] Medicine packets are linked with a unique code (customized to market and regulation including pharma outlets, and patients
alphanumeric barcodes etc.). Customers who purchase the drug can then text message that companies3
code to the PharmaSecure number and receive a response (voice, web or text) that 500 m units
authenticates the medication and provides expiration dates and related information. More of medicine
recently, distribution wide services have also been provided secured4
Epothecary Epothecary is a mobile product track and trace supply-chain security solution proposal that uses NA x x x Pharmaceutical, distributors,
[Published 2009] camera phones to scan unique ‘glyphs’ attached to each medicine unit, at each level of retail outlets and patients
No image available packaging, distribution storage, and sale via SMS verification. This solution can also track
quantity sold and GPS coordinates of the products across the supply chain
MedSnap MedSnap is a mobile medicine image recognition that takes images via phone of actual pills and NA, x Governments and patients
[Founded 2011] runs it across their authentic pill image library to provide a wide range of information and commercially
verification of the product available
(Continued )
EXPERT OPINION ON DRUG SAFETY 593
governments, distributors,
cations to authenticate and track individual medicine capsules
Key stakeholders
using upconversion 3D fluorescent QR codes, Android mobile
applications that enable consumers to check the regulatory
Pharmaceutical,
and patients
status of medicines with the Ministry of Health, and a pro-
Chabra E. Source Code: PharmaSecure Goes Mobile in Battle Against Fake Drugs. 2013; available at: https://www.theguardian.com/global-development/2013/may/09/source-code-pharmasecure-fake-drugs
posed mobile technology medicine verification framework
using a data matrix to mitigate security vulnerabilities of
existing commercial solutions [66,69,70].
Importantly, mobile phones can act as the primary device for
authentication authentication coordination
Medicines 2016]
Sources:
Mobile
including data on post market surveillance, adverse events, due to challenges faced by the need for human interpreta-
drug toxicity, and drug discovery [93,99–106]. tion of results, Banerjee et al. developed an image recogni-
The first category of studies used different applications of tion classifier designed to automatically compare PAD visual
machine learning to detect illicit online pharmacy content testing results to stored images of authentic drug PAD sam-
and communications by identifying and classifying: (a) tweets ples, with some models reporting high accuracy of classifica-
(on the popular microblogging platform Twitter) promoting tion models [115]. They also describe plans to develop
illicit online pharmacy sales of prescription controlled sub- mobile message services so users can send their PAD images
stances; (b) a framework for text mining Facebook and in order to build a larger test dataset to improve their classi-
Twitter content to detect negative sentiment about drug fier models [115].
products that may signal counterfeiting; (c) Internet and Though promising, advanced computational methods
website network information and content level features (e.g. that leverage machine learning to fight online and physical
HTML text, images, network stack information, other meta- distribution of fake medicines appear to lack sufficient
data) indicating counterfeiting activities; and (d) cluster ana- investment as we were unable to identify a commercially
lysis that identifies large website networks involved in available solution fully utilizing this technology approach.
pharmaceutical cybercrime and spam [96,97,103,107,108]. This despite machine learning underpinning several leading
Another study used human annotation (i.e. not machine consumer platforms (e.g. video and music streaming ser-
learning) to analyze ‘signal’ data on website trust features vices, web search engines, online advertising) and actively
(e.g. verification seals, store presence, product selection, ful- being used by several industries including the healthcare
fillment features, and health content) to accurately classify sector for other issues.
regulated versus unregulated online pharmacies, a method
that potentially could be scaled if adapted for use with
machine learning protocols [109].
3.4. Online pharmacy verification solutions
Three particularly innovative studies combined web crawling
(i.e. using crawlers/bots to mine content from webpages) and Our review also captured four categories of web-based solu-
machine learning to detect and classify different actors in the tions designed to verify and educate consumers about the
online pharmacy ecosystem. The first describes a novel compu- dangers of illicit online pharmacies. These technologies serve
tational system named ‘PharmGuard’ that uses a web crawler the purpose of providing consumers with reliable information
and supervised machine learning algorithms to automatically about the legal status of an online pharmacy and whether it
identify search engine indexed online pharmacy websites and has been appropriately vetted by regulators in their country of
related advertisements [110]. Another study described the operation. Technologies in this category include: (1) website
development of an adaptive learning algorithm called recursive seals; (2) commercially available website verification services;
trust labeling (RTL) that was tested to detect fake medical and (3) a new top-level domain name for legitimate online
websites (including online pharmacies) and reported over a pharmacies. Different from other technologies reviewed, web-
90% detection accuracy when deployed over nearly one million based solutions focus on protecting consumers at the point-
websites [58,111]. A final study described a methodology that of-sale, while also rely on consumer awareness, education and
automatically extracts web page features for profiling online user participation in order to be effective.
storefronts to train a classifier to accurately identify affiliate The first category comprised of website seals, which are
marketing programs that promote and spam information essentially images, links or objects displayed on pharmacy web-
about online pharmacies [112]. sites of accredited or legitimate online retailers. They are usually
A second category of machine learning technologies acquired through national, regional, or global agencies that
involved developing algorithms to detect fake medicines by provide a form of accreditation or certification of legitimacy
mining data from the broader drug supply chain. This included and quality. The National Association Boards of Pharmacy
an article describing a pattern-mining algorithm used in com- (NABP) in the United States implemented the Verified Internet
puter simulations to detect counterfeit medicines from track Pharmacy Practice Sites Seal or ‘VIPPS’ seal as early as 1999 in
and trace records (such as RFID event data) [113]. Another response to the rise in illicit online pharmacies [116]. The seal was
study described the use of economic cybernetics to monitor provided to pharmacies via a rigorous application process,
differences in pharmaceutical supply flow to detect irregula- inspections/audits, and a recurring fee to participate in the pro-
rities that could constitute fake medicine events [114]. gram. Similarly, in 2015, the United Kingdom launched the EU
In a completely different application of machine learning, common logo for all online pharmacies and retailers offering
deep learning models (a branch of machine learning based medical products for ‘human use in the European Union’ [117].
on artificial neural networks that has commonly been used in The UK common seal, like VIPPS is not intended to be used in
speech and image recognition) were used in combination isolation to verify website authenticity, but instead is activated
with physical counterfeit drug detection devices, specifically when the logo is clicked and the user is redirected to a separate
Paper Analytical Devices (PADs) [115]. PADs are paper-based verification page. However, for website seals to be successful
testing kits embedded with reagents that react with chemical there must be existing consumer knowledge on the dangers of
compounds producing a set of distinctive color patterns that illicit online pharmacies, consumers need to be aware the seals
can be visually compared to stored images of authentic exist and their purpose, and duplication or counterfeiting of
products indicating whether a drug is fake [115]. However, online seals needs to be prevented.
596 T. K. MACKEY AND G. NAYYAR
A second category includes website verification services economic and supply transactions), execute of ‘smart con-
that comprise of large databases containing information tracts’, and operate an immutable, shared, and encrypted
about online pharmacies (usually collected through web transaction ledger that can be used to track and trace goods
crawlers) that enable consumers to check the status of an across the supply chain [124–127].
online pharmacy’s by querying its URL. LegitScript LLC is a In the context of fake drugs, the application of blockchain
commercial leader in this space and partners with several has the potential to: (1) track and trace pharmaceutical raw
private companies, including Google, Amazon, Visa, and materials and finished product from manufacture to end user
Bing (Microsoft), to monitor and identify fraudulent online in an immutable and shared e-pedigree-based digital ledger;
pharmacies. It also operates a website that allows free pub- (2) provide greater transparency and enable detection of fake
lic searches so that consumers can check an online phar- drugs in the supply chain by allowing blockchain participants
macy’s legitimacy via a searchable database [51,118,119]. to verify the authenticity of data; (3) integrate anticounterfeit
However, not all website verification services may be repu- devices into the ‘Internet of Things’ and better enable detec-
table and they also require constant monitoring and updat- tion and authentication; and (4) could serve as an open
ing as new websites are removed and created and as standards technology to enhance information sharing across
existing ones change or potentially become noncompliant unrelated databases and different actors in the drug supply
[50,51,57]. chain [127–129]. This could potentially transform a block-
An alternative approach to website verification services is chain-enabled drug supply chain into a more trustworthy,
one that is taking advantage of recent changes in Internet accountable, and transparent shared and open data architec-
governance. In 2011, the Internet Corporation for Assigned ture that could cross multiple supply chain actors and
Names and Numbers (ICANN) launched a new program to jurisdictions.
create thousands of new generic top-level domain (gTLD) Despite its potential to better establish drug supply chain
names (i.e. the highest level of the Internet name space or provenance, we were only able to extract a single 2016 IEEE
simply everything after the final dot in a web address) includ- non-research article that summarized a few blockchain pro-
ing domains associated with health services (e.g. .health, . jects initiated by different organizations and explored it as a
doctor, .medical) [120–122]. Included in the new gTLD propo- potential solution for fake medicines among other healthcare
sals was an application for a .pharmacy domain with NABP as problems [125]. Though there was little literature on the sub-
the registry operator. The .pharmacy domain’s purpose is to ject, our review of the gray literature turned up several exam-
act as a dedicated name space on the Internet to host legit- ples of prototypes, use cases, and research and educational
imate online pharmacy websites and other related resources initiatives for pharmaceutical supply chain-related blockchain
vetted through NABP’s approval processes (see .pharmacy activities. This included startup companies, such as Chronicled,
Case Study #3 in Supplemental data for more details). Inc., which has launched prototype technology combining
Applications to apply for a .pharmacy domain are now avail- NFC embedded adhesive seals that are registered and verified
able and if successfully adopted would act as a ‘built-in’ on a blockchain, a project by iSolve, LLC that simulates how
verification tool for online pharmacies by signaling to consu- blockchain can be used to track medicines in a theoretical
mers that any website with a .pharmacy web address is legit- supply chain, a use case by BlockVerify for an anticounterfeit-
imate [123]. However, many consumers are not aware of the ing platform using verification tags verified via blockchain
new gTLDs, and it remains to be seen if legitimate online technology, and the presentation of conceptual design and
pharmacies will use this platform to market the credibility use cases by Rubrix by Deloitte (spun off from major profes-
and safety of their services. sional service firm Deloitte Touche Tohmatsu Limited)
[125,127–132].
Other examples of blockchain pharmaceutical supply chain
3.5. Blockchain technology
initiatives included the multistakeholder BlockRx project to pilot
A final emerging technology category we identified was lever- blockchain technology in the pharmaceutical sector, the open
aging blockchain technology to combat fake drugs and dyna- source collaboration Hyperledger (backed by the Linux
mically enhance the security of the drug supply chain. Foundation) to explore use of blockchain to improve pharmaceu-
Fundamentally blockchain is a secure distributed digital ledger tical supply chain security, hackathon contests and boot camps
(i.e. simultaneously shared across multiple users/locations and that have featured conceptual solutions aimed at ensuring quality
not stored in a single location) made up of ‘blocks’ of contin- and accountability in the supply chain, and educational and out-
uous transaction information. Blockchain technology has been reach initiatives by IEEE Standards Association (including a virtual
the subject of widespread attention, investment, and industry blockchain workshop and webinars) [125,132–135].
hype, given its potential to share, sync, and better secure Though still in its relative infancy, the march toward com-
(through cryptography and ‘miners’ that validate and chain mercialization of blockchain technology to address the fake
together blocks of transaction data without the need for a medicines trade appears to be outpacing research efforts. This
central authority) transaction information and data via a peer- indicates that rapidly emerging technologies backed with
to-peer, distributed and decentralized database structure strong private sector investments may bypass early stage
[124–126]. Best popularized as the underlying technology for research and experimentation typically reported in academic
the cryptocurrency bitcoin, blockchain solutions can be used journals, though the success of blockchain to combat fake
to record and authenticate transfers of information (including drugs remains to be realized.
EXPERT OPINION ON DRUG SAFETY 597
developed, while also determining how they best fit with 4. Attaran A, Barry D, Basheer S, et al. How to achieve international
their individual pharmaceutical product offerings, diverse action on falsified and substandard medicines. Bmj. 2012;345:
e7381.
markets, geography, and unique supply chain vulnerabilities.
5. Mackey TK. Global health diplomacy and the governance of coun-
Fortunately, the international legal, policy, and regulatory terfeit medicines: a mapping exercise of institutional approaches
environment needed to mobilize stakeholder rhetoric into [Internet]. ghd-net.org. 2013 [cited 2013 Jul 1]. Available from:
action may be taking shape. This includes renewed efforts in http://www.ghd-net.org/sites/default/files/Global%20Health%
global governance to fight fake medicines including regional 20Diplomacy%20and%20the%20Governance%20of%20Counterfeit
%20Medicines.pdf
treaty instruments such as the Council of Europe’s
6. Woo J, Wolfgang S, Batista H. The effect of globalization of drug
MEDICRIME Convention that entered into force in 2016, the manufacturing, production, and sourcing and challenges for amer-
Council of European Union’s Falsified Medicines Directive, ican drug safety. Clin Pharmacol Ther. 2008 Mar 1;83(3):494–497.
domestic laws such as the United States’ 2013 Drug Supply 7. El-Jardali F, Akl EA, Fadlallah R, et al. Interventions to combat or
Chain Security Act, and other national and local laws and prevent drug counterfeiting: a systematic review. BMJ Open. British
Med J Publishing Group. 2015;5(3):e006290–0.
decrees [5,16,58,84,142,143]. This emerging global drug-
8. New W WHO board agrees to drop the word “Counterfeit” after 30
safety policy environment could act as a catalyst for the years [Internet]. ip-watch.org. 2017 [cited 2017 Jan 30]. Available
translation of the digital technologies we have identified from: http://www.ip-watch.org/2017/01/30/board-agrees-drop-
into real-world solutions, tools we argue are critical in word-counterfeit-30-years/
addressing a drug supply chain that continues to become 9. Clark F Rise in online pharmacies sees counterfeit drugs go global.
The Lancet. Elsevier. 2015 Mar 10;386(10001):1327–1328.
more globalized, digital, and a lucrative target for criminals
10. WHO. Substandard, spurious, falsely labelled, falsified and counter-
engaged in the international trade in fake medicines. feit (SSFFC) medical products [Internet]. WHO World Health
Organization. 2016. [[cited 2017 Jan 1]]. Available from: http://
www.who.int/mediacentre/factsheets/fs275/en/
Acknowledgments 11. Blackstone EA, Fuhr JP, Pociask S The health and economic effects
of counterfeit drugs. Am Health Drug Benefits. Engage Healthcare
First author would like to thank the IEEE Standards Association for their Communications, LLC. 2014 Jun;7(4):216–224.
invitation and his participation as a problem mentor in the IEEE Virtual 12. IOM. Countering the problem of falsified and substandard drugs -
Blockchain Workshop, Advancing HealthTech for Humanity Series. ™ institute of medicine [Internet]. iom.edu. 2013 [cited 2013 Feb 25].
Available from: http://www.iom.edu/Reports/2013/Countering-the-
Problem-of-Falsified-and-Substandard-Drugs.aspx
•• This is a comprehensive report.
Funding 13. Kohler JC, Pavignani E, Michael M, et al. An examination of phar-
This paper was not funded. maceutical systems in severely disrupted countries. BMC Int Health
Hum Rights. 2012 Dec 6;12(1):34.
14. Delepierre A, Gayot A, Carpentier A. Update on counterfeit antibiotics
worldwide; public health risks. Med Mal Infect. 2012 Jun;42(6):247–255.
Declaration of interest 15. Venhuis BJ, Keizers PHJ, Klausmann R, et al. Operation resistance: A
T Mackey is a non-compensated member of the Alliance for Safe Online snapshot of falsified antibiotics and biopharmaceutical injectables
Pharmacies (ASOP), a 501(c)(4) social welfare organization engaged on the in Europe. Cohen PA, Venhuis BJ, Brandt SD, editors. Drug Test
issue of illicit online pharmacies, academic advisory board. T Mackey Anal. 2016 Mar;8(3–4):398–401.
received funding from ASOP for a pilot research grant exploring the 16. Mackey TK, Liang BA. Improving global health governance to com-
association between prescription drug abuse risks and social media not bat counterfeit medicines: a proposal for a UNODC-WHO-Interpol
related to this study. There was no involvement of anyone other than the trilateral mechanism. BMC Med. 2013;11:233.
authors in the conception, design, collection, planning, conduct, analysis, 17. Hamilton WL, Doyle C, Halliwell-Ewen M, et al. Public health inter-
interpretation, writing, and discussion to submit this work. The authors ventions to protect against falsified medicines: a systematic review
have no other relevant affiliations or financial involvement with any of international, national and local policies. Health Policy Plan. 2016
organization or entity with a financial interest in or financial conflict Dec;31(1):1448–1466.
with the subject matter or materials discussed in the manuscript apart •• A comprehensive review detailing various policy approaches
from those disclosed. to tackling fake medicines.
18. Dipika Bansal SMKGPT Anti-counterfeit technologies: a pharmaceu-
tical industry perspective. Sci Pharm. Österreichische Apotheker-
ORCID Verlagsgesellschaft, m. b. H. 2013 Mar 1;81(1):1.
19. Amon JJ Dangerous medicines: unproven AIDS cures and counter-
Tim K. Mackey http://orcid.org/0000-0002-2191-7833 feit antiretroviral drugs. Global Health. BioMed Central Ltd. 2008
Feb 27;4(1):5.
20. Newton PN, Green MD, Mildenhall DC, et al. Poor quality vital anti-
malarials in Africa - an urgent neglected public health priority.
References
Malar J. BioMed Central. 2011 Dec 13;10(1):352.
Papers of special note have been highlighted as either of interest (•) or of 21. Nayyar GM, Breman JG, Newton PN, et al. Poor-quality antimalarial
considerable interest (••) to readers. drugs in southeast Asia and sub-Saharan Africa. Lancet Infect Dis.
1. Mackey TK, Liang BA. The global counterfeit drug trade: patient 2012 Jun;12(6):488–496.
safety and public health risks. J Pharm Sci. 2011 Nov;100(11):4571– 22. Mackey TK, Liang BA, York P, et al. Counterfeit drug penetration
4579. into global legitimate medicine supply chains: a global assessment.
2. Jack A. Counterfeit medicines. Bitter pills. BMJ: british medical jour- Am J Trop Med Hyg. American Society of Tropical Medicine and
nal. Br Med J Publishing Group. 2007 Dec 1;335(7630):1120–1121. Hygiene. 2015 Jun;92(6 Suppl):59–67.
3. Growing threat from counterfeit medicines. Bull World Health •• This report is the first to analyze data on counterfeit medicine
Organ. 2010 Apr;88(4):247–248. penetrations in the global drug supply chain.
EXPERT OPINION ON DRUG SAFETY 599
23. Nayyar GML, Attaran A, Clark JP, et al. Responding to the pandemic 42. Wertheimer AI, Norris J Safeguarding against substandard/counter-
of falsified medicines. Am J Trop Med Hyg. American Society of feit drugs: mitigating a macroeconomic pandemic. Res Social Adm
Tropical Medicine and Hygiene. 2015 Jun;92(6 Suppl):113–118. Pharm. Elsevier. 2009 Mar;5(1):4–16.
24. Nayyar GML, Breman JG, Herrington JE The global pandemic of 43. Karunamoorthi K The counterfeit anti-malarial is a crime against
falsified medicines: laboratory and field innovations and policy humanity: a systematic review of the scientific evidence. Malar J.
perspectives. Am J Trop Med Hyg. American Society of Tropical BioMed Central Ltd. 2014 Jun 2;13(1):209.
Medicine and Hygiene. 2015 Jun;92(6 Suppl):2–7. 44. Tabernero P, Fernández FM, Green M, et al. Mind the gaps–the
25. Wigand RT, Mande DM, Wood JD. Information management and epidemiology of poor-quality anti-malarials in the malarious
tracking of drugs in supply chains within the pharmaceutical indus- world–analysis of the worldwide antimalarial resistance network
try. Eighth International Conference on Information Technology: database. Malar J. BioMed Central. 2014;131:139.
New Generations. 2011;500–507. 45. Kovacs S, Hawes SE, Maley SN, et al. Technologies for detecting
26. QuintilesIMS. Global medicines use in 2020: outlook and falsified and substandard drugs in low and middle-income coun-
Implications. www.imshealth.com [Internet]. Nov 2015. Available tries. Sullivan DJ, editor. Plos ONE. 2014 Mar 26;9(3):e90601.
from: http://www.imshealth.com/en/thought-leadership/quintile •• A comprehensive review of existing technologies to combat
sims-institute/reports/global-medicines-use-in-2020. fake medicines that this study adds to.
27. Masoumi AH, Yu M, Nagurney A. A supply chain generalized net- 46. Coustasse A, Arvidson C, Rutsohn P Pharmaceutical counterfeiting
work oligopoly model for pharmaceuticals under brand differentia- and the RFID technology intervention. J Hosp Mark Public
tion and perishability. Trans Res Part E: Logis Trans Rev. 2012 Jul;48 Relations. Taylor & Francis Group. 2010 Jul;20(2):100–115.
(4):762–780. 47. Mackey TK, Liang BA. Pharmaceutical digital marketing and gov-
28. Taylor D. RFID in the pharmaceutical industry: addressing counter- ernance: illicit actors and challenges to global patient safety and
feits with technology. J Med Syst. 2014 Nov;38(11):141. public health. Global Health. 2013 Oct 16;9(1):45.
29. Bailey W Globalization of the Life Sciences Supply Chain. 48. Maxwell SRJ, Webb DJ. Internet pharmacy: a web of mistrust? Bjcp.
wwwpwccom [Internet]. January/February 2011. Available from: 2008 Aug;66(2):196–198.
http://www.pwc.com/us/en/health-industries/assets/pdf/globaliza 49. Montoya ID. The root cause of patient safety concerns in an
tion-of-the-life-sciences-supply-chain.pdf Internet pharmacy. Expert Opin Drug Saf. 2008 Jul;7(4):337–341.
30. Tremblay M. Medicines counterfeiting is a complex problem: a 50. Liang BA, Mackey T. Searching for safety: addressing search engine,
review of key challenges across the supply chain. Curr Drug Saf. website, and provider accountability for illicit online drug sales. Am
2013 Feb;8(1):43–55. J Law Med. 2009;35(1):125–184.
31. ISMP. Gray market, black heart: pharmaceutical gray market finds a 51. Mackey TK, Nayyar G Digital danger: a review of the global public
disturbing niche during the drug shortage crisis [Internet]. ismp. health, patient safety and cybersecurity threats posed by illicit
org. 2011 [cited 2011 Sep 26]. Available from: http://www.ismp.org/ online pharmacies. Br Med Bull. Oxford University Press. 2016
Newsletters/acutecare/showarticle.asp?ID=3 Jun;118(1):110–126.
32. Rosenthal ET The “gray market” raises concerns about cost, safety, •• Review article specifically outlines the unique challenges faced
and ethics. JNCI J Natl Cancer Inst. Oxford University Press. 2012 by illicit online pharmacies to drug safety.
Feb 8;104:168–170. 52. Liang BA, Mackey T. Direct-to-consumer advertising with interac-
33. Hemalatha R, Rao AS. Electronic solutions for combating counter- tive internet media: global regulation and public health issues.
feit drugs. J Pharm Bioallied Sci Medknow Publications. 2015 Jul;7 Jama. 2011 Feb 23;305(8):824–825.
(3):230–232. 53. Mackey TK, Liang BA. Global reach of direct-to-consumer advertis-
34. Mackey TK, Cuomo R, Guerra C, et al. After counterfeit Avastin – ® ing using social media for illicit online drug sales. J Med Internet
what have we learned and what can be done? Nat Rev Clin Oncol. Res. 2013;15(5):e105.
2015 May;12(5):302–308. 54. Orizio G, Merla A, Schulz PJ, et al. Quality of online pharmacies and
35. Cuomo RE, Mackey TK. An exploration of counterfeit medicine websites selling prescription drugs: a systematic review. J Med
surveillance strategies guided by geospatial analysis: lessons Internet Res. 2011;13(3):e74.
learned from counterfeit Avastin detection in the US drug supply 55. Ivanitskaya L, Brookins-Fisher J, O Boyle I, et al. Dirt cheap and
chain. BMJ Open. British Med J Publishing Group. 2014;4(12): without prescription: how susceptible are young US consumers to
e006657–7. purchasing drugs from rogue internet pharmacies? J Med Internet
36. Cuomo RE, Mackey TK, Stigler P. The economics of counterfeit Res. [Internet] 2010; 122. Available from: /pmc/articles/
Avastin: a geospatial and statistical analysis of demographic corre- PMC2885783/?report=abstract
lates to FDA warning letters. Pharmacoepidemiol Drug Saf. 2015 56. WHO. Safety and security on the Internet: challenges and advances
Jul;24(7):748–756. in member states [Internet]. WHO. 2011 [cited 2013 Mar 5]. Available
37. Kohler JC, Mackey TK, Ovtcharenko N. Why the MDGs need good from: http://www.who.int/goe/publications/goe_security_web.pdf
governance in pharmaceutical systems to promote global health. 57. Fittler A, Bősze G, Botz L. Evaluating aspects of online medication
BMC Public Health. BioMed Central Ltd. 2014;141:63. safety in long-term follow-up of 136 Internet pharmacies: illegal
38. Baghdadi-Sabeti G, Kohler JC, Wondemagegnehu E Measuring rogue online pharmacies flourish and are long-lived. J Med Internet
transparency in the public pharmaceutical sector: assessment Res. 2013;15(9):e199.
instrument [Internet]. apps.who.int. 2009 [cited 2013 Feb 26]. 58. Fadlallah R, El-Jardali F, Annan F, et al. Strategies and systems-level
Available from: http://apps.who.int/medicinedocs/documents/ interventions to combat or prevent drug counterfeiting: a systema-
s16732e/s16732e.pdf tic review of evidence beyond effectiveness. Pharmaceut Med.
39. Mackey TK, Kohler JC, Savedoff WD, et al. The disease of corrup- Springer International Publishing. 2016;305:263–276.
tion: views on how to fight corruption to advance 21(st) century 59. Kesselheim AS, Avorn J, Sarpatwari A. The high cost of prescription
global health goals. BMC Med Biomed Central. 2016 Sep 29;14 drugs in the United States: origins and prospects for reform. Jama.
(1):149. 2016 Aug 23;316(8):858–871.
40. Mackey TK, Liang BA. Combating healthcare corruption and fraud 60. Orizio G, Rubinelli S, Schulz PJ, et al. “Save 30% if you buy today.”
with improved global health governance. BMC Int Health Hum Online pharmacies and the enhancement of peripheral thinking
Rights. 2012;12(1):23. in consumers. Pharmacoepidemiol Drug Saf. 2010 Sep;19(9):970–
41. Nsimba SED. Problems associated with substandard and counter- 976.
feit drugs in developing countries: a review article on global impli- 61. Naughton B, Roberts L, Dopson S, et al. Effectiveness of medicines
cations of counterfeit drugs in the era of antiretroviral (ARVs) drugs authentication technology to detect counterfeit, recalled and
in a free market economy. East Afr J Public Health. 2008 Dec;5 expired medicines: a two-stage quantitative secondary care study.
(3):205–210. BMJ Open. 2016 Dec 9;6(12):e013837.
600 T. K. MACKEY AND G. NAYYAR
62. Li L. Technology designed to combat fakes in the global supply Chain Management and Information Systems (SCMIS), 2010 8th
chain. Bus Horiz. 2013 Mar;56(2):167–177. International Conference on 2010 Oct 6 (pp. 1–5). IEEE.
63. pwc. Digitization in pharma: gaining an edge in operations 82. Kaul SD, Awasthi AK RFID authentication protocol to enhance
[Internet]. strategyand.pwc.com. 2016 [cited 2017 Jan 30]. patient medication safety. J Med Syst. Springer US. 2013 Dec;37
Available from: http://www.strategyand.pwc.com/reports/digitiza (6):9979.
tion-in-pharma 83. Schapranow MP, Nagora M, Zeier A. CoMoSeR: cost model for
64. International Telecommunication Union. Press Release: ITU releases security-enhanced RFID-aided supply chains. InSoftware,
2016 ICT figures. [Internet]. 2016 [cited 2017 Jan 30]. Available Telecommunications and Computer Networks (SoftCOM), 2010
from: http://www.itu.int/en/mediacentre/pages/2016-PR30.aspx International Conference on 2010 Sep 23 (pp. 11–16). IEEE.
65. Isah H. Information and communication technology in combating 84. Choi JB, Rogers J, Jones EC. The impact of a shared pharmaceutical
counterfeit drugs. arxiv.org [Internet]. 2012. Available from: https:// supply chain model on counterfeit drugs, diverted drugs, and drug
arxiv.org/ftp/arxiv/papers/1211/1211.1242.pdf. shortages. InManagement of Engineering and Technology
66. Ur Rehman S, Ur Rasool RU, Ayub MS, et al. Reliable identification (PICMET), 2015 Portland International Conference on 2015 Aug 2
of counterfeit medicine using camera equipped mobile phones. (pp. 1879–1889). IEEE.
InHigh Capacity Optical Networks and Enabling Technologies 85. Nilsson E, Nilsson B, Järpe E. A pharmaceutical anti-counterfeiting
(HONET), 2011 2011 Dec 19 (pp. 273–279). IEEE. method using time controlled numeric tokens. InRFID-
67. Deus L Technological roles in combating drug diversion and coun- Technologies and Applications (RFID-TA), 2011 IEEE International
terfeiting. J Pharm Pract. Sage Publications. 2016 Jun 30;19(3):146– Conference on 2011 Sep 15 (pp. 343–347). IEEE.
152. 86. Alzahrani N, Bulusu N. Securing pharmaceutical and high-value pro-
68. Zedlmayer G mPedigree: a collective impact case study [Internet]. ducts against tag reapplication attacks using NFC tags. InSmart
ssir.org. 2011 [cited 2017 Jan 1]. Available from: https://ssir.org/ Computing (SMARTCOMP), 2016 IEEE International Conference on
articles/entry/mpedigree_a_collective_impact_case_study 2016 May 18 (pp. 1–6). IEEE.
69. You M, Zhong J, Hong Y, et al. Inkjet printing of upconversion 87. Yao X, Zhou X, Ma J. Object event visibility for anti-counterfeiting
nanoparticles for anti-counterfeit applications. Nanoscale. Royal in RFID-enabled product supply chains. InScience and Information
Soc Chem. 2015 Mar 14;7(10):4423–4431. Conference (SAI), 2015 2015 Jul 28 (pp. 141–150). IEEE.
70. Isa NM, Saaidin S, Sulaiman NA, et al. Pharmaceutical product 88. Carley LR, Colak G, Chomas L, et al. Technologies for secure RFID
information based on Android platform. InElectrical, Electronics authentication of medicinal pills and capsules. InRFID Technology
and System Engineering (ICEESE), 2014 International Conference and Applications (RFID-TA), 2016 IEEE International Conference on
on 2014 Dec 9 (pp. 66-70). IEEE. 2016 Sep 21 (pp. 10–15). IEEE.
71. Yu H, Le HM, Kaale E, et al. Characterization of drug authenticity 89. Kim H, Jeong H, Park H. A study on RFID/USN based e-pedigree
using thin-layer chromatography imaging with a mobile phone. J system for cold chain management. InTechnology Management
Pharm Biomed Anal. 2016 Jun;5(125):85–93. Conference (ITMC), 2012 IEEE International 2012 Jun 25 (pp. 137–
72. Yu H, Le H, Lumetta S, et al. Smartphone-based thin layer chro- 143). IEEE.
matography for the discrimination of falsified medicines. 90. Chen C, Zhang F, Barras J, et al. Authentication of medicines using
InSENSORS, 2016 IEEE 2016 Oct 30 (pp. 1–3). IEEE. nuclear quadrupole resonance spectroscopy. IEEE/ACM Trans
73. Jordan F, Kutter M. Identifying counterfeit medicines with industry- Comput Biol Bioinform. 2016 May;13(3):417–430.
suitable technologies. Pharmaceutical Engineering, The Offical 91. Rahman F, Ahamed SI. Looking for needles in a haystack: detecting
Magazine of ISPE. 2012 May;32(3). counterfeits in large scale RFID systems using batch authentication
74. Sinhal K. Soon, bar code & unique no. on pill strips to check fakes protocol. InPervasive Computing and Communications Workshops
[Internet]. 2011 [cited 2017 Jan 30]. Available from: http://timeso (PERCOM Workshops), 2012 IEEE International Conference on 2012
findia.indiatimes.com/india/Soon-bar-code-unique-no-on-pill- Mar 19 (pp. 811–816). IEEE.
strips-to-check-fakes/articleshow/7529728.cms 92. Schapranow M-P, Zeier A, Plattner H, et al. A formal model for
75. NAFDAC Nigeria Mobile Authentication Service (MAS) require- enabling RFID in pharmaceutical supply chains. InSystem Sciences
ments on anti-malarial & antibiotics [Internet]. pharmasecure.com. (HICSS), 2011 44th Hawaii International Conference on 2011 Jan 4
[cited 2017 Jan 30]. Available from: http://www.pharmasecure.com/ (pp. 1–10). IEEE.
NAFDAC%20Nigeria%20MAS%20Newsletter.pdf 93. Freifeld CC, Brownstein JS, Menone CM, et al. Digital drug safety
76. Shuaib H. A national ICT architecture for combating the counterfeit surveillance: monitoring pharmaceutical products in twitter. Drug
drug trade. www.academia.edu [Internet]. 2013. Available from: Saf. Springer International Publishing. 2014 Apr 29;37(5):343–350.
http://s3.amazonaws.com/academia.edu.documents/31545476/ 94. Salathé M, Bengtsson L, Bodnar TJ, et al. Digital Epidemiology.
Drug_anti-Counterfeit_Paper.pdf?AWSAccessKeyId= Bourne PE, editor. Plos Comp Biol. Public Library of Science. 2012
AKIAIWOWYYGZ2Y53UL3A&Expires=1490919434&Signature= Jul 26;8(7):e1002616.
7A8jNasDmFmZzluUKfIJmWBQBKU%3D&response-content-disposi 95. Hay SI, George DB, Moyes CL, et al. Big data opportunities for
tion=inline%3B%20filename%3DHaffiz_Shuaib_A_National_ICT_ global infectious disease surveillance. Plos Med. Public Library of
Architectur.pdf. Science. 2013 Apr 2;10(4):e1001413.
77. Ting SL, Kwok SK, Tsang AHC, et al. Critical elements and lessons 96. Katsuki T, Mackey TK, Cuomo R. Establishing a link between pre-
learnt from the implementation of an RFID-enabled healthcare scription drug abuse and illicit online pharmacies: analysis of twit-
management system in a medical organization. J Med Syst. ter data. J Med Internet Res. 2015;17(12):e280.
Springer US. 2011 Aug;35(4):657–669. 97. Kalyanam J, Katsuki T, R G Lanckriet G, et al. Exploring trends of
78. Huang GQ, Qin Z, Qu T, et al. RFID-enabled pharmaceutical regu- nonmedical use of prescription drugs and polydrug abuse in the
latory traceability system. InRFID-Technology and Applications Twittersphere using unsupervised machine learning. Addict Behav.
(RFID-TA), 2010 IEEE International Conference on 2010 Jun 17 (pp. 2017 Feb;65:289–295.
211–216). IEEE. 98. Obermeyer Z, Emanuel EJ. Predicting the future — big data,
79. Hall C. Technology for combating counterfeit medicine. Pathog machine learning, and clinical medicine. N Engl J Med. 2016 Sep
Glob Health. 2013 Nov 12;106(2):73–76. 29;375(13):1216–1219.
80. Yao X, Du W, Zhou X, et al. Security and privacy for data mining of 99. Adrover C. Identifying adverse effects of HIV drug treatment and
RFID-enabled product supply chains. InSAI Computing Conference associated sentiments using twitter. JMIR Public Health Surveill.
(SAI), 2016 2016 Jul 13 (pp. 1037-1046). IEEE. 2015;1(2):e7. JMIR Publications Inc., Toronto, Canada http://publi
81. Ting SL, Kwok SK, Albert HT, et al. Enhancing the information chealthjmirorg/2015/2/e7/
transmission for pharmaceutical supply chain based on Radio 100. O’Connor K, Pimpalkhute P, Nikfarjam A, et al. American Medical
Frequency Identification (RFID) and internet of things. InSupply Informatics Association. Pharmacovigilance on twitter? Mining
EXPERT OPINION ON DRUG SAFETY 601
tweets for adverse drug reactions. AMIA Annu Symp Proc. 120. Mackey TK, Liang BA, Kohler JC, et al. Health domains for sale: the
2014;2014:924–933. need for global health internet governance. J Med Internet Res.
101. Lopes TJS, Shoemaker JE, Matsuoka Y, et al. Frontiers. Identifying 2014;16(3):e62.
problematic drugs based on the characteristics of their targets. 121. Mackey TK, Eysenbach G, Liang BA, et al. A call for a moratorium on
Front Pharmacol. 2015;6:186. the .health generic top-level domain: preventing the commerciali-
102. Zhao J, Henriksson A, Kvist M, et al. American Medical Informatics zation and exclusive control of online health information. Global
Association. Handling temporality of clinical events for drug safety Health. BioMed Central Ltd. 2014 Sep 26;10(1):62.
surveillance. AMIA Annu Symp Proc. 2015;2015:1371–1380. 122. Solomonides AE, Mackey TK Emerging ethical issues in digital
103. Isah H, Trundle P, Neagu D. Social media analysis for product safety health information. Camb Q Healthc Ethics. Cambridge University
using text mining and sentiment analysis. InComputational Press. 2015 Jul;24(3):311–322.
Intelligence (UKCI), 2014 14th UK Workshop on 2014 Sep 8 (pp. 123. Home - .Pharmacy [Internet]. safe.pharmacy. 2017 [cited 2017 Jan
1–7). IEEE. 30]. Available from: http://www.safe.pharmacy/
104. Voss EA, Boyce RD, Ryan PB, et al. Accuracy of an automated 124. Norton S. CIO Explainer: what Is Blockchain? [Internet]. blogs.wsj.
knowledge base for identifying drug adverse reactions. J Biomed com. 2016 [cited 2017 Jan 30]. Available from: http://blogs.wsj.
Inform. 2016 Dec;16(66):72–81. com/cio/2016/02/02/cio-explainer-what-is-blockchain/
105. Wang G, Jung K, Winnenburg R, et al. A method for systematic dis- 125. Mettler M. Blockchain technology in healthcare: the revolution
covery of adverse drug events from clinical notes. J Am Med Inform starts here. Ine-Health Networking, Applications and Services
Assoc. Oxford University Press. 2015 Nov;22(6):1196–1204. (Healthcom), 2016 IEEE 18th International Conference on 2016
106. Li A, Guo X, Xie J, et al. Validation of biomarkers in cardiotoxicity Sep 14 (pp. 1–3). IEEE.
induced by Periplocin on neonatal rat cardiomyocytes using UPLC- 126. Marr B. How blockchain technology could change the world
Q-TOF/MS combined with a support vector machine. J Pharm [Internet]. forbes.com. 2016 [cited 2017 Jan 30]. Available from:
Biomed Anal. 2016 May;10(123):179–185. http://www.forbes.com/sites/bernardmarr/2016/05/27/how-block
107. Drew J, Moore T. Automatic identification of replicated criminal chain-technology-could-change-the-world/
websites using combined clustering. InSecurity and Privacy 127. Harris P Rubix by deloitte on blockchain use cases for the pharma-
Workshops (SPW), 2014 IEEE 2014 May 17 (pp. 116–123). IEEE. ceutical supply Chain [Internet]. 2016 [cited 2017 Jan 30]. Available
108. Koepke J, Kaza S, Abbasi A. Exploratory experiments to identify fake from: /news/rubix-by-deloitte-on-blockchain-use-cases-for-the-phar
websites by using features from the network stack. InIntelligence maceutical-supply-chain/
and Security Informatics (ISI), 2012 IEEE International Conference 128. Shanley A Could blockchain enable secure data transfer? [Internet].
on 2012 Jun 11 (pp. 126–128). IEEE. 2016 [cited 2017 Jan 30]. Available from: http://www.pharmtech.
109. Mavlanova T, Benbunan-Fich R. What does your online pharmacy com/could-blockchain-enable-secure-data-transfer
signal? a comparative analysis of website trust features. InSystem 129. Taylor P Applying blockchain technology to medicine traceability
Sciences (HICSS), 2010 43rd Hawaii International Conference on [Internet]. 2016 [cited 2017 Jan 30]. Available from: https://www.
2010 Jan 5 (pp. 1–10). IEEE. securingindustry.com/pharmaceuticals/applying-blockchain-tech
110. Corona I, Contini M, Ariu D, et al. PharmaGuard: automatic identifica- nology-to-medicine-traceability/s40/a2766/
tion of illegal search-indexed online pharmacies. InCybernetics 130. Holmes B Blockchain Technology Battles Counterfeiting [Internet].
(CYBCONF), 2015 IEEE 2nd International Conference on 2015 Jun 24 bravenewcoin.com. 2015 [cited 2017 Jan 30]. Available from:
(pp. 324–329). IEEE. http://bravenewcoin.com/news/blockchain-technology-battles-
111. Abbasi A, Zahedi F, Kaza S. Detecting fake medical web sites using counterfeiting/
recursive trust labeling. ACM Trans Inf. 2012;30:1–36. 131. Allison I Chronicled launches blockchain-registered supply chain and
112. Der MF, Saul LK, Savage S, et al. Knock it off: profiling the online pharmaceutical packaging [Internet]. 2016 [cited 2017 Jan 30].
storefronts of counterfeit merchandise. the 20th ACM SIGKDD Available from: http://www.ibtimes.co.uk/chronicled-launches-block
international conference. New York, USA: ACM; 2014. p. 10. chain-registered-supply-chain-pharmaceutical-packaging-1592220
113. Lee HS, Bang HC. Detecting counterfeit products using supply 132. Del Castillo M Hyperledger project explores fighting counterfeit
chain event mining. InAdvanced Communication Technology drugs with blockchain [Internet]. 2016 [cited 2017 Jan 30].
(ICACT), 2013 15th International Conference on 2013 Jan 27 (pp. Available from: http://www.coindesk.com/hyperledger-counterfeit-
744–748). IEEE. drugs-blockchain/
114. Zikui L, Xuan G. The regulation model of pharmaceutical logistics 133. IEEE Launches World’s First Virtual Blockchain Workshop Dedicated
based on the supervision of flow. InLogistics Systems and to Advancing HealthTech for Humanity [Internet]. standards.ieee.
Intelligent Management, 2010 International Conference on 2010 org. 2016 [cited 2017 Jan 30]. Available from: http://standards.ieee.
Jan 9 (Vol. 2, pp. 1055–1059). IEEE. org/news/2016/virtual_blockchain.html
115. Banerjee S, Sweet J, Sweet C, et al. Visual recognition of paper 134. Blockchain for Pharma. Internet. 2017 [cited 2017 Jan 30]. Available
analytical device images for detection of falsified pharmaceuticals. from: http://beyondstandards.ieee.org/tag/blockchain-for-pharma/
InApplications of Computer Vision (WACV), 2016 IEEE Winter 135. The BlockRx Project [Internet]. blockrx.com. 2016 [cited 2017 Jan
Conference on 2016 Mar 7 (pp. 1–9). IEEE. 30]. Available from: http://www.blockrx.com/
116. NABP. VIPPS - national association of boards of pharmacy 136. Zadbuke N, Shahi S, Gulecha B, et al. Recent trends and future of
[Internet]. nabp.net. [cited 2011 Sep 21]. Available from: http:// pharmaceutical packaging technology. J Pharm Bioallied Sci. 2013
www.nabp.net/programs/accreditation/vipps/ Apr;5(2):98–110.
117. EU logo for online sale of medicines [Internet]. ec.europa.eu. 2016 137. Jamrógiewicz M. Application of the near-infrared spectroscopy in the
[cited 2016 Jan 11]. Available from: http://ec.europa.eu/health/ pharmaceutical technology. J Pharm Biomed Anal. 2012 Jul;66:1–10.
human-use/eu-logo/index_en.htm 138. Culzoni MJ, Dwivedi P, Green MD, et al. Ambient mass spectro-
118. LegitScript. Rogues and registrars: are some domain name regis- metry technologies for the detection of falsified drugs. Med Chem
trars safe havens for internet drug rings? [Internet]. [cited 2014 Jun Commun. Royal Society of Chemistry. 2014;51:9–19.
17]. Available from: http://www.legitscript.com/download/Rogues- 139. Pal SN, Olsson S, Brown EG The monitoring medicines project: a
and-Registrars-Report.pdf multinational pharmacovigilance and public health project. Drug
119. LegitScript. The-Internet-Pharmacy-Market-in-2016. Trends, Saf. Springer International Publishing. 2015 Apr;38(4):319–328.
Challenges and Opportunities. [Internet] [cited 2017 Mar 30]. 140. Fukuoka T, Yamaguchi A, Hara R, et al. Application of gold nano-
Available from: https://safemedsonline.org/resource/the-internet- particle self-assemblies to unclonable anti-counterfeiting technol-
pharmacy-market-in-2016-trends-challenges-and-opportunities/ ogy. InElectronic Packaging and iMAPS All Asia Conference (ICEP-
602 T. K. MACKEY AND G. NAYYAR
IACC), 2015 International Conference on 2015 Apr 14 (pp. 432– 142. Richards N, Hudson I. UK medicines regulation: responding to
435). IEEE. current challenges. Br J Clin Pharmacol. 2016 Dec;82(6):1471–
141. Das RN, Egitto FD, Lin H. Anti-counterfeit, miniaturized, and 1476.
advanced electronic substrates for medical device applications. In 143. Fayzrakhmanov NF. Fighting trafficking of falsified and substandard
Electronic Components and Technology Conference (ECTC), 2013 medicinal products in Russia. Int J Risk Saf Med. IOS Press.
IEEE 63rd 2013 May 28 (pp. 523–528). IEEE. 2015;27Suppl 1(s1):S37–40.