Professional Documents
Culture Documents
Food Control: A B C D
Food Control: A B C D
Food Control
journal homepage: www.elsevier.com/locate/foodcont
A R T I C LE I N FO A B S T R A C T
Keywords: Food fraud – intentional deception for economic gain using food – is an emerging research field due to increased
Food fraud awareness of the health hazard, increased regulatory scrutiny, increased awareness of the costs, a seemingly
Vulnerability endless stream of identified incidents, and new compliance requirements. Beyond the laws and regulations that
Assessment are being more routinely applied, commercial standards have expanded to address food fraud. Specifically, since
Crime
January 2018 the Global Food Safety Initiative (GFSI) has required that Food Safety Management Systems
Prevention
Food fraud prevention cycle
include a Food Fraud Vulnerability Assessment (FFVA) and a Food Fraud Prevention Strategy (FFPS). When an
entity begins to address the topic, the first consideration is what is food fraud and includes is food fraud really a
problem, the focus then shifts to how to detect food fraud including the development of test methods. At that point,
there are more fundamental and practical implementation questions such as how to start, what to do, and how
much is enough, and how to measure success. The review of these questions has resulted in one unmet need for a
method to manage the information and activities in the FFPS. Consideration of these concepts provided the
realization that there was a need to connect the steps into an interconnected and dynamic system. The objective
was to connect everything to everything. The Food Fraud Prevention Cycle (FFPC) was developed to meet this
unmet need. This research paper includes four illustrative examples including a response to: new public policy
priorities, a new food fraud incident, and a review of a new countermeasure or control system. The adoption of a
holistic and all-encompassing information management cycle will enable a harmonized approach and the
sharing of best practices.
1. Introduction & Luning, 2017; van Ruth, Luning, Silvis, Yang, & Huisman, 2018).
As stakeholders, including companies and countries, begin to sys-
Food fraud is an emerging food industry challenge that has started temize their approach to the food fraud problem there is an increasing
to be a peer-review publication research topic. As the focus on food focus on management systems and methods. This article builds upon
fraud has shifted from defining the topic to assessing incidents, a stream hazard identification and risk assessment research components of the
of research has provided a more comprehensive review of the under- risk analysis cycle, and shifts focus to the importance of building a
lying concepts (Everstine, Spink, & Kennedy, 2013; Moore, Spink, & foundation for risk management and risk communication. There is an
Lipp, 2012; Spink & Moyer, 2011; Spink, Moyer et al., 2015), and the evaluation of the acceptable/unacceptable level of risk or what is referred
development of new methodologies for managing food fraud (among to as risk tolerance or risk appetite during the Risk Management step in
others, see SSAFE 2015, USP 2015, Spink, Moyer et al., 2016a,b; Reilly, the process of Risk Analysis (COSO 2012a, 2012b; ISO 2009; ISO 2017).
2018, pp. I–21). The underlying concepts of risk versus vulnerability and This project builds upon previous related Food Control Journal
prevention versus mitigation were recently reviewed (Bréchon, Hanner, & articles including “Introducing the Food Fraud Initial Screening Model
Mariani, 2016; DEFRA 2014; Lord, Flores Elizondo et al., 2017; Lord, (FFIS)” (Spink, Moyer, & Speier-Pero, 2016a), “The Economics of a
Spencer et al., 2017; Manning & Soon, 2016; Primrose, Woolfe, & Food Fraud Incident Case Studies and Examples Including Melamine in
Rollinson, 2010; Spink, Ortega, Chen, & Wu, 2017; van Ruth, Huisman, Wheat Gluten” (Moyer, DeVries, & John Spink, 2017). In addition to
∗
Corresponding author.
E-mail addresses: spinkj@msu.edu (J. Spink), Weina.Chen@effem.com (W. Chen), Guangtao.Zhang@effem.com (G. Zhang),
cspero@broad.msu.edu (C. Speier-Pero).
https://doi.org/10.1016/j.foodcont.2019.06.002
Received 6 April 2019; Received in revised form 31 May 2019; Accepted 1 June 2019
Available online 03 June 2019
0956-7135/ © 2019 Elsevier Ltd. All rights reserved.
J. Spink, et al. Food Control 105 (2019) 233–241
those articles, this new Food Fraud Prevention Cycle concept builds activities, there is usually no single law that directly addresses food
upon many other related works such as “Defining the Public Health fraud in isolation. Thus, it is possible that some aspects of food fraud (as
Threat of Food Fraud” and “The role of the public private partnership in defined), are not holistically covered from a regulatory standpoint, and
Food Fraud prevention — includes implementing the strategy” (Spink it is important to delineate that all types of food fraud are clearly illegal.
and Moyer, 2011, Spink et al., 2016b).
a. The Food Risk Matrix and Compliance Requirements
2. The Food Fraud Prevention Strategy development
To understand the scope of food fraud it is useful to review the topic
Food fraud is an intentional deception for economic gain using in relation to all food risks including (and see glossary for other related
food1 (CFSA 2015a, 2015b; CODEX 2017; DEFRA 2014; European terms) (Fig. 1) (Spink & Moyer, 2011):
Parliament 2013; GFSI 2014; ISO 2005; ISO 2011a; Spink & Moyer,
2011). This definition is correlated with the broader August 2018 ISO • food safety: unintentional acts that cause public health harm;
definition of: • food quality: unintentional act that does not cause public health
“Product Fraud: wrongful or criminal deception that utilizes ma- harm;
terial goods for financial or personal gain; Note 1 to entry: Fraud means • food defense: intentional act with the intent of causing public health,
wrongful or criminal deception intended to result in a financial or terror, or economic harm.
personal gain that creates social or economic harm” (ISO 2018).
The types of food fraud include: adulterant-substance2 (e.g., adul- The focus of the Food Risk Matrix is on the root cause motivation for
terant, adulteration: including dilution, substitution, concealment, un- why the human adversary identified and acted upon a fraud opportu-
approved enhancements), mislabelling or misbranding, tampering, grey nity. The focus on the intricate detail is a primary Criminology re-
market or diversion, smuggling, stolen goods such as cargo theft and quirement for Situational Crime Prevention which seeks to reduce that
organized retail theft, and counterfeiting (Intellectual Property Rights - fraud opportunity. A food safety or food quality risk is unintentional
IPR) (GFSI 2018; Spink, 2019d). Food fraud can occur across all types of and the adversary did not try to create this problem. The root cause is a
products that include: raw materials, incoming goods, goods in manu- lack of awareness or an unknown system problem. A food fraud risk is
facturing, goods in storage, products at retailers, and also through to intentional and the adversary is tryng to NOT get caught while ex-
destruction or disposal. There are different industry stakeholders that ploiting a perceived system weakness. Similarly, a food defense risk is
include: those within the immediate supply chain including brand intentional and the adversary is trying to create harm that is economic,
owners such as producers, manufacturers, food distributors, and re- public health, or terror. Food fraud prevention requires a fundamen-
tailers; support and secondary stakeholders including research or gui- tally different approach that for food safety since there is an intelligent
dance service providers such as academics or management consultants; adversary who actively seeks to avoid detection.
and then contract research and testing services including technology Food fraud prevention has become a management requirement for
suppliers and including authenticity affirmation (e.g., test of the pro- food standards such as those organized by the Global Food Safety
duct, transaction analysis, or external component), data management, Initiative (GFSI) (GFSI 2017). GFSI was created in 2002 by a group of
investigations, audits, market monitoring, and others (Spink, 2018; global companies under the Consumer Goods Forum and now is a re-
Spink et al., 2019c). There are also different government stakeholders quirement for their members which reportedly equate to approximately
such as the regulators and law enforcement who are required to im- 65% of the world food trade. GFSI initially focused on large multi-na-
plement the laws and regulations, the prosecutors who decide which tional companies, whilst also expanding to smaller enterprises through
cases are brought to the court, the criminal justice system which in- organizations such as Codex Alimentarius (Codex), World Health Or-
cludes judges and prosecutors assigning penalties including incarcera- ganization (WHO) and the United Nations Food and Agricultural Or-
tion, and finally, the entire process starts with the creation of new laws ganization (FAO). GFSI published their Guidance Document stating the
and allocation of funds by legislative branches such as a parliament or expected requirements of a Food Safety Management System (FSMS).
congress. As of January 2018, there is a GFSI requirement for a written Food
There are a breadth of laws and regulations that arbitrate food fraud Fraud Vulnerability Assessment and a written Food Fraud Prevention
including food, public health, consumer protection, commercial trans- Strategy (or also referred to as a Food Fraud Mitigation Plan) – this is
actions, customs and smuggling. Given this breadth of agencies and NOT an optional component of a GFSI-endorsed food safety certifica-
tion (GFSI 2017) [for more on prevention versus mitigation see Spink
et al., 2017]. The GFSI definition and scope include all types of fraud
1
Note: The current, but not final, public draft of the Codex Alimentarius (see list above) and all products (see list above) (GFSI 2014; GFSI 2017;
Electronic Work Group on Food Integrity and Food Authentication definition of
GFSI 2018). The GFSI types of fraud are consistent with other global
food fraud is “Any deliberate action of organizations or individuals to deceive
activities such as CODEX, who in their food fraud related electronic
others for economic gain or avoidance of an economic loss in regards to the
integrity of food to gain undue advantage. Types of food fraud include but are
working group state “Types of food fraud include but not limited to:
not limited to: adulteration, substitution, dilution, tampering, simulation, adulteration, substitution, dilution, tampering, simulation, counter-
counterfeiting, and misrepresentation” (Codex, 2017). At this time Codex is also feiting, and misrepresentation” (CODEX 2017).
defining food integrity but does not have a definition of adulterant or adul-
teration. 2.1. New research perspectives
2
From Spink, Hegarty, Fortin, and Elliott (2019a), “The term “adulterant-
substance” is used here to be clear that this is referring to a “substance” not the There are four new perspectives when considering how to address
broader class of “adulteration” or “adulterated foods” which often does not food fraud prevention holistically which differ from a traditional
necessarily require an “adulterant.” There is often confusion since the US Food HACCP (Hazard Analysis and Critical Control Point plan) and food
Drug & Cosmetics Act “Adulterated Food” section applies to concepts such as
safety or TACCP (Threat Analysis and Critical Control Point plan) and
spoiled products or stolen goods. Spoiled products and stolen goods are gen-
food defence approach. These new perspectives include: (1) when fo-
uine, authentic products and do not include an “adulterant.” In 2017, the US
Pharmacopeia defined “adulterant” as “any undeclared biological or chemical cusing on the diagnosis or root-cause, food fraud is a fundamentally
agent, foreign matter, or other substance in food that may (though not ne- different problem than food safety, food quality, or food defense; (2) the
cessarily) compromise food safety or suitability” (USP 2017). Codex Ali- need to shift focus from incident risk mitigation to strategic vulnerability
mentarius does not have a definition of adulterant, adulterated, or adulteration prevention (Spink et al., 2017); (3) shifting the mindset from only Food
(CODEX, 2018). Science to an interdisciplinary approach; and finally (4) applying
234
J. Spink, et al. Food Control 105 (2019) 233–241
Food Fraud
Quality Fraud (1) Gain: Economic Food Fraud
Screening/
Food Fraud Vulnerability
Harm: Strategy
Food Food Public Health,
(3)
are evidenced in the call for projects including: Standardisation and
harmonisation of untargeted food integrity methods, Innovative ap-
proaches to assure the integrity of complex foods, A feasibility study of
Fig. 1. The Food Risk Matrix (Spink & Moyer, 2011) [Notes: (1) Among others,
includes the subcategories of economically motivated adulteration (EMA) and how information can be shared along the supply chain to identify risks
food counterfeiting; (2) Among others, includes the subcategory of terrorism; to the integrity of food, and Rapid, on-site, cost-effective methods for
(3) the act of a stakeholder whether an accidental act by a legitimate stake- feed/food fraud detection (ref fip fera).
holder or an intentional deception by a fraudster or an intentional harm by an
attacker, and (4) the objective of the intentional action].
2.2. First: addressing food fraud is Fundamentally Different from addressing
food safety
decision analysis and business risk assessment to examine food fraud in
the same way as all enterprise-wide issues (Fig. 2). It is important to As research in food fraud continues to develop, it is increasingly
identify the range of disciplines that contribute to an improved un- clear that food fraud and food safety are very different issues. Relative
derstanding of food fraud and hence capability to address it but ela- to food safety, one identified gap when investigating food fraud relates
boration of each is beyond the scope of this paper. To address the to the processes of managing information and making decisions. One
complex nature of food fraud prevention, the interdisciplinary ap- capability that has been developed to address this gap is the Food Fraud
proach includes, but is not limited to: Food Science/Food Authenticity, Vulnerability Assessment, which provides a basic overview of the pro-
Criminology, Managerial Accounting, Financial Accounting, Public blem and facilitates decision-making on the scope and depth of the
Policy, Law, Supply Chain Management, Packaging Science, Informa- Food Fraud Prevention Strategy. The information and activities in the
tional Technology, Social Anthropology. Food Fraud Prevention Strategy are managed by the Food Fraud
It is important to note that the importance of food science and food Prevention Cycle (FFPC) (Fig. 3).
authenticity may seem under-represented here but it is because they are
considered a constant and thoroughly established resource. Once the
specific problem is identified, and the type of fraud defined, there are 2.3. Second: the shift from incident risk mitigation to strategic vulnerability
resources and capabilities to address the problems. An example is the prevention
Euro 13 million that was allocated by the European Commission to the
Food Integrity Project (food authenticity) in 2014 shortly after the 2013 The second new perspective was the realization that incident re-
Europe-wide horsemeat incident. The resources and focus on detection sponse methods are not usually efficient or effective to support the goal
of overall strategic prevention. A current food fraud event requires an
Risk to Vulnerability
• Diagnosis: Monitor the system weaknesses not probability of
occurence.
235
J. Spink, et al. Food Control 105 (2019) 233–241
immediate incident response. These actions focus on finding and then is human then it is natural to apply Social Science and Criminology”
removing the illicit product that is in the marketplace. Detecting frau- (IUFoST 2016). In retrospect, this Social Science view is entirely logical,
dulent product is critical – however, it is neither prevention nor is it a but when food fraud was considered only a food safety problem, it was a
firm strategy to address food fraud. The focus on strategic prevention is novel concept. When extending food safety to food fraud, one must
a longer-term perspective that shifts the focus from catching bad pro- consider an intelligent human adversary is purposely engaging in crime
duct to preventing the incident from occurring in the first place. in order to generate economic gain, thus Criminology becomes the most
To provide richness to these new perspectives, consider a food fraud applicable science.
incident when pets became sick in the United States. The first step was to Criminology involves two primary perspectives: traditional crimin-
determine the root cause. The overall adulterant-substance motivation ology that focuses on the criminal, and environmental criminology that
was to deceive protein tests. The tests were deceived by reducing the focuses on the physical space where the crime occurs. Regardless of the
amount of authentic protein with the melamine molecule. Once illeg- perspective, both types of Criminology emphasize reducing the oppor-
ally added melamine was identified as the problem3 which is more di- tunity for crime to occur (Felson, 2013, pp. 92–99; Felson & Clarke,
rectly referred to as the “fraud opportunity,” the key next step was to 1998). The specific environmental criminology concepts that were
detect the adulterant-substance for the products in the marketplace. The presented in seminal works such as “Crime in Everyday Life” are Si-
continuing melamine detection tests would deter melamine from con- tuational Crime Prevention which, itself, is a combination of Routine
tinuing to get into the marketplace. The incident response was specific Activities Theory and Rational Choice Theory (Felson, 1998; Felson &
for detecting melamine that was in product. The response is not pre- Boba, 2010). These concepts were developed in the 1970s, and a 2017
vention and the countermeasures were not specifically focused on re- scholarly literature database keyword search for situational crime pre-
ducing the overall fraud opportunity of perpetrators even considering vention resulted in over 10,000 peer-review journal articles since 2000.
attacking the pet food and high-value ingredients. The fundamentally Situational Crime Prevention is most efficient for companies or
different approach is to first consider the root cause of the entire fraud countries because target hardening can lead to a direct and immediate
opportunity using criminology theories. This is followed by a review of impact. For example, to reduce the concern of being pick-pocketed
the resource-allocation decision-making process, which might include someone can hold their wallet in their hand. In this example, the
understanding a firm's supply chain and cost accounting as well as countermeasure or control system can be immediate, can be initiated by
regulatory/public policy issues within and across countries. This step the user, has very limited if any financial cost, and has an immediate
includes a vulnerability assessment identifying which problems are reduction in the potential for a crime to occur.
above a pre-defined risk tolerance. After those three steps, an optimal, Situational Crime Prevention is often presented visually in the form
efficient, and effective set of countermeasures and control systems can of the Crime Triangle which consists of three major components which
be proposed, approved, implemented, and managed. The FFPC com- are: victim, fraudster, and guardian and hurdle gaps (Fig. 4) (Spink &
prises each of these steps, including the ongoing management and re- Moyer, 2011).
calibration up or down of the risk treatments. Situational Crime Prevention is based on other criminology theories
The new insight from the FFPC starts in the intervention step after a that help to explain the fraud opportunity and identify crime-reducing
food fraud event. Building upon the United States Food and Drug activities. These include understanding the type of criminals and of-
Administration (FDA) Food Protection plan (FPP), an intervention step is fender organizations (Spink, Moyer, Park, & Heinonen, 2013), applying
a response to a problem. For example, in the case of melamine in infant victimology theories (Lanier & Henry, 2004), and more applied problem-
formula, the intervention step was to identify the root cause of the public oriented policing such as is presented in “Crime Analysis for Problem
health threat and then establish detection methods to identify the Solvers In 60 Small Steps text”) (Clarke & Eck, 2005). This concept of
adulterant-substance. After the problem is defined, then the next stage identifying the types of criminal and offender organizations is being
is the response step. For example, for the melamine incident, the re- codified in works such as the International Organization for Standar-
sponse was recalling a product from the market and treating the public disation (ISO) Technical Committee 292 on Security Management and
health incident. Finally, to reduce or mitigate the root-cause, there is a Resilience (ISO 2017). Specifically, this is introduced in ISO 22380
need to shift from being reactive to proactive, implementing counter- Security and Resilience – “Authenticity, Integrity, and Trust for Pro-
measures and control systems that support the prevention step (Spink & ducts and Documents – General Principles for Product Fraud Risk” and
Moyer, 2011). After the intervention and response, a prevention strategy ISO 12931 “Performance criteria for authentication solutions used to
to address the problem is needed. For example, in the melamine ex- combat counterfeiting of material goods” (ISO 2018).
ample, prevention might include: conducting routine adulterant testing,
researching for new or different types of food fraud, assessing system 2.5. Fourth: correlating the food fraud risks with all enterprise-wide risks
weaknesses that enabled the fraud, finally, a more general considera-
tion of the root-cause that could apply to other adulterant-substances or The fourth new perspective was the realization that there was a lack
to other types of products. of a methodological and standardized approach to the resource-allo-
cation decision-making for addressing food fraud. While there are often
acceptable/unacceptable thresholds defined in laws or regulations for
2.4. Third: expanding to include social sciences and criminology food safety and public health incidents (e.g., a 5-log kill step is required
for FDA Juice HACCP compliance), the same type of specifications do
The third new perspective was to develop an inter-disciplinary not always apply to or exist for food fraud. Just as the prior perspective
mindset shift extending beyond Food Science and food authenticity discussed incorporating an interdisciplinary perspective when looking
testing to include Social Science and Criminology. This shifts the focus at food fraud, there is similar value in drawing on guidance from other
from microbes and microbiology to humans and social science. It has disciplines when guiding resource allocation decisions. More specifi-
been said, “if the biological organism in question is a microbe then it is cally, food safety and food fraud decisions can be more broadly ex-
natural to apply Microbiology; since the biological organism in question amined and informed by drawing on enterprise risk management
(ERM), a rich research stream drawn from different business fields (e.g.,
3
The term “problem” is used in Criminology. Problem: “… the basic units of accounting, management, strategy, etc.). Enterprise risk management
police work rather than a crime, a case, calls, or incidents. A problem is has been widely adopted by firms. One widely used approach for op-
something that concerns or causes harm to citizens, not just the police. […] erationalizing ERM emerged out of firm compliance to the U.S.
Addressing problems means more than quick fixes: it means dealing with Sarbanes-Oxley Act in 2002 that increased firm financial regulatory
conditions that create problems” (Clarke et al., 2005). requirements in response to Enron and other financial improprieties
236
J. Spink, et al. Food Control 105 (2019) 233–241
Environmental Criminology
ps
Ga
le
rd
ST
Hu
AR
nd
T
na
The Fraud
dia
ar
Gu
Opportunity
Fraudster
237
J. Spink, et al. Food Control 105 (2019) 233–241
Fig. 6. An example of a Corporate Risk Map that is populated with risks (Threat • Criminology of Situational Crime Prevention for the fraud oppor-
levels are represented as red/very high, orange/high, yellow/medium, green/ tunity
low and blue/very low. The color-coding is presented in each cell, but in reality • Criminology to understand the nature of the criminals
would be bands or striations. The letters identify specific case study problems • Intelligence analysis for new information
that are referenced in the text.).
• Management, decision sciences, and psychology to understand de-
cision processes
3. Food Fraud Prevention Cycle (FFPC) • Strategy, risk analysis, and finance for the process of assessing risks
• Strategy and managerial accounting to more fully incorporate en-
The Food Fraud Prevention Cycle (FFPC) connects the new per- terprise risk management
spectives into an interconnected system that expands across all other • Food science including authenticity testing
business functions (Fig. 7). The content in the FFPC is presented as • Public policy for how laws and regulations are developed and im-
overall principles which are general concepts (e.g., A, B, & C) and steps plemented
that are the activities that are conducted (e.g., 1, 2, 3, 4, 5 & 6). The • Law enforcement challenges and priorities
FFPC is expanded on and adapted from previous works from basic ISO • Judicial and prosecution limited resources and priorities
31000 Risk Management principles, the applied total quality manage- • Supply chain management including traceability
ment principle such as in Six Sigma, the food fraud Chemistry of the
Crime foundation, and also previously unpublished teaching materials Other business functions that apply include:
(ISO 2009; ISO 2011b; MSU-FFI 2017a; Spink, 2014).
The FFPC is the map of how the activities integrate and connect. The • Key account management or sales management
FFPC is a systematic way to consider new insights or information and • Crisis management or continuity planning
connect it to understanding the fraud opportunity, re-evaluating the • Corporate communications including messaging to the fraudsters
vulnerability, and then the final assessment of acceptable/unacceptable • Procurement review of fluctuating market prices or economic
within the enterprise-wide assessment. anomalies
This entire cycle is based on several concepts including “Academic • Corporate quality and food safety review of incidents and material
Disciplines” (Principle A) that are specific fields of study such as Food goods risk assessments
• Human resources including background checks on purchasing and
corporate security employees
• Corporate security to investigate criminal activity
• Corporate compliance with laws and regulations, but also with
standards and certification
• Horizon scanning and intelligence gathering
The FFPC is coordinated for the overall objective of reducing the
fraud opportunities, linking to the Criminology concepts of guardians
and guardianship and is identified as “Application – The Guardian”
(Principle C).
The functions in the FFPC are connected and identified by numbers
and letters. An important function is the consideration of new
“Information” (Step 1) which is divided into several categories in-
cluding “Review Incidents” (Step 1A, specific food fraud incidents in-
ternally or externally), “Scanning” (Step 1B, considering broad changes
such as fluctuating market prices), and then “Public Policy” (Step 1C,
which includes new laws, regulations or priority setting such as in-
vestigations).
The core of the FFPC is the Crime Triangle which defines the factors
Fig. 7. Food Fraud Prevention Cycle (FFPC) (expanded on and adapted from that influence the “Fraud Opportunity” (Step 2) and the “Enterprise
previous works by (ISO 2009; MSU-FFI 2017a; Spink, 2014). Risk Rank” (Step 4). The connection between the two is the
238
J. Spink, et al. Food Control 105 (2019) 233–241
“Vulnerability Assessment” (Step 3) presented along with a continuum Risk Map” (Step 5).
from an “Initial Screening” (Step 3A) and more detailed “Detailed iii. FFPC Decision: If the current North Atlantic Cod Fish vulner-
Vulnerability Assessment” (Step 3B) and then assessed in “Enterprise ability is currently above the risk tolerance (point “C”) and the
Risk Management” (Step 5). After considering those steps, there is a new test reduces the vulnerability to the green zone (point “F”)
resulting “Rank” (Step 5). The “Countermeasures and Control Systems” then this new countermeasure DOES shift the vulnerability to an
(Step 6) influence the “Fraud Opportunity” to connect back into that acceptable risk tolerance. If the current position is the green zone
point (Step 2). (point “F”) and the new countermeasure reduces the vulner-
ability to the blue zone (point “H”), while this is an improvement
4. Illustrative examples: a review of new information it is not a high priority. In this scenario, this new counter-
measure does NOT address an unacceptable risk, so there is NOT
This section will provide a few application examples of the FFPC. an ERM-based justification for implementing the risk treatment.
d. Illustrative example 4: “(6) Countermeasures” – New
a. Illustrative example 1: “(1) Information” – “(1C) Public Policy”: One Countermeasure and Control System (Countermeasure): A more
example is the Negative List of the Chinese National Center for Food secure enhanced traceability system, such as reducing the oppor-
Safety Risk Assessment (CFSA). The Negative List address the food tunity for documents to be altered or forged, is considered.
fraud adulterant-substances that result in the most significant health i. FFPC Entry Point: The new information applied to the
concerns and therefore are a high priority for the Chinese govern- “Countermeasure” (Step 6).
ment to test in the marketplace. A new chemical added to the ii. FFPC Activity: The new test is considered in the “Fraud
Negative List can impact the fraud opportunity and thus, the en- Opportunity” (Step 2) and the value is judged in the
terprise-wide risk as government increases the testing of specific “Vulnerability Assessment” (Step 3) and again on the “Corporate
food products. Risk Map” (Step 5).
i. FFPC Entry Point: Step 1C – New Information/Public Policy iii. FFPC Decision: If the current traceability document security is
(Fig. 7). under the risk tolerance (point “F”,”G,” or “H”) then this new
ii. FFPC Activity: The new information is applied to the under- countermeasure addresses a vulnerability that is already accep-
standing of the Fraud Opportunity (Step 2). table. As, above, in this scenario, this new countermeasure does
iii. FFPC Decision: If this chemical is already included in substance NOT address an unacceptable risk, so there is NOT an ERM-based
testing in an early warning system, then the new information justification for implementing the risk treatment. Of course, it
does NOT fundamentally change the way we understand the fraud would be valuable to add the risk treatment if it was free in
opportunity. If the chemical is not included in the testing then it terms of financial and human resource costs.
DOES change the fraud opportunity, and the “Vulnerability
Assessment” (Step 3) is updated and plotted on the Corporate These illustrative examples demonstrate how the FFPC creates a
Risk Map. If the result is in the yellow, green or blue zone (e.g., systematic way to understand new information and supports resource-
medium, low, or very low which is presented as letter “E” allocation decision-making.
through “H”), then the new vulnerability is still within the risk
tolerance. A company may still decide to implement a new or 5. Conclusion
adjusted “Countermeasure or Control System,” but that would
further reduce a problem that is already within the acceptable The primary food protection trend related to food fraud has shifted
risk tolerance. For example, the new information may shift the from what is food fraud and is it really a problem to defining an efficient
vulnerability from blue (point “G”) to yellow (point “E”). and effective system to reduce the fraud opportunity. Following general
b. Illustrative example 2: “(1) Information” – “(1A)” Review risk analysis concepts such as ISO31000 – including the applied total
Incidents”: A new food fraud incident is found, and details are quality management principle such as in Six Sigma, or others – the steps
gathered by the risk assessor. An example could be peanut filler used to address Food Fraud include (Spink, 2019b):
in ground cumin that includes a peanut allergen.
i. FFPC Entry Point: The new information is applied to Step 1A – 1) What is Food Fraud?
New Information/Review Incidents (Fig. 7). 2) Is it a problem?
ii. FFPC Activity: The new information is applied to the under- 3) How to detect specific fraud acts? Are new tests needed? And then
standing of the Fraud Opportunity (Step 2). validate the test methods.
iii. FFPC Decision: The presence of the peanut allergen raised the 4) Do I need to act?
likelihood of detection and the consequence of an incident. The 5) How to start addressing food fraud?
vulnerability could rise to an unacceptable risk tolerance in the a) What to do (such as countermeasures or control systems in-
orange (point “E”) or red zones (e.g., high, or very high which is cluding food authenticity testing)?
presented as letter “E” to “B”). Now a very specific assessment b) How to measure success?
can be conducted to consider “Countermeasures and Control c) How much is enough?
Systems.” To note, the red and orange zones are within the un- 6) Ongoing review and process improvement.
acceptable risk tolerance range. The resource-allocation decision-
makers must take action to reduce the resulting vulnerability or It is logical that many of the early scholarly publications focus on
they would need to disclose this hazard to regulators. the basics of “what is food fraud?” and “is food fraud a problem?” The
c. Illustrative example 3: “(6) Countermeasures” – New next step is to explore how to respond to and detect the known in-
Countermeasure and Control System (Countermeasure): A new cidents including a review of test methods, publishing results and va-
countermeasure, such as more advanced species test for North lidation. Once the foundation is constructed and the countermeasures
Atlantic Cod fish, is considered. and control systems developed, it is natural that the research focus
i. FFPC Entry Point: The new information applied to the further evolves to better understand more fully managing these risks
“Countermeasure” (Step 6) (Fig. 7). proactively and shift focus to prevention strategies.
ii. FFPC Activity: The new test is considered in the “Fraud The compliance requirements of new regulations and standards
Opportunity” (Step 2) and the value is judged in the address the question “Do I need to act?”. Before defining “How to start?”
“Vulnerability Assessment” (Step 3) and again on the “Corporate there is a need to at least understand the methods to establish “How
239
J. Spink, et al. Food Control 105 (2019) 233–241
much is enough?” and “How to measure success?”. These questions are COSO, Committee of Sponsoring Organizations of the Treadway Commission (2013).
all addressed by building upon a Food Fraud Vulnerability Assessment Internal controls – integrated framework. http://www.coso.org/documents/
990025P_Executive_Summary_final_may20_e.pdf.
within the FFPC and within the overall Food Fraud Prevention Strategy COSO, Committee of Sponsoring Organizations of the Treadway Commission (2014a).
(FFPS). As more companies fully meet GFSI and Sarbanes-Oxley type COSO enterprise risk management-integrated framework update. http://www.coso.
food fraud related compliance, there will be further development of org/ermupdate.html.
COSO, Committee of Sponsoring Organizations of the Treadway Commission (2014b).
harmonized methods and opportunities to benchmark activities. These Home page. Retrieved http://coso.org/, Accessed date: 5 September 2014.
concepts will continue to evolve and be refined. The FFPC is the first COSO, Committee of Sponsoring Organizations of the Treadway Commission (2012b).
step in this evolution. Understanding and communicating risk appetiteJanuary: Larry Rittenberg and Frank
Martens 2012.
There are several key areas for further research including more DEFRA, United Kingdom Department for the Environent, Food, & Rural Affaris (2014).
detailed application of the range of disciplines (noted as “A – Academic Elliott review into the integrity and assurance of food supply networks, independent report,
Disciplines”), the refinement of the applied learnings (noted as “B – ref: PB14089, PDF, 539KB. 84 pages https://www.gov.uk/government/uploads/
system/uploads/attachment_data/file/350726/elliot-review-final-report-july2014.
Fundamental Concepts”), and further case study research which will
pdf.
provide refinement and process development of the FFPC use-case. EP, European Parliament (2013). Report on the food crisis, fraud in the food chain and the
control thereof, (2013/2091(INI). R. E. d. Lang. Committee on the Environment, Public
Funding sources Health and Food Safety, European Parliament.
Everstine, K., Spink, J., & Kennedy, S. (2013). Economically motivated adulteration
(EMA) of food: Common characteristics of EMA incidents. Journal of Food Protection,
This work was conducted under the key job responsibilities of the 76(4), 723–735.
authors. No outside funding was provided. FDA, U.S. Food and Drug Administration (2007). Food protection plan. .
FDA, U.S. Food and Drug Administration (2009). Public meeting: Economically motivated
adulteration. http://www.fda.gov/NewsEvents/MeetingsConferencesWorkshops/
Glossary ucm163619.htm.
Felson, M. (1998). Crime and Everyday life. Thousand Oaks, Calif: Pine Forge Press.
Felson, M. (2013). Routine activity approach (Chapter). Willan: Environmental criminology
Other important related terms include: and crime analysis.
Felson, M., & Boba, R. (2010). Crime and Everyday life (4th ed.). Sage Publications.
• Food security which is the consistent, safe, continuous, supply of food Felson, M., & Clarke, R. V. (1998). Opportunity makes the thief: Practical theory for crime
prevention " police research series paper 98. London: Home Office.
(WHO 2009),
• Economically motivated adulteration which is defined by FDA as a
GAO, US Government Accountabilty Office (2014). Standards for internal control in the
federal government. GAO-14-704G: Published: Sep 10, 2014. Publicly Released: Sep
“substance” for “economic gain” (FDA 2009), 10, 2014 https://www.gao.gov/products/GAO-14-704G.
• Food authenticity which is a confirmation that the “product is what it GFSI, Global Food Safety Initiative (2014). GFSI position on mitigating the public health risk
of food fraud, global food safety initiative. Consumer Goods Forum.
says it is” (DEFRA 2014), GFSI, Global Food Safety Initiative (2017). Guidance document, benchmarking document,
• Food protection which is a combination of food safety and food de- version 7. http://www.theconsumergoodsforum.com/files/Publications/GFSI_
Guidance_Document_Intro.pdf.
fense activities (FDA 2007),
• Food integrity which is a combination of many terms and includes
GFSI, Global Food Safety Initiative (2018). Food fraud technical document. Tackling Food
Fraud through Food Safety Management Systems. May 9, 2018 http://www.mygfsi.
statements about ethical production and ecological practices com/files/Technical_Documents/201805‐food‐fraud‐technical‐document‐final.pdf.
(DEFRA 2014), Gray, J. I. (2011). Multidisciplinary research: Opportunities and challenges,November 8, 2011.
•
MSU Office of Graduate Research Seminar Series, East Lansing.
Food crime for which there are two definitions, one being the vio- ISO, International Organization for Standardization (2011b). ISO 13053-1:2011 quanti-
lation of a criminal statute using food, and the other a serious food tative methods in process improvement – Six Sigma – Part 1: DMAIC methodology. https://
fraud incident (NFCU 2017; van Ruth et al., 2017). www.iso.org/standard/52901.html.
ISO, International Standards Organization (2005). ISO 22000 Food safety management
systems – Requirements for any organization in the food chain. 2012 http://www.iso.
Conflicts of interest org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=35466.
ISO, International Standards Organization (2009). ISO 31000:2009 risk management -
principles and guidelines.
We declare no conflict of interest.
ISO, International Standards Organization (2011a). ISO 12931 - performance criteria for
authentication solutions for anti-counterfeiting in the field of material goods. 2012 http://
Acknowledgment www.iso.org/iso/catalogue_detail.htm?csnumber=52210.
ISO, International Standards Organization (2017). Technical committee 292 security man-
agement and resilience, work group 04 product fraud countermeasures and controls. Home
The authors alone are responsible for the views expressed in this Page https://www.iso.org/committee/5259148.html.
article, and they do not necessarily represent the views, decisions or ISO, International Standards Organization (2018). ISO 22380:2018 Security and resilience
policies of the institutions with which they are affiliated. – Authenticity, integrity and trust for products and documents – General principles for
product fraud risk and countermeasures. Status: Published, Publication date: 2018-08-
22 https://www.iso.org/standard/73857.html.
References IUFoST, International Union of Food Science and Technology (2016). Food fraud pre-
vention, scientific information bulletin (SIB). By John Spink. November 2016 http://
iufost.org/iufost-scientific-information-bulletins-sib.
Bréchon, A. L., Hanner, R., & Mariani, S. (2016). A systematic analysis across North Lanier, M., & Henry, S. (2004). Essential criminology. Philadelphia: Westview.
Atlantic countries unveils subtleties in cod product labelling. Marine Policy, 69, Lord, N., Flores Elizondo, C. J., & Spencer, J. (2017). x-The dynamics of food fraud: The
124–133. interactions between criminal opportunity and market (dys) functionality in legit-
CFSA, Chinese National Center for Food Safety Risk Assessment (2015a). China regulation imate business. Criminology and Criminal Justice, 17(5), 605–623.
and perspectives to address food fraud and non-food ingredient adulterant. Baltimore, Lord, N., Spencer, J., Albanese, J., & Elizondo, C. F. (2017). In pursuit of food system
Maryland, USA: Food Safety Summit 2015, Presented by Dr. Yongning Wu. integrity: The situational prevention of food fraud enterprise. European Journal on
CFSA, Chinese National Center for Food Safety Risk Assessment (2015b). Strategies for Criminal Policy and Research, 23(4), 483–501.
ensuring food safety of Chinese products – fight against food fraud. Presentation at the Manning, L., & Soon, J. M. (2016). X-food safety, food fraud, and food defense: A fast
institute for food technologists (IFT) annual conference 2015. Chicago, Illinois, USA: evolving literature. Journal of Food Science, 81(4), R823–R834.
Presented by Dr. Junshi Chen. Moore, J. C., Spink, J., & Lipp, M. (2012). Development and application of a database on
Clarke, R. V., & Eck, J. E. (2005). Crime analysis for problem solvers in 60 Small Steps. food ingredient fraud and economically motivated adulteration from 1980 – 2010.
Washington, DC: Center for Problem Oriented Policing. Journal of Food Science, 77(4), R118–R126.
CODEX (2018). Codex Alimentarius, home page. http://www.fao.org/fao-who- Moyer, D. C., DeVries, J. W., & John Spink (2017). “The economics of a food fraud
codexalimentarius/en/. incident–Case studies and examples including Melamine in Wheat Gluten. Food
CODEX, Codex Alimentarius (2017). Invitation to participate in the CCFICS EWG on food Control, 71, 358–364.
integrity and food authenticity, home page for WG on food integrity and food authenticity - MSU-FFI, Michigan State Univerisity Food Fraud Initiative (2017a). The role of enterprise
CCFICS 23, August 7, 2017. http://www.fao.org/fileadmin/user_upload/ risk management in food fraud prevention, MSU food fraud initiative report (FFIR), funded
codexalimentarius/invitations/EWG%20Kick%20off%20message%20fraud.pdf. by an anonymous donorhttp://foodfraud.msu.edu/wp-content/uploads/2017/03/FFI-
COSO, Committee of Sponsoring Organizations of the Treadway Commission (2012a). Backgrounder-the-role-of-ERM-in-Food-Fraud-prevention-v50.pdfhttps://youtu.be/
Risk assessment in practice - enterprise risk management. Cg8T9C8nURs.
240
J. Spink, et al. Food Control 105 (2019) 233–241
MSU-FFI, Michigan State Univerisity Food Fraud Initiative (2017b). Applying enterprise Spink, J., Bedard, B., Bruner, L., Keogh, J., Scimeca, Joseph, G., et al. (2019c).
risk management to food fraud prevention – workings of ROI vs. Vulnerability, risk to International survey of food fraud and related terminology: Preliminary results and
vulnerability, and then a case study example of a complex food fraud management system discussion. Journal of Food Science 00(00), 00-00.
(ERM2), MSU food fraud initiative report (FFIR), funded by the Kerry group's global Spink, J., Hegarty, P. V., Fortin, N. D., Elliott, C. T., & Moyer, D. C. (2019a). The appli-
supply quality team's program. August 2017 http://foodfraud.msu.edu/wp-content/ cation of public policy theory to the emerging food fraud risk: Next steps. Trends in
uploads/2017/09/BKGFF17-FFI-Backgrounder-ERM-ERM2-v46.pdfhttps://youtu. Food Science & Technology, 85, 116–128 March 2019.
be/DVl_k-7_NEw. Spink, J., & Mace, R. (2007). The business case analysis for strategic anti-counterfeit food
NFCU, United Kingdom National Food Crime Unit (2017). What is food crime and how research. Internal grants. E. C. Todd. East lansing, MI, food safety policy center (FSPC).
does it differ from food fraud? Web-page. https://www.food.gov.uk/enforcement/ Michigan State University.
the-national-food-crime-unit/what-is-food-crime-and-food-fraud. Spink, J., & Moyer, D. C. (2011). Defining the public health threat of food fraud. Journal
Pain, E. (2003). Multidisciplinary research: today's hottest buzzword. Science Career of Food Science, 76(9), R157–R162.
Magazine. Spink, J., Moyer, D., Park, H., & Heinonen, J. (2013). Defining the types of counterfeiting,
Primrose, S., Woolfe, M., & Rollinson, S. (2010). Food forensics: Methods for determining counterfeiters, and offender organizations. Crime Science, 2(8), 1–9.
the authenticity of foodstuffs. Trends in Food Science & Technology, 21(12), 582–590. Spink, J., Moyer, D. C., Park, H., Wu, Y., Fersht, V., Shao, B., et al. (2015). Introducing
Reilly, A. (2018). Overview of food fraud in the fisheries sector. FAO Fisheries and Food Fraud including translation and interpretation to Russian, Korean, and Chinese
Aquaculture Circular(C1165)I. languages. Food Chemistry, 0.
van Ruth, S. M., Huisman, W., & Luning, P. A. (2017). Food fraud vulnerability and its key Spink, J., Moyer, D. C., & Speier-Pero, C. (2016a). Introducing the food fraud initial
factors. Trends in Food Science & Technology, 67, 70–75. screening model (FFIS). Food Control, 69, 306–314.
van Ruth, S., Luning, P., Silvis, I., Yang, Y., & Huisman, W. (2018). Differences in fraud Spink, J., Moyer, D. C., & Whelan, P. (2016b). The role of the public private partnership in
vulnerability in various food supply chains and their tiers. Food Control, 84, 375–381. Food Fraud prevention—includes implementing the strategy. Current Opinion in Food
Sharp, P. A., Cooney, C. L., Kastner, M. A., Lees, J., Ram, S., Yaffe, M. B., et al. (2011). The Science (COFS), 10, 68–75 March 2016.
third revolution: The convergence of the life sciences, physical sciences, and engineering. Spink, J., Ortega, D., Chen, C., & Wu, F. (2017). Food fraud prevention shifts food risk
Massachusetts Institute of Technology. focus to vulnerability. Trends in Food Science & Technology, 62(November 2017),
Spink, J. (2014). Food fraud prevention overview, introducing the food fraud prevention cycle 215–220.
(FFPC)/food fraud prevention system. Beijing: GFSI China Focus Day 2014. SSAFE Organization (2015). Food fraud vulnerability assessment tool - FFVAT, (formerly :
Spink, J. (2018). Food fraud - a global perspective. 12th international dubai food safety Safe secure and affordable food for everyone organization). December 16 2015
conference, october 30, 2018, Dubai. http://www.ssafe-food.org/.
Spink, J. (2019b). Food fraud prevention. Publisher Springer-Verlag New York Edition USP, United States Pharmacopeia (2015). Appendix XVII: Food fraud mitigation guidance.
Number 1,Number of Pages XIX, 591, (in press) May 22, 2019; Publication Date: Food Chemicals Codex (FCC)http://www.usp.org/food-safety-integrity.
September 3, 2019]. USP, US Pharmacopeia (2017). Guidance on developing and validating non-targeted methods
Spink, J. (2019d). Chapter: Food fraud and adulteration: Where we stand today. In V. for adulteration detection.
Peter, M. Laurence, & S. Fereidoon (Eds.). Encyclopedia of food Chemistry(1st ed.). WHO, World Health Organization (2009). Food security. Retrieved http://www.who.int/
Elsevier ISBN 0128140453. trade/glossary/story028/en/, Accessed date: 29 January 2009.
241